From 55c553206d846464b4c93b32bd6ade5486580495 Mon Sep 17 00:00:00 2001 From: "fern-api[bot]" <115122769+fern-api[bot]@users.noreply.github.com> Date: Thu, 9 Apr 2026 15:25:00 +0000 Subject: [PATCH] SDK regeneration --- reference.md | 4474 +++-- src/auth0/management/_default_clients.py | 32 + .../actions/executions/raw_client.py | 16 +- .../management/actions/modules/raw_client.py | 80 +- .../actions/modules/versions/raw_client.py | 40 +- src/auth0/management/actions/raw_client.py | 80 +- .../actions/triggers/bindings/raw_client.py | 28 +- .../management/actions/triggers/raw_client.py | 10 + .../management/actions/versions/raw_client.py | 40 +- .../management/anomaly/blocks/raw_client.py | 28 +- .../bot_detection/raw_client.py | 18 + .../breached_password_detection/raw_client.py | 18 + .../brute_force_protection/raw_client.py | 18 + .../attack_protection/captcha/raw_client.py | 18 + .../suspicious_ip_throttling/raw_client.py | 18 + .../branding/phone/providers/raw_client.py | 68 +- .../branding/phone/templates/raw_client.py | 80 +- src/auth0/management/branding/raw_client.py | 18 + .../branding/templates/raw_client.py | 26 + .../management/branding/themes/raw_client.py | 56 +- src/auth0/management/client.py | 27 +- .../client_grants/organizations/raw_client.py | 16 +- .../management/client_grants/raw_client.py | 56 +- .../clients/connections/raw_client.py | 16 +- .../clients/credentials/raw_client.py | 64 +- src/auth0/management/clients/raw_client.py | 84 +- .../connection_profiles/raw_client.py | 76 +- .../connections/clients/raw_client.py | 28 +- .../directory_provisioning/raw_client.py | 72 +- .../synchronizations/raw_client.py | 16 +- .../management/connections/keys/raw_client.py | 40 +- .../management/connections/raw_client.py | 68 +- .../scim_configuration/raw_client.py | 72 +- .../scim_configuration/tokens/raw_client.py | 40 +- .../connections/users/raw_client.py | 16 +- src/auth0/management/core/__init__.py | 13 +- src/auth0/management/core/datetime_utils.py | 42 + src/auth0/management/core/http_client.py | 108 +- src/auth0/management/core/jsonable_encoder.py | 12 + src/auth0/management/core/parse_error.py | 36 + .../management/core/pydantic_utilities.py | 83 +- .../management/custom_domains/raw_client.py | 96 +- .../device_credentials/raw_client.py | 32 +- .../management/email_templates/raw_client.py | 48 +- .../management/emails/provider/raw_client.py | 34 + .../event_streams/deliveries/raw_client.py | 28 +- .../management/event_streams/raw_client.py | 68 +- .../event_streams/redeliveries/raw_client.py | 28 +- .../management/flows/executions/raw_client.py | 40 +- src/auth0/management/flows/raw_client.py | 56 +- .../flows/vault/connections/raw_client.py | 56 +- src/auth0/management/forms/raw_client.py | 56 +- .../management/groups/members/raw_client.py | 16 +- src/auth0/management/groups/raw_client.py | 36 +- .../guardian/enrollments/raw_client.py | 36 +- .../factors/duo/settings/raw_client.py | 26 + .../guardian/factors/phone/raw_client.py | 66 + .../factors/push_notification/raw_client.py | 98 + .../management/guardian/factors/raw_client.py | 24 +- .../guardian/factors/sms/raw_client.py | 50 + .../guardian/policies/raw_client.py | 18 + src/auth0/management/hooks/raw_client.py | 56 +- .../management/hooks/secrets/raw_client.py | 52 +- .../management/jobs/errors/raw_client.py | 16 +- src/auth0/management/jobs/raw_client.py | 16 +- .../jobs/users_exports/raw_client.py | 10 + .../jobs/users_imports/raw_client.py | 10 + .../jobs/verification_email/raw_client.py | 10 + .../keys/custom_signing/raw_client.py | 26 + .../management/keys/encryption/raw_client.py | 76 +- .../management/keys/signing/raw_client.py | 44 +- .../management/log_streams/raw_client.py | 56 +- src/auth0/management/logs/raw_client.py | 24 +- .../management/network_acls/raw_client.py | 68 +- .../organizations/client_grants/raw_client.py | 40 +- .../organizations/connections/raw_client.py | 64 +- .../discovery_domains/raw_client.py | 76 +- .../enabled_connections/raw_client.py | 64 +- .../organizations/invitations/raw_client.py | 52 +- .../organizations/members/raw_client.py | 40 +- .../organizations/members/roles/raw_client.py | 40 +- .../management/organizations/raw_client.py | 68 +- .../prompts/custom_text/raw_client.py | 28 +- .../management/prompts/partials/raw_client.py | 28 +- src/auth0/management/prompts/raw_client.py | 18 + .../prompts/rendering/raw_client.py | 44 +- .../management/refresh_tokens/raw_client.py | 48 +- .../management/resource_servers/raw_client.py | 56 +- .../settings/new_device/raw_client.py | 18 + .../risk_assessments/settings/raw_client.py | 18 + .../roles/permissions/raw_client.py | 40 +- src/auth0/management/roles/raw_client.py | 56 +- .../management/roles/users/raw_client.py | 28 +- src/auth0/management/rules/raw_client.py | 56 +- .../management/rules_configs/raw_client.py | 36 +- .../custom_text/raw_client.py | 28 +- .../self_service_profiles/raw_client.py | 56 +- .../sso_ticket/raw_client.py | 28 +- src/auth0/management/sessions/raw_client.py | 52 +- src/auth0/management/stats/raw_client.py | 18 + .../supplemental_signals/raw_client.py | 18 + .../management/tenants/settings/raw_client.py | 18 + src/auth0/management/tickets/raw_client.py | 18 + .../token_exchange_profiles/raw_client.py | 56 +- .../management/types/acul_client_metadata.py | 3 + src/auth0/management/types/acul_configs.py | 3 + .../types/acul_context_configuration.py | 3 + .../management/types/acul_domain_metadata.py | 3 + .../types/acul_head_tag_attributes.py | 3 + .../management/types/acul_head_tag_content.py | 4 + .../types/acul_organization_metadata.py | 3 + .../management/types/anomaly_ip_format.py | 3 + src/auth0/management/types/app_metadata.py | 3 + .../types/bot_detection_allowlist.py | 3 + .../types/bot_detection_cidr_block.py | 3 + .../management/types/bot_detection_i_pv_4.py | 3 + .../management/types/bot_detection_i_pv_6.py | 3 + .../types/bot_detection_i_pv_6_cidr_block.py | 3 + .../bot_detection_ip_address_or_cidr_block.py | 3 + .../bot_detection_monitoring_mode_enabled.py | 3 + .../management/types/client_addon_box.py | 3 + .../types/client_addon_cloud_bees.py | 3 + .../management/types/client_addon_concur.py | 3 + .../management/types/client_addon_dropbox.py | 3 + .../management/types/client_addon_ws_fed.py | 3 + ...ations_channels_api_patch_configuration.py | 3 + ...cations_channels_api_post_configuration.py | 3 + ...tion_method_private_key_jwt_credentials.py | 3 + ...self_signed_tls_client_auth_credentials.py | 3 + ...tion_method_tls_client_auth_credentials.py | 3 + ...tion_method_private_key_jwt_credentials.py | 3 + ...tion_method_tls_client_auth_credentials.py | 3 + ...lient_grant_allow_any_organization_enum.py | 3 + .../types/client_jwt_configuration_scopes.py | 3 + src/auth0/management/types/client_metadata.py | 3 + .../management/types/client_signing_keys.py | 3 + .../connection_access_token_urlo_auth_1.py | 3 + .../types/connection_acr_values_supported.py | 3 + ...min_access_token_expires_in_google_apps.py | 3 + ...nnection_admin_access_token_google_apps.py | 3 + ...nection_admin_refresh_token_google_apps.py | 3 + .../management/types/connection_agent_ipad.py | 3 + .../types/connection_agent_mode_ad.py | 3 + .../types/connection_agent_version_ad.py | 3 + ...ction_allowed_audiences_google_o_auth_2.py | 3 + ...onnection_api_enable_groups_google_apps.py | 3 + ...connection_api_enable_users_google_apps.py | 3 + .../types/connection_app_domain_azure_ad.py | 3 + .../connection_attribute_map_attributes.py | 3 + ...connection_attribute_map_userinfo_scope.py | 3 + ...h_params_additional_properties_o_auth_2.py | 3 + .../types/connection_auth_params_email.py | 3 + .../types/connection_auth_params_map.py | 3 + .../types/connection_auth_params_o_auth_2.py | 3 + .../types/connection_base_url_exact.py | 3 + .../connection_brute_force_protection.py | 3 + .../management/types/connection_certs_ad.py | 3 + .../types/connection_claim_types_supported.py | 3 + .../connection_claims_locales_supported.py | 3 + .../connection_claims_parameter_supported.py | 3 + .../types/connection_claims_supported.py | 3 + .../management/types/connection_client_id.py | 3 + .../types/connection_client_id_amazon.py | 3 + .../types/connection_client_id_bitbucket.py | 3 + .../types/connection_client_id_exact.py | 3 + .../types/connection_client_id_facebook.py | 3 + .../types/connection_client_id_google_apps.py | 3 + .../connection_client_id_google_o_auth_2.py | 3 + .../types/connection_client_id_line.py | 3 + .../types/connection_client_id_linkedin.py | 3 + .../types/connection_client_id_o_auth_1.py | 3 + .../types/connection_client_id_paypal.py | 3 + .../types/connection_client_id_salesforce.py | 3 + .../connection_client_id_windows_live.py | 3 + .../types/connection_client_protocol_saml.py | 3 + .../types/connection_client_secret.py | 3 + .../types/connection_client_secret_amazon.py | 3 + .../connection_client_secret_azure_ad.py | 3 + .../types/connection_client_secret_exact.py | 3 + .../connection_client_secret_facebook.py | 3 + .../connection_client_secret_google_apps.py | 3 + ...onnection_client_secret_google_o_auth_2.py | 3 + .../types/connection_client_secret_line.py | 3 + .../connection_client_secret_linkedin.py | 3 + .../connection_client_secret_o_auth_1.py | 3 + .../types/connection_client_secret_paypal.py | 3 + .../connection_client_secret_salesforce.py | 3 + ...onnection_community_base_url_salesforce.py | 3 + .../types/connection_configuration.py | 3 + .../connection_custom_headers_o_auth_2.py | 3 + .../management/types/connection_debug_saml.py | 3 + .../types/connection_destination_url_saml.py | 3 + .../types/connection_digest_algorithm_saml.py | 3 + ...on_disable_self_service_change_password.py | 3 + .../types/connection_disable_signup.py | 3 + .../types/connection_disable_signup_sms.py | 3 + .../types/connection_discovery_url.py | 3 + .../types/connection_display_name.py | 3 + .../connection_display_values_supported.py | 3 + .../types/connection_domain_aliases.py | 3 + .../types/connection_domain_aliases_ad.py | 3 + .../connection_domain_aliases_azure_ad.py | 3 + .../types/connection_domain_aliases_saml.py | 3 + .../types/connection_domain_google_apps.py | 3 + .../types/connection_domain_okta.py | 3 + ...ction_dpop_signing_alg_values_supported.py | 3 + .../types/connection_email_body_email.py | 3 + .../types/connection_email_from_email.py | 3 + .../types/connection_email_subject_email.py | 3 + .../types/connection_enable_script_context.py | 3 + .../types/connection_enabled_clients.py | 3 + ...nnection_enabled_database_customization.py | 3 + .../types/connection_end_session_endpoint.py | 3 + .../types/connection_entity_id_saml.py | 3 + .../management/types/connection_ext_admin.py | 3 + .../types/connection_ext_agreed_terms.py | 3 + ...connection_ext_agreed_terms_google_apps.py | 3 + .../types/connection_ext_assigned_plans.py | 3 + .../types/connection_ext_groups_azure_ad.py | 3 + .../connection_ext_groups_google_apps.py | 3 + .../connection_ext_is_admin_google_apps.py | 3 + .../types/connection_ext_is_suspended.py | 3 + ...connection_ext_is_suspended_google_apps.py | 3 + .../types/connection_ext_profile.py | 3 + .../management/types/connection_fields_map.py | 3 + .../types/connection_fields_map_saml.py | 3 + .../types/connection_forward_req_info_sms.py | 3 + .../connection_freeform_scopes_amazon.py | 3 + ...nection_freeform_scopes_google_o_auth_2.py | 3 + .../connection_freeform_scopes_linkedin.py | 3 + .../connection_freeform_scopes_paypal.py | 3 + .../connection_freeform_scopes_salesforce.py | 3 + ...connection_freeform_scopes_windows_live.py | 3 + .../management/types/connection_from_sms.py | 3 + ...ion_gateway_authentication_audience_sms.py | 3 + ...ction_gateway_authentication_method_sms.py | 3 + ...tion_gateway_authentication_subject_sms.py | 3 + .../types/connection_gateway_url_sms.py | 3 + ...on_global_token_revocation_jwt_iss_saml.py | 3 + ...on_global_token_revocation_jwt_sub_saml.py | 3 + .../types/connection_grant_types_supported.py | 3 + ...on_handle_login_from_social_google_apps.py | 3 + .../management/types/connection_icon_url.py | 3 + .../types/connection_icon_url_adfs.py | 3 + .../types/connection_icon_url_azure_ad.py | 3 + .../types/connection_icon_url_google_apps.py | 3 + .../connection_icon_url_google_o_auth_2.py | 3 + .../types/connection_icon_url_saml.py | 3 + src/auth0/management/types/connection_id.py | 3 + ...d_token_encryption_alg_values_supported.py | 3 + ...d_token_encryption_enc_values_supported.py | 3 + ...onnection_id_token_signed_response_algs.py | 3 + ...n_id_token_signing_alg_values_supported.py | 3 + .../types/connection_identifier_precedence.py | 3 + .../types/connection_identity_api_azure_ad.py | 3 + .../types/connection_import_mode.py | 3 + .../management/types/connection_ips_ad.py | 3 + .../types/connection_is_domain_connection.py | 3 + .../connection_max_groups_to_retrieve.py | 3 + .../connection_messaging_service_sid_sms.py | 3 + .../types/connection_metadata_url_saml.py | 3 + .../types/connection_metadata_xml.py | 3 + .../types/connection_metadata_xml_adfs.py | 3 + .../types/connection_metadata_xml_saml.py | 3 + src/auth0/management/types/connection_name.py | 3 + .../types/connection_name_prefix_template.py | 3 + .../types/connection_non_persistent_attrs.py | 3 + .../management/types/connection_options.py | 3 + .../connection_options_client_id_github.py | 3 + .../connection_options_client_id_twitter.py | 3 + ...connection_options_client_secret_github.py | 3 + ...onnection_options_client_secret_twitter.py | 3 + .../types/connection_options_custom.py | 3 + .../types/connection_options_deflate_saml.py | 3 + ...nnection_options_freeform_scopes_github.py | 3 + .../management/types/connection_options_ip.py | 3 + .../types/connection_options_scope_github.py | 3 + .../types/connection_options_scope_twitter.py | 3 + .../connection_ping_federate_base_url.py | 3 + ...on_ping_federate_base_url_ping_federate.py | 3 + .../types/connection_profile_bitbucket.py | 3 + .../connection_profile_enabled_features.py | 3 + .../management/types/connection_profile_id.py | 3 + .../types/connection_profile_name.py | 3 + ...ile_strategy_overrides_enabled_features.py | 3 + .../types/connection_protocol_binding_saml.py | 3 + .../types/connection_provider_sms.py | 3 + .../connection_provisioning_ticket_url.py | 3 + .../types/connection_realm_fallback.py | 3 + .../management/types/connection_realms.py | 3 + .../types/connection_recipient_url_saml.py | 3 + ..._object_encryption_alg_values_supported.py | 3 + ..._object_encryption_enc_values_supported.py | 3 + ...est_object_signing_alg_values_supported.py | 3 + .../connection_request_parameter_supported.py | 3 + .../types/connection_request_template_saml.py | 3 + .../connection_request_token_urlo_auth_1.py | 3 + ...nection_request_uri_parameter_supported.py | 3 + ...ection_require_request_uri_registration.py | 3 + .../types/connection_requires_username.py | 3 + .../connection_response_modes_supported.py | 3 + .../connection_response_types_supported.py | 3 + .../types/connection_scope_amazon.py | 3 + .../types/connection_scope_array.py | 3 + .../types/connection_scope_array_facebook.py | 3 + .../connection_scope_array_windows_live.py | 3 + .../types/connection_scope_azure_ad.py | 3 + .../types/connection_scope_facebook.py | 3 + .../types/connection_scope_google_apps.py | 3 + .../types/connection_scope_google_o_auth_2.py | 3 + .../management/types/connection_scope_item.py | 3 + .../connection_scope_item_google_apps.py | 3 + .../types/connection_scope_linkedin.py | 3 + .../management/types/connection_scope_oidc.py | 3 + .../types/connection_scope_paypal.py | 3 + .../types/connection_scope_salesforce.py | 3 + .../types/connection_scopes_supported.py | 3 + .../connection_send_back_channel_nonce.py | 3 + .../types/connection_sha_1_thumbprint.py | 3 + .../types/connection_show_as_button.py | 3 + .../types/connection_sign_in_endpoint_ad.py | 3 + .../types/connection_sign_in_endpoint_adfs.py | 3 + .../types/connection_sign_in_endpoint_saml.py | 3 + .../connection_sign_out_endpoint_saml.py | 3 + .../connection_sign_saml_request_saml.py | 3 + .../connection_signature_algorithm_saml.py | 3 + .../types/connection_signing_cert_saml.py | 3 + ...connection_signing_certificate_der_saml.py | 3 + ...n_signing_certificate_pem_ping_federate.py | 3 + ...connection_signing_certificate_pem_saml.py | 3 + ...tion_strategy_version_enum_windows_live.py | 3 + .../connection_subject_types_supported.py | 3 + .../types/connection_template_sms.py | 3 + .../types/connection_tenant_domain.py | 3 + .../types/connection_tenant_domain_ad.py | 3 + .../connection_tenant_domain_google_apps.py | 3 + .../types/connection_tenant_id_azure_ad.py | 3 + .../types/connection_thumbprints.py | 3 + .../types/connection_thumbprints_ad.py | 3 + .../types/connection_thumbprints_saml.py | 3 + ...n_token_endpoint_auth_methods_supported.py | 3 + ...point_auth_signing_alg_values_supported.py | 3 + .../types/connection_totp_length_email.py | 3 + .../connection_totp_length_passwordless.py | 3 + .../types/connection_totp_length_sms.py | 3 + .../types/connection_totp_time_step_email.py | 3 + .../connection_totp_time_step_passwordless.py | 3 + .../types/connection_totp_time_step_sms.py | 3 + .../types/connection_twilio_sid_sms.py | 3 + .../types/connection_twilio_token_sms.py | 3 + .../types/connection_ui_locales_supported.py | 3 + .../types/connection_upstream_params.py | 3 + .../connection_upstream_params_facebook.py | 3 + ...connection_use_common_endpoint_azure_ad.py | 3 + ...nnection_user_authorization_urlo_auth_1.py | 3 + .../connection_user_id_attribute_saml.py | 3 + .../connection_userid_attribute_azure_ad.py | 3 + ...serinfo_encryption_alg_values_supported.py | 3 + ...serinfo_encryption_enc_values_supported.py | 3 + ...n_userinfo_signing_alg_values_supported.py | 3 + .../types/connection_waad_protocol.py | 3 + .../management/types/connections_metadata.py | 3 + ...self_signed_tls_client_auth_credentials.py | 3 + .../create_hook_secret_request_content.py | 3 + .../delete_hook_secret_request_content.py | 3 + .../delete_user_identity_response_content.py | 3 + src/auth0/management/types/domain_metadata.py | 3 + .../types/email_provider_settings.py | 3 + src/auth0/management/types/email_smtp_host.py | 3 + ...der_settings_with_additional_properties.py | 3 + .../management/types/flow_execution_debug.py | 3 + ...tive_users_count_stats_response_content.py | 3 + ...stom_texts_by_language_response_content.py | 3 + .../types/get_hook_secret_response_content.py | 3 + .../management/types/get_job_user_error.py | 3 + .../types/get_partials_response_content.py | 3 + .../types/get_scim_tokens_response_content.py | 3 + .../types/guardian_enrollment_date.py | 3 + .../management/types/hook_dependencies.py | 3 + ...ce_profile_custom_text_response_content.py | 3 + src/auth0/management/types/log_date_object.py | 3 + src/auth0/management/types/log_details.py | 3 + .../types/network_acl_action_allow_enum.py | 3 + .../types/network_acl_action_block_enum.py | 3 + .../types/network_acl_action_log_enum.py | 3 + .../types/network_acl_action_redirect_enum.py | 3 + .../management/types/organization_metadata.py | 3 + .../types/refresh_token_date_object.py | 3 + .../types/refresh_token_metadata.py | 3 + .../types/refresh_token_session_id.py | 3 + ...server_verification_key_pem_certificate.py | 3 + .../types/self_service_profile_description.py | 3 + .../self_service_profile_user_attributes.py | 3 + src/auth0/management/types/session_ip.py | 3 + .../management/types/session_metadata.py | 3 + .../types/set_partials_request_content.py | 3 + ...ice_profile_custom_text_request_content.py | 3 + ...ce_profile_custom_text_response_content.py | 3 + ...ustom_texts_by_language_request_content.py | 3 + .../suspicious_ip_throttling_allowlist.py | 3 + .../management/types/test_action_payload.py | 3 + .../types/test_action_result_payload.py | 3 + .../types/test_event_data_content.py | 3 + .../update_hook_secret_request_content.py | 3 + .../types/user_app_metadata_schema.py | 3 + .../types/user_attribute_profile_id.py | 3 + .../types/user_attribute_profile_name.py | 3 + .../user_attribute_profile_saml_mapping.py | 3 + .../user_attribute_profile_user_attributes.py | 3 + ..._attribute_profile_user_id_saml_mapping.py | 3 + src/auth0/management/types/user_metadata.py | 3 + .../management/types/user_metadata_schema.py | 3 + .../user_attribute_profiles/raw_client.py | 76 +- .../management/user_blocks/raw_client.py | 44 +- .../management/user_grants/raw_client.py | 32 +- .../authentication_methods/raw_client.py | 88 +- .../users/authenticators/raw_client.py | 16 +- .../users/connected_accounts/raw_client.py | 16 +- .../users/enrollments/raw_client.py | 16 +- .../raw_client.py | 28 +- .../management/users/groups/raw_client.py | 16 +- .../management/users/identities/raw_client.py | 28 +- src/auth0/management/users/logs/raw_client.py | 16 +- .../users/multifactor/raw_client.py | 28 +- .../users/organizations/raw_client.py | 16 +- .../users/permissions/raw_client.py | 40 +- src/auth0/management/users/raw_client.py | 88 +- .../users/refresh_token/raw_client.py | 28 +- .../users/risk_assessments/raw_client.py | 16 +- .../management/users/roles/raw_client.py | 40 +- .../management/users/sessions/raw_client.py | 28 +- .../verification/templates/raw_client.py | 56 +- tests/conftest.py | 43 +- tests/test_aiohttp_autodetect.py | 116 + tests/utils/test_http_client.py | 362 + tests/wire/conftest.py | 5 +- tests/wire/test_actions.py | 40 +- tests/wire/test_actions_executions.py | 4 +- tests/wire/test_actions_modules.py | 33 +- tests/wire/test_actions_modules_versions.py | 15 +- tests/wire/test_actions_triggers_bindings.py | 10 +- tests/wire/test_actions_versions.py | 19 +- tests/wire/test_anomaly_blocks.py | 8 +- tests/wire/test_branding_phone_providers.py | 30 +- tests/wire/test_branding_phone_templates.py | 25 +- tests/wire/test_branding_templates.py | 4 +- tests/wire/test_branding_themes.py | 266 +- tests/wire/test_clientGrants.py | 16 +- tests/wire/test_clientGrants_organizations.py | 6 +- tests/wire/test_clients.py | 30 +- tests/wire/test_clients_connections.py | 8 +- tests/wire/test_clients_credentials.py | 24 +- tests/wire/test_connectionProfiles.py | 25 +- tests/wire/test_connections.py | 31 +- tests/wire/test_connections_clients.py | 18 +- .../test_connections_directoryProvisioning.py | 29 +- ..._directoryProvisioning_synchronizations.py | 4 +- tests/wire/test_connections_keys.py | 16 +- .../test_connections_scimConfiguration.py | 30 +- ...st_connections_scimConfiguration_tokens.py | 13 +- tests/wire/test_connections_users.py | 5 +- tests/wire/test_customDomains.py | 36 +- tests/wire/test_deviceCredentials.py | 9 +- tests/wire/test_emailTemplates.py | 17 +- tests/wire/test_emails_provider.py | 14 +- tests/wire/test_eventStreams.py | 50 +- tests/wire/test_eventStreams_deliveries.py | 5 +- tests/wire/test_eventStreams_redeliveries.py | 9 +- tests/wire/test_flows.py | 23 +- tests/wire/test_flows_executions.py | 16 +- tests/wire/test_flows_vault_connections.py | 34 +- tests/wire/test_forms.py | 22 +- tests/wire/test_groups.py | 8 +- tests/wire/test_groups_members.py | 8 +- tests/wire/test_guardian_enrollments.py | 12 +- tests/wire/test_guardian_factors.py | 5 +- tests/wire/test_guardian_factors_phone.py | 11 +- .../test_guardian_factors_pushNotification.py | 4 +- tests/wire/test_guardian_factors_sms.py | 7 +- tests/wire/test_guardian_policies.py | 4 +- tests/wire/test_hooks.py | 26 +- tests/wire/test_hooks_secrets.py | 19 +- tests/wire/test_jobs.py | 4 +- tests/wire/test_jobs_errors.py | 4 +- tests/wire/test_jobs_usersImports.py | 5 +- tests/wire/test_jobs_verificationEmail.py | 4 +- tests/wire/test_keys_customSigning.py | 10 +- tests/wire/test_keys_encryption.py | 27 +- tests/wire/test_keys_signing.py | 8 +- tests/wire/test_logStreams.py | 23 +- tests/wire/test_logs.py | 12 +- tests/wire/test_networkAcls.py | 39 +- tests/wire/test_organizations.py | 26 +- tests/wire/test_organizations_clientGrants.py | 17 +- tests/wire/test_organizations_connections.py | 28 +- .../test_organizations_discoveryDomains.py | 31 +- .../test_organizations_enabledConnections.py | 27 +- tests/wire/test_organizations_invitations.py | 31 +- tests/wire/test_organizations_members.py | 18 +- .../wire/test_organizations_members_roles.py | 20 +- tests/wire/test_prompts_customText.py | 11 +- tests/wire/test_prompts_partials.py | 9 +- tests/wire/test_prompts_rendering.py | 21 +- tests/wire/test_refreshTokens.py | 19 +- tests/wire/test_resourceServers.py | 24 +- tests/wire/test_riskAssessments_settings.py | 4 +- ...test_riskAssessments_settings_newDevice.py | 4 +- tests/wire/test_roles.py | 23 +- tests/wire/test_roles_permissions.py | 19 +- tests/wire/test_roles_users.py | 11 +- tests/wire/test_rules.py | 28 +- tests/wire/test_rulesConfigs.py | 9 +- tests/wire/test_selfServiceProfiles.py | 22 +- .../test_selfServiceProfiles_customText.py | 13 +- .../test_selfServiceProfiles_ssoTicket.py | 9 +- tests/wire/test_sessions.py | 16 +- tests/wire/test_stats.py | 5 +- tests/wire/test_supplementalSignals.py | 4 +- tests/wire/test_tenants_settings.py | 5 +- tests/wire/test_tickets.py | 4 +- tests/wire/test_tokenExchangeProfiles.py | 22 +- tests/wire/test_userAttributeProfiles.py | 35 +- tests/wire/test_userBlocks.py | 18 +- tests/wire/test_userGrants.py | 15 +- tests/wire/test_users.py | 32 +- .../wire/test_users_authenticationMethods.py | 42 +- tests/wire/test_users_authenticators.py | 4 +- tests/wire/test_users_connectedAccounts.py | 6 +- tests/wire/test_users_enrollments.py | 4 +- ...est_users_federatedConnectionsTokensets.py | 9 +- tests/wire/test_users_groups.py | 8 +- tests/wire/test_users_identities.py | 10 +- tests/wire/test_users_logs.py | 8 +- tests/wire/test_users_multifactor.py | 9 +- tests/wire/test_users_organizations.py | 7 +- tests/wire/test_users_permissions.py | 19 +- tests/wire/test_users_refreshToken.py | 10 +- tests/wire/test_users_riskAssessments.py | 6 +- tests/wire/test_users_roles.py | 17 +- tests/wire/test_users_sessions.py | 10 +- ...iableCredentials_verification_templates.py | 25 +- wiremock/wiremock-mappings.json | 14848 +++++++++++++++- 542 files changed, 24794 insertions(+), 2916 deletions(-) create mode 100644 src/auth0/management/_default_clients.py create mode 100644 src/auth0/management/core/parse_error.py create mode 100644 tests/test_aiohttp_autodetect.py diff --git a/reference.md b/reference.md index 34baced0..5ea90cc0 100644 --- a/reference.md +++ b/reference.md @@ -1,6 +1,6 @@ # Reference ## Actions -
client.actions.list(...) -> AsyncPager[Action, ListActionsPaginatedResponseContent] +
client.actions.list(...) -> ListActionsPaginatedResponseContent
@@ -27,12 +27,15 @@ Retrieve all actions.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.list( + +client.actions.list( trigger_id="post-login", action_name="actionName", deployed=True, @@ -40,11 +43,6 @@ response = client.actions.list( per_page=1, installed=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -120,7 +118,7 @@ for page in response.iter_pages():
-
client.actions.create(...) -> AsyncHttpResponse[CreateActionResponseContent] +
client.actions.create(...) -> CreateActionResponseContent
@@ -147,11 +145,14 @@ Create an action. Once an action is created, it must be deployed, and then bound
```python -from auth0 import ActionTrigger, Auth0 +from auth0.management import Auth0, ActionTrigger +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.create( name="name", supported_triggers=[ @@ -183,7 +184,7 @@ client.actions.create(
-**supported_triggers:** `typing.Sequence[ActionTrigger]` — The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. +**supported_triggers:** `typing.List[ActionTrigger]` — The list of triggers that this action supports. At this time, an action can only target a single trigger at a time.
@@ -199,7 +200,7 @@ client.actions.create(
-**dependencies:** `typing.Optional[typing.Sequence[ActionVersionDependency]]` — The list of third party npm modules, and their versions, that this action depends on. +**dependencies:** `typing.Optional[typing.List[ActionVersionDependency]]` — The list of third party npm modules, and their versions, that this action depends on.
@@ -215,7 +216,7 @@ client.actions.create(
-**secrets:** `typing.Optional[typing.Sequence[ActionSecretRequest]]` — The list of secrets that are included in an action or a version of an action. +**secrets:** `typing.Optional[typing.List[ActionSecretRequest]]` — The list of secrets that are included in an action or a version of an action.
@@ -223,7 +224,7 @@ client.actions.create(
-**modules:** `typing.Optional[typing.Sequence[ActionModuleReference]]` — The list of action modules and their versions used by this action. +**modules:** `typing.Optional[typing.List[ActionModuleReference]]` — The list of action modules and their versions used by this action.
@@ -251,7 +252,7 @@ client.actions.create(
-
client.actions.get(...) -> AsyncHttpResponse[GetActionResponseContent] +
client.actions.get(...) -> GetActionResponseContent
@@ -278,11 +279,14 @@ Retrieve an action by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.get( id="id", ) @@ -321,7 +325,7 @@ client.actions.get(
-
client.actions.delete(...) -> AsyncHttpResponse[None] +
client.actions.delete(...)
@@ -348,11 +352,14 @@ Deletes an action and all of its associated versions. An action must be unbound
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.delete( id="id", force=True, @@ -400,7 +407,7 @@ client.actions.delete(
-
client.actions.update(...) -> AsyncHttpResponse[UpdateActionResponseContent] +
client.actions.update(...) -> UpdateActionResponseContent
@@ -427,11 +434,14 @@ Update an existing action. If this action is currently bound to a trigger, updat
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.update( id="id", ) @@ -466,7 +476,7 @@ client.actions.update(
-**supported_triggers:** `typing.Optional[typing.Sequence[ActionTrigger]]` — The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. +**supported_triggers:** `typing.Optional[typing.List[ActionTrigger]]` — The list of triggers that this action supports. At this time, an action can only target a single trigger at a time.
@@ -482,7 +492,7 @@ client.actions.update(
-**dependencies:** `typing.Optional[typing.Sequence[ActionVersionDependency]]` — The list of third party npm modules, and their versions, that this action depends on. +**dependencies:** `typing.Optional[typing.List[ActionVersionDependency]]` — The list of third party npm modules, and their versions, that this action depends on.
@@ -498,7 +508,7 @@ client.actions.update(
-**secrets:** `typing.Optional[typing.Sequence[ActionSecretRequest]]` — The list of secrets that are included in an action or a version of an action. +**secrets:** `typing.Optional[typing.List[ActionSecretRequest]]` — The list of secrets that are included in an action or a version of an action.
@@ -506,7 +516,7 @@ client.actions.update(
-**modules:** `typing.Optional[typing.Sequence[ActionModuleReference]]` — The list of action modules and their versions used by this action. +**modules:** `typing.Optional[typing.List[ActionModuleReference]]` — The list of action modules and their versions used by this action.
@@ -526,7 +536,7 @@ client.actions.update(
-
client.actions.deploy(...) -> AsyncHttpResponse[DeployActionResponseContent] +
client.actions.deploy(...) -> DeployActionResponseContent
@@ -553,11 +563,14 @@ Deploy an action. Deploying an action will create a new immutable version of the
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.deploy( id="id", ) @@ -596,7 +609,7 @@ client.actions.deploy(
-
client.actions.test(...) -> AsyncHttpResponse[TestActionResponseContent] +
client.actions.test(...) -> TestActionResponseContent
@@ -623,14 +636,19 @@ Test an action. After updating an action, it can be tested prior to being deploy
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.test( id="id", - payload={"key": "value"}, + payload={ + "key": "value" + }, ) ``` @@ -676,7 +694,7 @@ client.actions.test(
## Branding -
client.branding.get() -> AsyncHttpResponse[GetBrandingResponseContent] +
client.branding.get() -> GetBrandingResponseContent
@@ -703,11 +721,14 @@ Retrieve branding settings.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.get() ``` @@ -736,7 +757,7 @@ client.branding.get()
-
client.branding.update(...) -> AsyncHttpResponse[UpdateBrandingResponseContent] +
client.branding.update(...) -> UpdateBrandingResponseContent
@@ -763,11 +784,14 @@ Update branding settings.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.update() ``` @@ -829,7 +853,7 @@ client.branding.update()
## ClientGrants -
client.client_grants.list(...) -> AsyncPager[ClientGrantResponseContent, ListClientGrantPaginatedResponseContent] +
client.client_grants.list(...) -> ListClientGrantPaginatedResponseContent
@@ -856,12 +880,15 @@ Retrieve a list of @@ -889,7 +911,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -949,7 +971,7 @@ for page in response.iter_pages():
-
client.client_grants.create(...) -> AsyncHttpResponse[CreateClientGrantResponseContent] +
client.client_grants.create(...) -> CreateClientGrantResponseContent
@@ -976,11 +998,14 @@ Create a client grant for a machine-to-machine login flow. To learn more, read <
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.client_grants.create( audience="audience", ) @@ -1031,7 +1056,7 @@ client.client_grants.create(
-**scope:** `typing.Optional[typing.Sequence[str]]` — Scopes allowed for this client grant. +**scope:** `typing.Optional[typing.List[str]]` — Scopes allowed for this client grant.
@@ -1047,7 +1072,7 @@ client.client_grants.create(
-**authorization_details_types:** `typing.Optional[typing.Sequence[str]]` — Types of authorization_details allowed for this client grant. +**authorization_details_types:** `typing.Optional[typing.List[str]]` — Types of authorization_details allowed for this client grant.
@@ -1075,7 +1100,7 @@ client.client_grants.create(
-
client.client_grants.get(...) -> AsyncHttpResponse[GetClientGrantResponseContent] +
client.client_grants.get(...) -> GetClientGrantResponseContent
@@ -1103,11 +1128,14 @@ scopes associated with the application/API pair.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.client_grants.get( id="id", ) @@ -1146,7 +1174,7 @@ client.client_grants.get(
-
client.client_grants.delete(...) -> AsyncHttpResponse[None] +
client.client_grants.delete(...)
@@ -1173,11 +1201,14 @@ Delete the
-
client.client_grants.update(...) -> AsyncHttpResponse[UpdateClientGrantResponseContent] +
client.client_grants.update(...) -> UpdateClientGrantResponseContent
@@ -1243,11 +1274,14 @@ Update a client grant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.client_grants.update( id="id", ) @@ -1274,7 +1308,7 @@ client.client_grants.update(
-**scope:** `typing.Optional[typing.Sequence[str]]` — Scopes allowed for this client grant. +**scope:** `typing.Optional[typing.List[str]]` — Scopes allowed for this client grant.
@@ -1298,7 +1332,7 @@ client.client_grants.update(
-**authorization_details_types:** `typing.Optional[typing.Sequence[str]]` — Types of authorization_details allowed for this client grant. +**authorization_details_types:** `typing.Optional[typing.List[str]]` — Types of authorization_details allowed for this client grant.
@@ -1327,7 +1361,7 @@ client.client_grants.update(
## Clients -
client.clients.list(...) -> AsyncPager[Client, ListClientsOffsetPaginatedResponseContent] +
client.clients.list(...) -> ListClientsOffsetPaginatedResponseContent
@@ -1386,12 +1420,15 @@ For more information, read @@ -1515,7 +1547,7 @@ for page in response.iter_pages():
-
client.clients.create(...) -> AsyncHttpResponse[CreateClientResponseContent] +
client.clients.create(...) -> CreateClientResponseContent
@@ -1555,11 +1587,14 @@ These credentials will be automatically enabled for Private Key JWT authenticati
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.create( name="name", ) @@ -1602,7 +1637,7 @@ client.clients.create(
-**callbacks:** `typing.Optional[typing.Sequence[str]]` — Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication. +**callbacks:** `typing.Optional[typing.List[str]]` — Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication.
@@ -1634,7 +1669,7 @@ client.clients.create(
-**allowed_origins:** `typing.Optional[typing.Sequence[str]]` — Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs. +**allowed_origins:** `typing.Optional[typing.List[str]]` — Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs.
@@ -1642,7 +1677,7 @@ client.clients.create(
-**web_origins:** `typing.Optional[typing.Sequence[str]]` — Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode. +**web_origins:** `typing.Optional[typing.List[str]]` — Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode.
@@ -1650,7 +1685,7 @@ client.clients.create(
-**client_aliases:** `typing.Optional[typing.Sequence[str]]` — List of audiences/realms for SAML protocol. Used by the wsfed addon. +**client_aliases:** `typing.Optional[typing.List[str]]` — List of audiences/realms for SAML protocol. Used by the wsfed addon.
@@ -1658,7 +1693,7 @@ client.clients.create(
-**allowed_clients:** `typing.Optional[typing.Sequence[str]]` — List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed. +**allowed_clients:** `typing.Optional[typing.List[str]]` — List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed.
@@ -1666,7 +1701,7 @@ client.clients.create(
-**allowed_logout_urls:** `typing.Optional[typing.Sequence[str]]` — Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains. +**allowed_logout_urls:** `typing.Optional[typing.List[str]]` — Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains.
@@ -1674,7 +1709,7 @@ client.clients.create(
-**grant_types:** `typing.Optional[typing.Sequence[str]]` — List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. +**grant_types:** `typing.Optional[typing.List[str]]` — List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`.
@@ -1874,7 +1909,7 @@ client.clients.create(
-**organization_discovery_methods:** `typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]]` — Defines the available methods for organization discovery during the `pre_login_prompt`. Users can discover their organization either by `email`, `organization_name` or both. +**organization_discovery_methods:** `typing.Optional[typing.List[ClientOrganizationDiscoveryEnum]]` — Defines the available methods for organization discovery during the `pre_login_prompt`. Users can discover their organization either by `email`, `organization_name` or both.
@@ -1994,7 +2029,7 @@ See https://auth0.com/docs/secure/security-guidance/measures-against-app-imperso
-
client.clients.preview_cimd_metadata(...) -> AsyncHttpResponse[PreviewCimdMetadataResponseContent] +
client.clients.preview_cimd_metadata(...) -> PreviewCimdMetadataResponseContent
@@ -2025,11 +2060,14 @@ See https://auth0.com/docs/secure/security-guidance/measures-against-app-imperso
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.preview_cimd_metadata( external_client_id="external_client_id", ) @@ -2068,7 +2106,7 @@ client.clients.preview_cimd_metadata(
-
client.clients.register_cimd_client(...) -> AsyncHttpResponse[RegisterCimdClientResponseContent] +
client.clients.register_cimd_client(...) -> RegisterCimdClientResponseContent
@@ -2098,11 +2136,14 @@ client.clients.preview_cimd_metadata(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.register_cimd_client( external_client_id="external_client_id", ) @@ -2141,7 +2182,7 @@ client.clients.register_cimd_client(
-
client.clients.get(...) -> AsyncHttpResponse[GetClientResponseContent] +
client.clients.get(...) -> GetClientResponseContent
@@ -2198,11 +2239,14 @@ For more information, read
-
client.clients.delete(...) -> AsyncHttpResponse[None] +
client.clients.delete(...)
@@ -2286,11 +2330,14 @@ Delete a client and related configuration (rules, connections, etc).
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.delete( id="id", ) @@ -2329,7 +2376,7 @@ client.clients.delete(
-
client.clients.update(...) -> AsyncHttpResponse[UpdateClientResponseContent] +
client.clients.update(...) -> UpdateClientResponseContent
@@ -2364,11 +2411,14 @@ Notes:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.update( id="id", ) @@ -2427,7 +2477,7 @@ client.clients.update(
-**callbacks:** `typing.Optional[typing.Sequence[str]]` — A set of URLs that are valid to call back from Auth0 when authenticating users +**callbacks:** `typing.Optional[typing.List[str]]` — A set of URLs that are valid to call back from Auth0 when authenticating users
@@ -2459,7 +2509,7 @@ client.clients.update(
-**allowed_origins:** `typing.Optional[typing.Sequence[str]]` — A set of URLs that represents valid origins for CORS +**allowed_origins:** `typing.Optional[typing.List[str]]` — A set of URLs that represents valid origins for CORS
@@ -2467,7 +2517,7 @@ client.clients.update(
-**web_origins:** `typing.Optional[typing.Sequence[str]]` — A set of URLs that represents valid web origins for use with web message response mode +**web_origins:** `typing.Optional[typing.List[str]]` — A set of URLs that represents valid web origins for use with web message response mode
@@ -2475,7 +2525,7 @@ client.clients.update(
-**grant_types:** `typing.Optional[typing.Sequence[str]]` — A set of grant types that the client is authorized to use. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. +**grant_types:** `typing.Optional[typing.List[str]]` — A set of grant types that the client is authorized to use. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`.
@@ -2483,7 +2533,7 @@ client.clients.update(
-**client_aliases:** `typing.Optional[typing.Sequence[str]]` — List of audiences for SAML protocol +**client_aliases:** `typing.Optional[typing.List[str]]` — List of audiences for SAML protocol
@@ -2491,7 +2541,7 @@ client.clients.update(
-**allowed_clients:** `typing.Optional[typing.Sequence[str]]` — Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients +**allowed_clients:** `typing.Optional[typing.List[str]]` — Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients
@@ -2499,7 +2549,7 @@ client.clients.update(
-**allowed_logout_urls:** `typing.Optional[typing.Sequence[str]]` — URLs that are valid to redirect to after logout from Auth0 +**allowed_logout_urls:** `typing.Optional[typing.List[str]]` — URLs that are valid to redirect to after logout from Auth0
@@ -2707,7 +2757,7 @@ client.clients.update(
-**organization_discovery_methods:** `typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]]` — Defines the available methods for organization discovery during the `pre_login_prompt`. Users can discover their organization either by `email`, `organization_name` or both. +**organization_discovery_methods:** `typing.Optional[typing.List[ClientOrganizationDiscoveryEnum]]` — Defines the available methods for organization discovery during the `pre_login_prompt`. Users can discover their organization either by `email`, `organization_name` or both.
@@ -2811,7 +2861,7 @@ See https://auth0.com/docs/secure/security-guidance/measures-against-app-imperso
-
client.clients.rotate_secret(...) -> AsyncHttpResponse[RotateClientSecretResponseContent] +
client.clients.rotate_secret(...) -> RotateClientSecretResponseContent
@@ -2842,11 +2892,14 @@ For more information, read ## ConnectionProfiles -
client.connection_profiles.list(...) -> AsyncPager[ConnectionProfile, ListConnectionProfilesPaginatedResponseContent] +
client.connection_profiles.list(...) -> ListConnectionProfilesPaginatedResponseContent
@@ -2913,20 +2966,18 @@ Retrieve a list of Connection Profiles. This endpoint supports Checkpoint pagina
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.connection_profiles.list( + +client.connection_profiles.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -2942,7 +2993,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -2970,7 +3021,7 @@ for page in response.iter_pages():
-
client.connection_profiles.create(...) -> AsyncHttpResponse[CreateConnectionProfileResponseContent] +
client.connection_profiles.create(...) -> CreateConnectionProfileResponseContent
@@ -2997,11 +3048,14 @@ Create a Connection Profile.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.create( name="name", ) @@ -3080,7 +3134,7 @@ client.connection_profiles.create(
-
client.connection_profiles.list_templates() -> AsyncHttpResponse[ListConnectionProfileTemplateResponseContent] +
client.connection_profiles.list_templates() -> ListConnectionProfileTemplateResponseContent
@@ -3107,11 +3161,14 @@ Retrieve a list of Connection Profile Templates.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.list_templates() ``` @@ -3140,7 +3197,7 @@ client.connection_profiles.list_templates()
-
client.connection_profiles.get_template(...) -> AsyncHttpResponse[GetConnectionProfileTemplateResponseContent] +
client.connection_profiles.get_template(...) -> GetConnectionProfileTemplateResponseContent
@@ -3167,11 +3224,14 @@ Retrieve a Connection Profile Template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.get_template( id="id", ) @@ -3210,7 +3270,7 @@ client.connection_profiles.get_template(
-
client.connection_profiles.get(...) -> AsyncHttpResponse[GetConnectionProfileResponseContent] +
client.connection_profiles.get(...) -> GetConnectionProfileResponseContent
@@ -3237,11 +3297,14 @@ Retrieve details about a single Connection Profile specified by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.get( id="id", ) @@ -3280,7 +3343,7 @@ client.connection_profiles.get(
-
client.connection_profiles.delete(...) -> AsyncHttpResponse[None] +
client.connection_profiles.delete(...)
@@ -3307,11 +3370,14 @@ Delete a single Connection Profile specified by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.delete( id="id", ) @@ -3350,7 +3416,7 @@ client.connection_profiles.delete(
-
client.connection_profiles.update(...) -> AsyncHttpResponse[UpdateConnectionProfileResponseContent] +
client.connection_profiles.update(...) -> UpdateConnectionProfileResponseContent
@@ -3377,11 +3443,14 @@ Update the details of a specific Connection Profile.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connection_profiles.update( id="id", ) @@ -3469,7 +3538,7 @@ client.connection_profiles.update(
## Connections -
client.connections.list(...) -> AsyncPager[ConnectionForList, ListConnectionsCheckpointPaginatedResponseContent] +
client.connections.list(...) -> ListConnectionsCheckpointPaginatedResponseContent
@@ -3514,23 +3583,21 @@ To search by checkpoint, use the following parameters:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.connections.list( + +client.connections.list( from_="from", take=1, name="name", fields="fields", include_fields=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -3546,7 +3613,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -3562,11 +3629,7 @@ for page in response.iter_pages():
-**strategy:** `typing.Optional[ - typing.Union[ - ConnectionStrategyEnum, typing.Sequence[ConnectionStrategyEnum] - ] -]` — Provide strategies to only retrieve connections with such strategies +**strategy:** `typing.Optional[typing.Union[typing.Optional[ConnectionStrategyEnum], typing.Sequence[typing.Optional[ConnectionStrategyEnum]]]]` — Provide strategies to only retrieve connections with such strategies
@@ -3610,7 +3673,7 @@ for page in response.iter_pages():
-
client.connections.create(...) -> AsyncHttpResponse[CreateConnectionResponseContent] +
client.connections.create(...) -> CreateConnectionResponseContent
@@ -3639,11 +3702,14 @@ Creates a new connection according to the JSON object received in body ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.create( name="name", strategy="ad", @@ -3695,7 +3761,7 @@ client.connections.create(
-**enabled_clients:** `typing.Optional[typing.Sequence[str]]` — Use of this property is NOT RECOMMENDED. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients. +**enabled_clients:** `typing.Optional[typing.List[str]]` — Use of this property is NOT RECOMMENDED. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients.
@@ -3719,7 +3785,7 @@ client.connections.create(
-**realms:** `typing.Optional[typing.Sequence[str]]` — Defines the realms for which the connection will be used (ie: email domains). If the array is empty or the property is not specified, the connection name will be added as realm. +**realms:** `typing.Optional[typing.List[str]]` — Defines the realms for which the connection will be used (ie: email domains). If the array is empty or the property is not specified, the connection name will be added as realm.
@@ -3763,7 +3829,7 @@ client.connections.create(
-
client.connections.get(...) -> AsyncHttpResponse[GetConnectionResponseContent] +
client.connections.get(...) -> GetConnectionResponseContent
@@ -3790,11 +3856,14 @@ Retrieve details for a specified
-
client.connections.delete(...) -> AsyncHttpResponse[None] +
client.connections.delete(...)
@@ -3880,11 +3949,14 @@ Removes a specific
-
client.connections.update(...) -> AsyncHttpResponse[UpdateConnectionResponseContent] +
client.connections.update(...) -> UpdateConnectionResponseContent
@@ -3952,11 +4024,14 @@ Update details for a specific
-**enabled_clients:** `typing.Optional[typing.Sequence[str]]` — DEPRECATED property. Use the PATCH /v2/connections/{id}/clients endpoint to enable or disable the connection for any clients. +**enabled_clients:** `typing.Optional[typing.List[str]]` — DEPRECATED property. Use the PATCH /v2/connections/{id}/clients endpoint to enable or disable the connection for any clients.
@@ -4023,7 +4098,7 @@ client.connections.update(
-**realms:** `typing.Optional[typing.Sequence[str]]` — Defines the realms for which the connection will be used (ie: email domains). If the array is empty or the property is not specified, the connection name will be added as realm. +**realms:** `typing.Optional[typing.List[str]]` — Defines the realms for which the connection will be used (ie: email domains). If the array is empty or the property is not specified, the connection name will be added as realm.
@@ -4067,7 +4142,7 @@ client.connections.update(
-
client.connections.check_status(...) -> AsyncHttpResponse[None] +
client.connections.check_status(...)
@@ -4094,11 +4169,14 @@ Retrieves the status of an ad/ldap connection referenced by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.check_status( id="id", ) @@ -4138,7 +4216,7 @@ client.connections.check_status(
## CustomDomains -
client.custom_domains.list(...) -> AsyncHttpResponse[ListCustomDomainsResponseContent] +
client.custom_domains.list(...) -> ListCustomDomainsResponseContent
@@ -4165,11 +4243,14 @@ Retrieve details on custom domai
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.list( q="q", fields="fields", @@ -4235,7 +4316,7 @@ client.custom_domains.list(
-
client.custom_domains.create(...) -> AsyncHttpResponse[CreateCustomDomainResponseContent] +
client.custom_domains.create(...) -> CreateCustomDomainResponseContent
@@ -4275,11 +4356,14 @@ TLS Policies:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.create( domain="domain", type="auth0_managed_certs", @@ -4367,7 +4451,7 @@ client.custom_domains.create(
-
client.custom_domains.get_default() -> AsyncHttpResponse[GetDefaultDomainResponseContent] +
client.custom_domains.get_default() -> GetDefaultDomainResponseContent
@@ -4394,11 +4478,14 @@ Retrieve the tenant's default domain.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.get_default() ``` @@ -4427,7 +4514,7 @@ client.custom_domains.get_default()
-
client.custom_domains.set_default(...) -> AsyncHttpResponse[UpdateDefaultDomainResponseContent] +
client.custom_domains.set_default(...) -> UpdateDefaultDomainResponseContent
@@ -4454,11 +4541,14 @@ Set the default custom domain for the tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.set_default( domain="domain", ) @@ -4497,7 +4587,7 @@ client.custom_domains.set_default(
-
client.custom_domains.get(...) -> AsyncHttpResponse[GetCustomDomainResponseContent] +
client.custom_domains.get(...) -> GetCustomDomainResponseContent
@@ -4524,11 +4614,14 @@ Retrieve a custom domain configuration and status.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.get( id="id", ) @@ -4567,7 +4660,7 @@ client.custom_domains.get(
-
client.custom_domains.delete(...) -> AsyncHttpResponse[None] +
client.custom_domains.delete(...)
@@ -4594,11 +4687,14 @@ Delete a custom domain and stop serving requests for it.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.delete( id="id", ) @@ -4637,7 +4733,7 @@ client.custom_domains.delete(
-
client.custom_domains.update(...) -> AsyncHttpResponse[UpdateCustomDomainResponseContent] +
client.custom_domains.update(...) -> UpdateCustomDomainResponseContent
@@ -4687,11 +4783,14 @@ Some considerations:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.update( id="id", ) @@ -4762,7 +4861,7 @@ client.custom_domains.update(
-
client.custom_domains.test(...) -> AsyncHttpResponse[TestCustomDomainResponseContent] +
client.custom_domains.test(...) -> TestCustomDomainResponseContent
@@ -4789,11 +4888,14 @@ Run the test process on a custom domain.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.test( id="id", ) @@ -4832,7 +4934,7 @@ client.custom_domains.test(
-
client.custom_domains.verify(...) -> AsyncHttpResponse[VerifyCustomDomainResponseContent] +
client.custom_domains.verify(...) -> VerifyCustomDomainResponseContent
@@ -4866,11 +4968,14 @@ For self_managed_certs, when the custom domain is verified for the
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.custom_domains.verify( id="id", ) @@ -4910,9 +5015,7 @@ client.custom_domains.verify(
## DeviceCredentials -
client.device_credentials.list(...) -> AsyncPager[ - DeviceCredential, ListDeviceCredentialsOffsetPaginatedResponseContent -] +
client.device_credentials.list(...) -> ListDeviceCredentialsOffsetPaginatedResponseContent
@@ -4939,12 +5042,15 @@ Retrieve device credential information (public_key, refresh_t
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.device_credentials.list( + +client.device_credentials.list( page=1, per_page=1, include_totals=True, @@ -4954,11 +5060,6 @@ response = client.device_credentials.list( client_id="client_id", type="public_key", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -5050,7 +5151,7 @@ for page in response.iter_pages():
-
client.device_credentials.create_public_key(...) -> AsyncHttpResponse[CreatePublicKeyDeviceCredentialResponseContent] +
client.device_credentials.create_public_key(...) -> CreatePublicKeyDeviceCredentialResponseContent
@@ -5079,11 +5180,14 @@ When refresh token rotation is enabled, the endpoint becomes consistent. For mor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.device_credentials.create_public_key( device_name="device_name", type="public_key", @@ -5157,7 +5261,7 @@ client.device_credentials.create_public_key(
-
client.device_credentials.delete(...) -> AsyncHttpResponse[None] +
client.device_credentials.delete(...)
@@ -5184,11 +5288,14 @@ Permanently delete a device credential (such as a refresh token or public key) w
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.device_credentials.delete( id="id", ) @@ -5228,7 +5335,7 @@ client.device_credentials.delete(
## EmailTemplates -
client.email_templates.create(...) -> AsyncHttpResponse[CreateEmailTemplateResponseContent] +
client.email_templates.create(...) -> CreateEmailTemplateResponseContent
@@ -5255,11 +5362,14 @@ Create an email template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.email_templates.create( template="verify_email", ) @@ -5294,7 +5404,7 @@ client.email_templates.create(
-**from_:** `typing.Optional[str]` — Senders `from` email address. +**from:** `typing.Optional[str]` — Senders `from` email address.
@@ -5362,7 +5472,7 @@ client.email_templates.create(
-
client.email_templates.get(...) -> AsyncHttpResponse[GetEmailTemplateResponseContent] +
client.email_templates.get(...) -> GetEmailTemplateResponseContent
@@ -5389,11 +5499,14 @@ Retrieve an email template by pre-defined name. These names are `verify_email`,
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.email_templates.get( template_name="verify_email", ) @@ -5432,7 +5545,7 @@ client.email_templates.get(
-
client.email_templates.set(...) -> AsyncHttpResponse[SetEmailTemplateResponseContent] +
client.email_templates.set(...) -> SetEmailTemplateResponseContent
@@ -5459,11 +5572,14 @@ Update an email template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.email_templates.set( template_name="verify_email", template="verify_email", @@ -5507,7 +5623,7 @@ client.email_templates.set(
-**from_:** `typing.Optional[str]` — Senders `from` email address. +**from:** `typing.Optional[str]` — Senders `from` email address.
@@ -5575,7 +5691,7 @@ client.email_templates.set(
-
client.email_templates.update(...) -> AsyncHttpResponse[UpdateEmailTemplateResponseContent] +
client.email_templates.update(...) -> UpdateEmailTemplateResponseContent
@@ -5602,11 +5718,14 @@ Modify an email template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.email_templates.update( template_name="verify_email", ) @@ -5649,7 +5768,7 @@ client.email_templates.update(
-**from_:** `typing.Optional[str]` — Senders `from` email address. +**from:** `typing.Optional[str]` — Senders `from` email address.
@@ -5718,7 +5837,7 @@ client.email_templates.update(
## EventStreams -
client.event_streams.list(...) -> AsyncPager[EventStreamResponseContent, ListEventStreamsResponseContent] +
client.event_streams.list(...) -> ListEventStreamsResponseContent
@@ -5731,20 +5850,18 @@ client.email_templates.update(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.event_streams.list( + +client.event_streams.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -5760,7 +5877,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -5788,7 +5905,7 @@ for page in response.iter_pages():
-
client.event_streams.create(...) -> AsyncHttpResponse[CreateEventStreamResponseContent] +
client.event_streams.create(...) -> CreateEventStreamResponseContent
@@ -5801,17 +5918,14 @@ for page in response.iter_pages():
```python -from auth0 import ( - Auth0, - CreateEventStreamWebHookRequestContent, - EventStreamWebhookBasicAuth, - EventStreamWebhookConfiguration, - EventStreamWebhookDestination, -) +from auth0.management import Auth0, CreateEventStreamWebHookRequestContent, EventStreamWebhookDestination, EventStreamWebhookConfiguration, EventStreamWebhookBasicAuth +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.create( request=CreateEventStreamWebHookRequestContent( destination=EventStreamWebhookDestination( @@ -5861,7 +5975,7 @@ client.event_streams.create(
-
client.event_streams.get(...) -> AsyncHttpResponse[GetEventStreamResponseContent] +
client.event_streams.get(...) -> GetEventStreamResponseContent
@@ -5874,11 +5988,14 @@ client.event_streams.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.get( id="id", ) @@ -5917,7 +6034,7 @@ client.event_streams.get(
-
client.event_streams.delete(...) -> AsyncHttpResponse[None] +
client.event_streams.delete(...)
@@ -5930,11 +6047,14 @@ client.event_streams.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.delete( id="id", ) @@ -5973,7 +6093,7 @@ client.event_streams.delete(
-
client.event_streams.update(...) -> AsyncHttpResponse[UpdateEventStreamResponseContent] +
client.event_streams.update(...) -> UpdateEventStreamResponseContent
@@ -5986,11 +6106,14 @@ client.event_streams.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.update( id="id", ) @@ -6025,7 +6148,7 @@ client.event_streams.update(
-**subscriptions:** `typing.Optional[typing.Sequence[EventStreamSubscription]]` — List of event types subscribed to in this stream. +**subscriptions:** `typing.Optional[typing.List[EventStreamSubscription]]` — List of event types subscribed to in this stream.
@@ -6061,7 +6184,7 @@ client.event_streams.update(
-
client.event_streams.test(...) -> AsyncHttpResponse[CreateEventStreamTestEventResponseContent] +
client.event_streams.test(...) -> CreateEventStreamTestEventResponseContent
@@ -6074,11 +6197,14 @@ client.event_streams.update(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.test( id="id", event_type="user.created", @@ -6135,7 +6261,7 @@ client.event_streams.test(
## Flows -
client.flows.list(...) -> AsyncPager[FlowSummary, ListFlowsOffsetPaginatedResponseContent] +
client.flows.list(...) -> ListFlowsOffsetPaginatedResponseContent
@@ -6148,22 +6274,20 @@ client.event_streams.test(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.flows.list( + +client.flows.list( page=1, per_page=1, include_totals=True, synchronous=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -6203,12 +6327,7 @@ for page in response.iter_pages():
-**hydrate:** `typing.Optional[ - typing.Union[ - ListFlowsRequestParametersHydrateEnum, - typing.Sequence[ListFlowsRequestParametersHydrateEnum], - ] -]` — hydration param +**hydrate:** `typing.Optional[typing.Union[typing.Optional[ListFlowsRequestParametersHydrateEnum], typing.Sequence[typing.Optional[ListFlowsRequestParametersHydrateEnum]]]]` — hydration param
@@ -6236,7 +6355,7 @@ for page in response.iter_pages():
-
client.flows.create(...) -> AsyncHttpResponse[CreateFlowResponseContent] +
client.flows.create(...) -> CreateFlowResponseContent
@@ -6249,11 +6368,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.create( name="name", ) @@ -6280,7 +6402,7 @@ client.flows.create(
-**actions:** `typing.Optional[typing.Sequence[FlowAction]]` +**actions:** `typing.Optional[typing.List[FlowAction]]`
@@ -6300,7 +6422,7 @@ client.flows.create(
-
client.flows.get(...) -> AsyncHttpResponse[GetFlowResponseContent] +
client.flows.get(...) -> GetFlowResponseContent
@@ -6313,11 +6435,14 @@ client.flows.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.get( id="id", ) @@ -6344,12 +6469,7 @@ client.flows.get(
-**hydrate:** `typing.Optional[ - typing.Union[ - GetFlowRequestParametersHydrateEnum, - typing.Sequence[GetFlowRequestParametersHydrateEnum], - ] -]` — hydration param +**hydrate:** `typing.Optional[typing.Union[typing.Optional[GetFlowRequestParametersHydrateEnum], typing.Sequence[typing.Optional[GetFlowRequestParametersHydrateEnum]]]]` — hydration param
@@ -6369,7 +6489,7 @@ client.flows.get(
-
client.flows.delete(...) -> AsyncHttpResponse[None] +
client.flows.delete(...)
@@ -6382,11 +6502,14 @@ client.flows.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.delete( id="id", ) @@ -6425,7 +6548,7 @@ client.flows.delete(
-
client.flows.update(...) -> AsyncHttpResponse[UpdateFlowResponseContent] +
client.flows.update(...) -> UpdateFlowResponseContent
@@ -6438,11 +6561,14 @@ client.flows.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.update( id="id", ) @@ -6477,7 +6603,7 @@ client.flows.update(
-**actions:** `typing.Optional[typing.Sequence[FlowAction]]` +**actions:** `typing.Optional[typing.List[FlowAction]]`
@@ -6498,7 +6624,7 @@ client.flows.update(
## Forms -
client.forms.list(...) -> AsyncPager[FormSummary, ListFormsOffsetPaginatedResponseContent] +
client.forms.list(...) -> ListFormsOffsetPaginatedResponseContent
@@ -6511,21 +6637,19 @@ client.flows.update(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.forms.list( + +client.forms.list( page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -6565,12 +6689,7 @@ for page in response.iter_pages():
-**hydrate:** `typing.Optional[ - typing.Union[ - FormsRequestParametersHydrateEnum, - typing.Sequence[FormsRequestParametersHydrateEnum], - ] -]` — Query parameter to hydrate the response with additional data +**hydrate:** `typing.Optional[typing.Union[typing.Optional[FormsRequestParametersHydrateEnum], typing.Sequence[typing.Optional[FormsRequestParametersHydrateEnum]]]]` — Query parameter to hydrate the response with additional data
@@ -6590,7 +6709,7 @@ for page in response.iter_pages():
-
client.forms.create(...) -> AsyncHttpResponse[CreateFormResponseContent] +
client.forms.create(...) -> CreateFormResponseContent
@@ -6603,11 +6722,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.forms.create( name="name", ) @@ -6702,7 +6824,7 @@ client.forms.create(
-
client.forms.get(...) -> AsyncHttpResponse[GetFormResponseContent] +
client.forms.get(...) -> GetFormResponseContent
@@ -6715,11 +6837,14 @@ client.forms.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.forms.get( id="id", ) @@ -6746,12 +6871,7 @@ client.forms.get(
-**hydrate:** `typing.Optional[ - typing.Union[ - FormsRequestParametersHydrateEnum, - typing.Sequence[FormsRequestParametersHydrateEnum], - ] -]` — Query parameter to hydrate the response with additional data +**hydrate:** `typing.Optional[typing.Union[typing.Optional[FormsRequestParametersHydrateEnum], typing.Sequence[typing.Optional[FormsRequestParametersHydrateEnum]]]]` — Query parameter to hydrate the response with additional data
@@ -6771,7 +6891,7 @@ client.forms.get(
-
client.forms.delete(...) -> AsyncHttpResponse[None] +
client.forms.delete(...)
@@ -6784,11 +6904,14 @@ client.forms.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.forms.delete( id="id", ) @@ -6827,7 +6950,7 @@ client.forms.delete(
-
client.forms.update(...) -> AsyncHttpResponse[UpdateFormResponseContent] +
client.forms.update(...) -> UpdateFormResponseContent
@@ -6840,11 +6963,14 @@ client.forms.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.forms.update( id="id", ) @@ -6948,7 +7074,7 @@ client.forms.update(
## UserGrants -
client.user_grants.list(...) -> AsyncPager[UserGrant, ListUserGrantsOffsetPaginatedResponseContent] +
client.user_grants.list(...) -> ListUserGrantsOffsetPaginatedResponseContent
@@ -6975,12 +7101,15 @@ Retrieve the g
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.user_grants.list( + +client.user_grants.list( per_page=1, page=1, include_totals=True, @@ -6988,11 +7117,6 @@ response = client.user_grants.list( client_id="client_id", audience="audience", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -7068,7 +7192,7 @@ for page in response.iter_pages():
-
client.user_grants.delete_by_user_id(...) -> AsyncHttpResponse[None] +
client.user_grants.delete_by_user_id(...)
@@ -7095,11 +7219,14 @@ Delete a grant associated with your account.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_grants.delete_by_user_id( user_id="user_id", ) @@ -7138,7 +7265,7 @@ client.user_grants.delete_by_user_id(
-
client.user_grants.delete(...) -> AsyncHttpResponse[None] +
client.user_grants.delete(...)
@@ -7165,11 +7292,14 @@ Delete a grant associated with your account.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_grants.delete( id="id", ) @@ -7209,7 +7339,7 @@ client.user_grants.delete(
## Groups -
client.groups.list(...) -> AsyncPager[Group, ListGroupsPaginatedResponseContent] +
client.groups.list(...) -> ListGroupsPaginatedResponseContent
@@ -7236,12 +7366,15 @@ List all groups in your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.groups.list( + +client.groups.list( connection_id="connection_id", name="name", external_id="external_id", @@ -7250,11 +7383,6 @@ response = client.groups.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -7310,7 +7438,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -7338,7 +7466,7 @@ for page in response.iter_pages():
-
client.groups.get(...) -> AsyncHttpResponse[GetGroupResponseContent] +
client.groups.get(...) -> GetGroupResponseContent
@@ -7365,11 +7493,14 @@ Retrieve a group by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.groups.get( id="id", ) @@ -7408,7 +7539,7 @@ client.groups.get(
-
client.groups.delete(...) -> AsyncHttpResponse[None] +
client.groups.delete(...)
@@ -7435,11 +7566,14 @@ Delete a group by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.groups.delete( id="id", ) @@ -7479,7 +7613,7 @@ client.groups.delete(
## Hooks -
client.hooks.list(...) -> AsyncPager[Hook, ListHooksOffsetPaginatedResponseContent] +
client.hooks.list(...) -> ListHooksOffsetPaginatedResponseContent
@@ -7506,12 +7640,15 @@ Retrieve all hooks. Accepts a list of
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.hooks.list( + +client.hooks.list( page=1, per_page=1, include_totals=True, @@ -7519,11 +7656,6 @@ response = client.hooks.list( fields="fields", trigger_id="credentials-exchange", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -7599,7 +7731,7 @@ for page in response.iter_pages():
-
client.hooks.create(...) -> AsyncHttpResponse[CreateHookResponseContent] +
client.hooks.create(...) -> CreateHookResponseContent
@@ -7626,11 +7758,14 @@ Create a new hook.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.create( name="name", script="script", @@ -7703,7 +7838,7 @@ client.hooks.create(
-
client.hooks.get(...) -> AsyncHttpResponse[GetHookResponseContent] +
client.hooks.get(...) -> GetHookResponseContent
@@ -7730,11 +7865,14 @@ Retrieve a hook by its ID. Accepts a
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.get( id="id", fields="fields", @@ -7782,7 +7920,7 @@ client.hooks.get(
-
client.hooks.delete(...) -> AsyncHttpResponse[None] +
client.hooks.delete(...)
@@ -7809,11 +7947,14 @@ Delete a hook.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.delete( id="id", ) @@ -7852,7 +7993,7 @@ client.hooks.delete(
-
client.hooks.update(...) -> AsyncHttpResponse[UpdateHookResponseContent] +
client.hooks.update(...) -> UpdateHookResponseContent
@@ -7879,11 +8020,14 @@ Update an existing hook.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.update( id="id", ) @@ -7955,7 +8099,7 @@ client.hooks.update(
## Jobs -
client.jobs.get(...) -> AsyncHttpResponse[GetJobResponseContent] +
client.jobs.get(...) -> GetJobResponseContent
@@ -7982,11 +8126,14 @@ Retrieves a job. Useful to check its status.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.jobs.get( id="id", ) @@ -8026,7 +8173,7 @@ client.jobs.get(
## LogStreams -
client.log_streams.list() -> AsyncHttpResponse[typing.List[LogStreamResponseSchema]] +
client.log_streams.list() -> typing.List[LogStreamResponseSchema]
@@ -8118,11 +8265,14 @@ Retrieve details on log streams ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.log_streams.list() ``` @@ -8151,7 +8301,7 @@ client.log_streams.list()
-
client.log_streams.create(...) -> AsyncHttpResponse[CreateLogStreamResponseContent] +
client.log_streams.create(...) -> CreateLogStreamResponseContent
@@ -8303,11 +8453,14 @@ Response:
{
 
```python -from auth0 import Auth0, CreateLogStreamHttpRequestBody, LogStreamHttpSink +from auth0.management import Auth0, CreateLogStreamHttpRequestBody, LogStreamHttpSink +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.log_streams.create( request=CreateLogStreamHttpRequestBody( type="http", @@ -8351,7 +8504,7 @@ client.log_streams.create(
-
client.log_streams.get(...) -> AsyncHttpResponse[GetLogStreamResponseContent] +
client.log_streams.get(...) -> GetLogStreamResponseContent
@@ -8479,11 +8632,14 @@ Retrieve a log stream configuration and status.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.log_streams.get( id="id", ) @@ -8522,7 +8678,7 @@ client.log_streams.get(
-
client.log_streams.delete(...) -> AsyncHttpResponse[None] +
client.log_streams.delete(...)
@@ -8549,11 +8705,14 @@ Delete a log stream.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.log_streams.delete( id="id", ) @@ -8592,7 +8751,7 @@ client.log_streams.delete(
-
client.log_streams.update(...) -> AsyncHttpResponse[UpdateLogStreamResponseContent] +
client.log_streams.update(...) -> UpdateLogStreamResponseContent
@@ -8653,11 +8812,14 @@ Update a log stream.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.log_streams.update( id="id", ) @@ -8708,7 +8870,7 @@ client.log_streams.update(
-**filters:** `typing.Optional[typing.Sequence[LogStreamFilter]]` — Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. +**filters:** `typing.Optional[typing.List[LogStreamFilter]]` — Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered.
@@ -8745,7 +8907,7 @@ client.log_streams.update(
## Logs -
client.logs.list(...) -> AsyncPager[Log, ListLogOffsetPaginatedResponseContent] +
client.logs.list(...) -> ListLogOffsetPaginatedResponseContent
@@ -8800,12 +8962,15 @@ Auth0 @@ -8906,7 +9066,7 @@ Values specified without quotes are matched using a case insensitive 'starts wit
-
client.logs.get(...) -> AsyncHttpResponse[GetLogResponseContent] +
client.logs.get(...) -> GetLogResponseContent
@@ -8933,11 +9093,14 @@ Retrieve an individual log event.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.logs.get( id="id", ) @@ -8977,9 +9140,7 @@ client.logs.get(
## NetworkAcls -
client.network_acls.list(...) -> AsyncPager[ - NetworkAclsResponseContent, ListNetworkAclsOffsetPaginatedResponseContent -] +
client.network_acls.list(...) -> ListNetworkAclsOffsetPaginatedResponseContent
@@ -9006,21 +9167,19 @@ Get all access control list entries for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.network_acls.list( + +client.network_acls.list( page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -9072,7 +9231,7 @@ for page in response.iter_pages():
-
client.network_acls.create(...) -> AsyncHttpResponse[None] +
client.network_acls.create(...)
@@ -9099,11 +9258,14 @@ Create a new access control list for your client.
```python -from auth0 import Auth0, NetworkAclAction, NetworkAclRule +from auth0.management import Auth0, NetworkAclRule, NetworkAclAction +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.network_acls.create( description="description", active=True, @@ -9171,7 +9333,7 @@ client.network_acls.create(
-
client.network_acls.get(...) -> AsyncHttpResponse[GetNetworkAclsResponseContent] +
client.network_acls.get(...) -> GetNetworkAclsResponseContent
@@ -9198,11 +9360,14 @@ Get a specific access control list entry for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.network_acls.get( id="id", ) @@ -9241,7 +9406,7 @@ client.network_acls.get(
-
client.network_acls.set(...) -> AsyncHttpResponse[SetNetworkAclsResponseContent] +
client.network_acls.set(...) -> SetNetworkAclsResponseContent
@@ -9268,11 +9433,14 @@ Update existing access control list for your client.
```python -from auth0 import Auth0, NetworkAclAction, NetworkAclRule +from auth0.management import Auth0, NetworkAclRule, NetworkAclAction +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.network_acls.set( id="id", description="description", @@ -9349,7 +9517,7 @@ client.network_acls.set(
-
client.network_acls.delete(...) -> AsyncHttpResponse[None] +
client.network_acls.delete(...)
@@ -9376,11 +9544,14 @@ Delete existing access control list for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.network_acls.delete( id="id", ) @@ -9419,7 +9590,7 @@ client.network_acls.delete(
-
client.network_acls.update(...) -> AsyncHttpResponse[UpdateNetworkAclResponseContent] +
client.network_acls.update(...) -> UpdateNetworkAclResponseContent
@@ -9446,11 +9617,14 @@ Update existing access control list for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.network_acls.update( id="id", ) @@ -9522,7 +9696,7 @@ client.network_acls.update(
## Organizations -
client.organizations.list(...) -> AsyncPager[Organization, ListOrganizationsPaginatedResponseContent] +
client.organizations.list(...) -> ListOrganizationsPaginatedResponseContent
@@ -9567,21 +9741,19 @@ To search by checkpoint, use the following parameters:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.list( + +client.organizations.list( from_="from", take=1, sort="sort", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -9597,7 +9769,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -9633,7 +9805,7 @@ for page in response.iter_pages():
-
client.organizations.create(...) -> AsyncHttpResponse[CreateOrganizationResponseContent] +
client.organizations.create(...) -> CreateOrganizationResponseContent
@@ -9660,11 +9832,14 @@ Create a new Organization within your tenant. To learn more about Organization
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.create( name="name", ) @@ -9715,7 +9890,7 @@ client.organizations.create(
-**enabled_connections:** `typing.Optional[typing.Sequence[ConnectionForOrganization]]` — Connections that will be enabled for this organization. See POST enabled_connections endpoint for the object format. (Max of 10 connections allowed) +**enabled_connections:** `typing.Optional[typing.List[ConnectionForOrganization]]` — Connections that will be enabled for this organization. See POST enabled_connections endpoint for the object format. (Max of 10 connections allowed)
@@ -9743,7 +9918,7 @@ client.organizations.create(
-
client.organizations.get_by_name(...) -> AsyncHttpResponse[GetOrganizationByNameResponseContent] +
client.organizations.get_by_name(...) -> GetOrganizationByNameResponseContent
@@ -9770,11 +9945,14 @@ Retrieve details about a single Organization specified by name.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.get_by_name( name="name", ) @@ -9813,7 +9991,7 @@ client.organizations.get_by_name(
-
client.organizations.get(...) -> AsyncHttpResponse[GetOrganizationResponseContent] +
client.organizations.get(...) -> GetOrganizationResponseContent
@@ -9840,11 +10018,14 @@ Retrieve details about a single Organization specified by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.get( id="id", ) @@ -9883,7 +10064,7 @@ client.organizations.get(
-
client.organizations.delete(...) -> AsyncHttpResponse[None] +
client.organizations.delete(...)
@@ -9912,11 +10093,14 @@ Remove an Organization from your tenant. This action cannot be undone.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.delete( id="id", ) @@ -9955,7 +10139,7 @@ client.organizations.delete(
-
client.organizations.update(...) -> AsyncHttpResponse[UpdateOrganizationResponseContent] +
client.organizations.update(...) -> UpdateOrganizationResponseContent
@@ -9982,11 +10166,14 @@ Update the details of a specific ## Prompts -
client.prompts.get_settings() -> AsyncHttpResponse[GetSettingsResponseContent] +
client.prompts.get_settings() -> GetSettingsResponseContent
@@ -10093,11 +10280,14 @@ Retrieve details of the Universal Login configuration of your tenant. This inclu
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.get_settings() ``` @@ -10126,7 +10316,7 @@ client.prompts.get_settings()
-
client.prompts.update_settings(...) -> AsyncHttpResponse[UpdateSettingsResponseContent] +
client.prompts.update_settings(...) -> UpdateSettingsResponseContent
@@ -10153,11 +10343,14 @@ Update the Universal Login configuration of your tenant. This includes the ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.update_settings() ``` @@ -10211,9 +10404,7 @@ client.prompts.update_settings()
## RefreshTokens -
client.refresh_tokens.list(...) -> AsyncPager[ - RefreshTokenResponseContent, GetRefreshTokensPaginatedResponseContent -] +
client.refresh_tokens.list(...) -> GetRefreshTokensPaginatedResponseContent
@@ -10240,12 +10431,15 @@ Retrieve a paginated list of refresh tokens for a specific user, with optional f
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.refresh_tokens.list( + +client.refresh_tokens.list( user_id="user_id", client_id="client_id", from_="from", @@ -10253,11 +10447,6 @@ response = client.refresh_tokens.list( fields="fields", include_fields=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -10289,7 +10478,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — An opaque cursor from which to start the selection (exclusive). Expires after 24 hours. Obtained from the next property of a previous response. +**from:** `typing.Optional[str]` — An opaque cursor from which to start the selection (exclusive). Expires after 24 hours. Obtained from the next property of a previous response.
@@ -10333,7 +10522,7 @@ for page in response.iter_pages():
-
client.refresh_tokens.get(...) -> AsyncHttpResponse[GetRefreshTokenResponseContent] +
client.refresh_tokens.get(...) -> GetRefreshTokenResponseContent
@@ -10360,11 +10549,14 @@ Retrieve refresh token information.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.refresh_tokens.get( id="id", ) @@ -10403,7 +10595,7 @@ client.refresh_tokens.get(
-
client.refresh_tokens.delete(...) -> AsyncHttpResponse[None] +
client.refresh_tokens.delete(...)
@@ -10430,11 +10622,14 @@ Delete a refresh token by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.refresh_tokens.delete( id="id", ) @@ -10473,7 +10668,7 @@ client.refresh_tokens.delete(
-
client.refresh_tokens.update(...) -> AsyncHttpResponse[UpdateRefreshTokenResponseContent] +
client.refresh_tokens.update(...) -> UpdateRefreshTokenResponseContent
@@ -10500,11 +10695,14 @@ Update a refresh token by its ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.refresh_tokens.update( id="id", ) @@ -10552,7 +10750,7 @@ client.refresh_tokens.update(
## ResourceServers -
client.resource_servers.list(...) -> AsyncPager[ResourceServer, ListResourceServerOffsetPaginatedResponseContent] +
client.resource_servers.list(...) -> ListResourceServerOffsetPaginatedResponseContent
@@ -10579,22 +10777,20 @@ Retrieve details of all APIs associated with your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.resource_servers.list( + +client.resource_servers.list( page=1, per_page=1, include_totals=True, include_fields=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -10610,7 +10806,7 @@ for page in response.iter_pages():
-**identifiers:** `typing.Optional[typing.Union[str, typing.Sequence[str]]]` — An optional filter on the resource server identifier. Must be URL encoded and may be specified multiple times (max 10).
e.g. ../resource-servers?identifiers=id1&identifiers=id2 +**identifiers:** `typing.Optional[typing.Union[typing.Optional[str], typing.Sequence[typing.Optional[str]]]]` — An optional filter on the resource server identifier. Must be URL encoded and may be specified multiple times (max 10).
e.g. ../resource-servers?identifiers=id1&identifiers=id2
@@ -10662,7 +10858,7 @@ for page in response.iter_pages():
-
client.resource_servers.create(...) -> AsyncHttpResponse[CreateResourceServerResponseContent] +
client.resource_servers.create(...) -> CreateResourceServerResponseContent
@@ -10689,11 +10885,14 @@ Create a new API associated with your tenant. Note that all new APIs must be reg
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.resource_servers.create( identifier="identifier", ) @@ -10728,7 +10927,7 @@ client.resource_servers.create(
-**scopes:** `typing.Optional[typing.Sequence[ResourceServerScope]]` — List of permissions (scopes) that this API uses. +**scopes:** `typing.Optional[typing.List[ResourceServerScope]]` — List of permissions (scopes) that this API uses.
@@ -10816,7 +11015,7 @@ client.resource_servers.create(
-**authorization_details:** `typing.Optional[typing.Sequence[typing.Any]]` +**authorization_details:** `typing.Optional[typing.List[typing.Any]]`
@@ -10852,7 +11051,7 @@ client.resource_servers.create(
-
client.resource_servers.get(...) -> AsyncHttpResponse[GetResourceServerResponseContent] +
client.resource_servers.get(...) -> GetResourceServerResponseContent
@@ -10879,11 +11078,14 @@ Retrieve API details with the given ID
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.resource_servers.get( id="id", include_fields=True, @@ -10931,7 +11133,7 @@ client.resource_servers.get(
-
client.resource_servers.delete(...) -> AsyncHttpResponse[None] +
client.resource_servers.delete(...)
@@ -10958,11 +11160,14 @@ Delete an existing API by ID. For more information, read
-
client.resource_servers.update(...) -> AsyncHttpResponse[UpdateResourceServerResponseContent] +
client.resource_servers.update(...) -> UpdateResourceServerResponseContent
@@ -11028,11 +11233,14 @@ Change an existing API setting by resource server ID. For more information, read
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.resource_servers.update( id="id", ) @@ -11067,7 +11275,7 @@ client.resource_servers.update(
-**scopes:** `typing.Optional[typing.Sequence[ResourceServerScope]]` — List of permissions (scopes) that this API uses. +**scopes:** `typing.Optional[typing.List[ResourceServerScope]]` — List of permissions (scopes) that this API uses.
@@ -11155,7 +11363,7 @@ client.resource_servers.update(
-**authorization_details:** `typing.Optional[typing.Sequence[typing.Any]]` +**authorization_details:** `typing.Optional[typing.List[typing.Any]]`
@@ -11192,7 +11400,7 @@ client.resource_servers.update(
## Roles -
client.roles.list(...) -> AsyncPager[Role, ListRolesOffsetPaginatedResponseContent] +
client.roles.list(...) -> ListRolesOffsetPaginatedResponseContent
@@ -11221,22 +11429,20 @@ Retrieve detailed list of user roles created in your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.roles.list( + +client.roles.list( per_page=1, page=1, include_totals=True, name_filter="name_filter", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -11296,7 +11502,7 @@ for page in response.iter_pages():
-
client.roles.create(...) -> AsyncHttpResponse[CreateRoleResponseContent] +
client.roles.create(...) -> CreateRoleResponseContent
@@ -11325,11 +11531,14 @@ Create a user role for
-
client.roles.get(...) -> AsyncHttpResponse[GetRoleResponseContent] +
client.roles.get(...) -> GetRoleResponseContent
@@ -11403,11 +11612,14 @@ Retrieve details about a specific
-
client.roles.delete(...) -> AsyncHttpResponse[None] +
client.roles.delete(...)
@@ -11473,11 +11685,14 @@ Delete a specific
-
client.roles.update(...) -> AsyncHttpResponse[UpdateRoleResponseContent] +
client.roles.update(...) -> UpdateRoleResponseContent
@@ -11543,11 +11758,14 @@ Modify the details of a specific ## Rules -
client.rules.list(...) -> AsyncPager[Rule, ListRulesOffsetPaginatedResponseContent] +
client.rules.list(...) -> ListRulesOffsetPaginatedResponseContent
@@ -11630,12 +11848,15 @@ Retrieve a filtered list of rules. Ac
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.rules.list( + +client.rules.list( page=1, per_page=1, include_totals=True, @@ -11643,11 +11864,6 @@ response = client.rules.list( fields="fields", include_fields=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -11723,7 +11939,7 @@ for page in response.iter_pages():
-
client.rules.create(...) -> AsyncHttpResponse[CreateRuleResponseContent] +
client.rules.create(...) -> CreateRuleResponseContent
@@ -11752,11 +11968,14 @@ Note: Changing a rule's stage of execution from the default login_success<
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules.create( name="name", script="script", @@ -11820,7 +12039,7 @@ client.rules.create(
-
client.rules.get(...) -> AsyncHttpResponse[GetRuleResponseContent] +
client.rules.get(...) -> GetRuleResponseContent
@@ -11847,11 +12066,14 @@ Retrieve rule details. Accepts a list
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules.get( id="id", fields="fields", @@ -11908,7 +12130,7 @@ client.rules.get(
-
client.rules.delete(...) -> AsyncHttpResponse[None] +
client.rules.delete(...)
@@ -11935,11 +12157,14 @@ Delete a rule.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules.delete( id="id", ) @@ -11978,7 +12203,7 @@ client.rules.delete(
-
client.rules.update(...) -> AsyncHttpResponse[UpdateRuleResponseContent] +
client.rules.update(...) -> UpdateRuleResponseContent
@@ -12005,11 +12230,14 @@ Update an existing rule.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules.update( id="id", ) @@ -12081,7 +12309,7 @@ client.rules.update(
## RulesConfigs -
client.rules_configs.list() -> AsyncHttpResponse[typing.List[RulesConfig]] +
client.rules_configs.list() -> typing.List[RulesConfig]
@@ -12110,11 +12338,14 @@ Retrieve rules config variable keys.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules_configs.list() ``` @@ -12143,7 +12374,7 @@ client.rules_configs.list()
-
client.rules_configs.set(...) -> AsyncHttpResponse[SetRulesConfigResponseContent] +
client.rules_configs.set(...) -> SetRulesConfigResponseContent
@@ -12170,11 +12401,14 @@ Sets a rules config variable.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules_configs.set( key="key", value="value", @@ -12222,7 +12456,7 @@ client.rules_configs.set(
-
client.rules_configs.delete(...) -> AsyncHttpResponse[None] +
client.rules_configs.delete(...)
@@ -12249,11 +12483,14 @@ Delete a rules config variable identified by its key.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.rules_configs.delete( key="key", ) @@ -12293,7 +12530,7 @@ client.rules_configs.delete(
## SelfServiceProfiles -
client.self_service_profiles.list(...) -> AsyncPager[SelfServiceProfile, ListSelfServiceProfilesPaginatedResponseContent] +
client.self_service_profiles.list(...) -> ListSelfServiceProfilesPaginatedResponseContent
@@ -12320,21 +12557,19 @@ Retrieves self-service profiles.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.self_service_profiles.list( + +client.self_service_profiles.list( page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -12386,7 +12621,7 @@ for page in response.iter_pages():
-
client.self_service_profiles.create(...) -> AsyncHttpResponse[CreateSelfServiceProfileResponseContent] +
client.self_service_profiles.create(...) -> CreateSelfServiceProfileResponseContent
@@ -12413,11 +12648,14 @@ Creates a self-service profile.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.create( name="name", ) @@ -12460,7 +12698,7 @@ client.self_service_profiles.create(
-**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] +**allowed_strategies:** `typing.Optional[typing.List[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`]
@@ -12468,7 +12706,7 @@ client.self_service_profiles.create(
-**user_attributes:** `typing.Optional[typing.Sequence[SelfServiceProfileUserAttribute]]` — List of attributes to be mapped that will be shown to the user during the SS-SSO flow. +**user_attributes:** `typing.Optional[typing.List[SelfServiceProfileUserAttribute]]` — List of attributes to be mapped that will be shown to the user during the SS-SSO flow.
@@ -12496,7 +12734,7 @@ client.self_service_profiles.create(
-
client.self_service_profiles.get(...) -> AsyncHttpResponse[GetSelfServiceProfileResponseContent] +
client.self_service_profiles.get(...) -> GetSelfServiceProfileResponseContent
@@ -12523,11 +12761,14 @@ Retrieves a self-service profile by Id.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.get( id="id", ) @@ -12566,7 +12807,7 @@ client.self_service_profiles.get(
-
client.self_service_profiles.delete(...) -> AsyncHttpResponse[None] +
client.self_service_profiles.delete(...)
@@ -12593,11 +12834,14 @@ Deletes a self-service profile by Id.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.delete( id="id", ) @@ -12636,7 +12880,7 @@ client.self_service_profiles.delete(
-
client.self_service_profiles.update(...) -> AsyncHttpResponse[UpdateSelfServiceProfileResponseContent] +
client.self_service_profiles.update(...) -> UpdateSelfServiceProfileResponseContent
@@ -12663,11 +12907,14 @@ Updates a self-service profile.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.update( id="id", ) @@ -12718,7 +12965,7 @@ client.self_service_profiles.update(
-**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] +**allowed_strategies:** `typing.Optional[typing.List[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`]
@@ -12755,7 +13002,7 @@ client.self_service_profiles.update(
## Sessions -
client.sessions.get(...) -> AsyncHttpResponse[GetSessionResponseContent] +
client.sessions.get(...) -> GetSessionResponseContent
@@ -12782,11 +13029,14 @@ Retrieve session information.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.sessions.get( id="id", ) @@ -12825,7 +13075,7 @@ client.sessions.get(
-
client.sessions.delete(...) -> AsyncHttpResponse[None] +
client.sessions.delete(...)
@@ -12852,11 +13102,14 @@ Delete a session by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.sessions.delete( id="id", ) @@ -12895,7 +13148,7 @@ client.sessions.delete(
-
client.sessions.update(...) -> AsyncHttpResponse[UpdateSessionResponseContent] +
client.sessions.update(...) -> UpdateSessionResponseContent
@@ -12922,11 +13175,14 @@ Update session information.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.sessions.update( id="id", ) @@ -12973,7 +13229,7 @@ client.sessions.update(
-
client.sessions.revoke(...) -> AsyncHttpResponse[None] +
client.sessions.revoke(...)
@@ -13000,11 +13256,14 @@ Revokes a session by ID and all associated refresh tokens.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.sessions.revoke( id="id", ) @@ -13044,7 +13303,7 @@ client.sessions.revoke(
## Stats -
client.stats.get_active_users_count() -> AsyncHttpResponse[GetActiveUsersCountStatsResponseContent] +
client.stats.get_active_users_count() -> GetActiveUsersCountStatsResponseContent
@@ -13071,11 +13330,14 @@ Retrieve the number of active users that logged in during the last 30 days.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.stats.get_active_users_count() ``` @@ -13104,7 +13366,7 @@ client.stats.get_active_users_count()
-
client.stats.get_daily(...) -> AsyncHttpResponse[typing.List[DailyStats]] +
client.stats.get_daily(...) -> typing.List[DailyStats]
@@ -13131,11 +13393,14 @@ Retrieve the number of logins, signups and breached-password detections (subscri
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.stats.get_daily( from_="from", to="to", @@ -13155,7 +13420,7 @@ client.stats.get_daily(
-**from_:** `typing.Optional[str]` — Optional first day of the date range (inclusive) in YYYYMMDD format. +**from:** `typing.Optional[str]` — Optional first day of the date range (inclusive) in YYYYMMDD format.
@@ -13184,7 +13449,7 @@ client.stats.get_daily(
## SupplementalSignals -
client.supplemental_signals.get() -> AsyncHttpResponse[GetSupplementalSignalsResponseContent] +
client.supplemental_signals.get() -> GetSupplementalSignalsResponseContent
@@ -13211,11 +13476,14 @@ Get the supplemental signals configuration for a tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.supplemental_signals.get() ``` @@ -13244,7 +13512,7 @@ client.supplemental_signals.get()
-
client.supplemental_signals.patch(...) -> AsyncHttpResponse[PatchSupplementalSignalsResponseContent] +
client.supplemental_signals.patch(...) -> PatchSupplementalSignalsResponseContent
@@ -13271,11 +13539,14 @@ Update the supplemental signals configuration for a tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.supplemental_signals.patch( akamai_enabled=True, ) @@ -13315,7 +13586,7 @@ client.supplemental_signals.patch(
## Tickets -
client.tickets.verify_email(...) -> AsyncHttpResponse[VerifyEmailTicketResponseContent] +
client.tickets.verify_email(...) -> VerifyEmailTicketResponseContent
@@ -13342,11 +13613,14 @@ Create an email verification ticket for a given user. An email verification tick
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.tickets.verify_email( user_id="user_id", ) @@ -13433,7 +13707,7 @@ client.tickets.verify_email(
-
client.tickets.change_password(...) -> AsyncHttpResponse[ChangePasswordTicketResponseContent] +
client.tickets.change_password(...) -> ChangePasswordTicketResponseContent
@@ -13462,11 +13736,14 @@ Note: This endpoint does not verify the given user’s identity. If you call thi
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.tickets.change_password() ``` @@ -13576,9 +13853,7 @@ client.tickets.change_password()
## TokenExchangeProfiles -
client.token_exchange_profiles.list(...) -> AsyncPager[ - TokenExchangeProfileResponseContent, ListTokenExchangeProfileResponseContent -] +
client.token_exchange_profiles.list(...) -> ListTokenExchangeProfileResponseContent
@@ -13615,20 +13890,18 @@ This endpoint supports Checkpoint pagination. To search by checkpoint, use the f
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.token_exchange_profiles.list( + +client.token_exchange_profiles.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -13644,7 +13917,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -13672,7 +13945,7 @@ for page in response.iter_pages():
-
client.token_exchange_profiles.create(...) -> AsyncHttpResponse[CreateTokenExchangeProfileResponseContent] +
client.token_exchange_profiles.create(...) -> CreateTokenExchangeProfileResponseContent
@@ -13701,11 +13974,14 @@ By using this feature, you agree to the applicable Free Trial terms in
-
client.token_exchange_profiles.get(...) -> AsyncHttpResponse[GetTokenExchangeProfileResponseContent] +
client.token_exchange_profiles.get(...) -> GetTokenExchangeProfileResponseContent
@@ -13800,11 +14076,14 @@ By using this feature, you agree to the applicable Free Trial terms in
-
client.token_exchange_profiles.delete(...) -> AsyncHttpResponse[None] +
client.token_exchange_profiles.delete(...)
@@ -13873,11 +14152,14 @@ By using this feature, you agree to the applicable Free Trial terms in
-
client.token_exchange_profiles.update(...) -> AsyncHttpResponse[None] +
client.token_exchange_profiles.update(...)
@@ -13946,11 +14228,14 @@ By using this feature, you agree to the applicable Free Trial terms in ## UserAttributeProfiles -
client.user_attribute_profiles.list(...) -> AsyncPager[ - UserAttributeProfile, ListUserAttributeProfilesPaginatedResponseContent -] +
client.user_attribute_profiles.list(...) -> ListUserAttributeProfilesPaginatedResponseContent
@@ -14035,20 +14318,18 @@ Retrieve a list of User Attribute Profiles. This endpoint supports Checkpoint pa
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.user_attribute_profiles.list( + +client.user_attribute_profiles.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -14064,7 +14345,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -14092,7 +14373,7 @@ for page in response.iter_pages():
-
client.user_attribute_profiles.create(...) -> AsyncHttpResponse[CreateUserAttributeProfileResponseContent] +
client.user_attribute_profiles.create(...) -> CreateUserAttributeProfileResponseContent
@@ -14119,11 +14400,14 @@ Retrieve details about a single User Attribute Profile specified by ID.
```python -from auth0 import Auth0, UserAttributeProfileUserAttributeAdditionalProperties +from auth0.management import Auth0, UserAttributeProfileUserAttributeAdditionalProperties +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.create( name="name", user_attributes={ @@ -14186,7 +14470,7 @@ client.user_attribute_profiles.create(
-
client.user_attribute_profiles.list_templates() -> AsyncHttpResponse[ListUserAttributeProfileTemplateResponseContent] +
client.user_attribute_profiles.list_templates() -> ListUserAttributeProfileTemplateResponseContent
@@ -14213,11 +14497,14 @@ Retrieve a list of User Attribute Profile Templates.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.list_templates() ``` @@ -14246,7 +14533,7 @@ client.user_attribute_profiles.list_templates()
-
client.user_attribute_profiles.get_template(...) -> AsyncHttpResponse[GetUserAttributeProfileTemplateResponseContent] +
client.user_attribute_profiles.get_template(...) -> GetUserAttributeProfileTemplateResponseContent
@@ -14273,11 +14560,14 @@ Retrieve a User Attribute Profile Template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.get_template( id="id", ) @@ -14316,7 +14606,7 @@ client.user_attribute_profiles.get_template(
-
client.user_attribute_profiles.get(...) -> AsyncHttpResponse[GetUserAttributeProfileResponseContent] +
client.user_attribute_profiles.get(...) -> GetUserAttributeProfileResponseContent
@@ -14343,11 +14633,14 @@ Retrieve details about a single User Attribute Profile specified by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.get( id="id", ) @@ -14386,7 +14679,7 @@ client.user_attribute_profiles.get(
-
client.user_attribute_profiles.delete(...) -> AsyncHttpResponse[None] +
client.user_attribute_profiles.delete(...)
@@ -14413,11 +14706,14 @@ Delete a single User Attribute Profile specified by ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.delete( id="id", ) @@ -14456,7 +14752,7 @@ client.user_attribute_profiles.delete(
-
client.user_attribute_profiles.update(...) -> AsyncHttpResponse[UpdateUserAttributeProfileResponseContent] +
client.user_attribute_profiles.update(...) -> UpdateUserAttributeProfileResponseContent
@@ -14483,11 +14779,14 @@ Update the details of a specific User attribute profile, such as name, user_id a
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.user_attribute_profiles.update( id="id", ) @@ -14551,7 +14850,7 @@ client.user_attribute_profiles.update(
## UserBlocks -
client.user_blocks.list_by_identifier(...) -> AsyncHttpResponse[ListUserBlocksByIdentifierResponseContent] +
client.user_blocks.list_by_identifier(...) -> ListUserBlocksByIdentifierResponseContent
@@ -14578,11 +14877,14 @@ Retrieve details of all
-
client.user_blocks.delete_by_identifier(...) -> AsyncHttpResponse[None] +
client.user_blocks.delete_by_identifier(...)
@@ -14664,11 +14966,14 @@ Note: This endpoint does not unblock users that were
-
client.user_blocks.list(...) -> AsyncHttpResponse[ListUserBlocksResponseContent] +
client.user_blocks.list(...) -> ListUserBlocksResponseContent
@@ -14734,11 +15039,14 @@ Retrieve details of all
-
client.user_blocks.delete(...) -> AsyncHttpResponse[None] +
client.user_blocks.delete(...)
@@ -14820,11 +15128,14 @@ Note: This endpoint does not unblock users that were ## Users -
client.users.list(...) -> AsyncPager[UserResponseSchema, ListUsersOffsetPaginatedResponseContent] +
client.users.list(...) -> ListUsersOffsetPaginatedResponseContent
@@ -14904,12 +15215,15 @@ Auth0 limits the number of users you can return. If you exceed this threshold, p
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.list( + +client.users.list( page=1, per_page=1, include_totals=True, @@ -14921,11 +15235,6 @@ response = client.users.list( search_engine="v1", primary_order=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -15033,7 +15342,7 @@ for page in response.iter_pages():
-
client.users.create(...) -> AsyncHttpResponse[CreateUserResponseContent] +
client.users.create(...) -> CreateUserResponseContent
@@ -15062,11 +15371,14 @@ Note: connection is required but other parameters such as ema
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.create( connection="connection", ) @@ -15233,7 +15545,7 @@ client.users.create(
-
client.users.list_users_by_email(...) -> AsyncHttpResponse[typing.List[UserResponseSchema]] +
client.users.list_users_by_email(...) -> typing.List[UserResponseSchema]
@@ -15264,11 +15576,14 @@ Therefore, when using this endpoint, make sure that you are searching for users
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.list_users_by_email( fields="fields", include_fields=True, @@ -15325,7 +15640,7 @@ client.users.list_users_by_email(
-
client.users.get(...) -> AsyncHttpResponse[GetUserResponseContent] +
client.users.get(...) -> GetUserResponseContent
@@ -15352,11 +15667,14 @@ Retrieve user details. A list of fields to include or exclude may also be specif
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.get( id="id", fields="fields", @@ -15413,7 +15731,7 @@ client.users.get(
-
client.users.delete(...) -> AsyncHttpResponse[None] +
client.users.delete(...)
@@ -15440,11 +15758,14 @@ Delete a user by user ID. This action cannot be undone. For Auth0 Dashboard inst
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.delete( id="id", ) @@ -15483,7 +15804,7 @@ client.users.delete(
-
client.users.update(...) -> AsyncHttpResponse[UpdateUserResponseContent] +
client.users.update(...) -> UpdateUserResponseContent
@@ -15579,11 +15900,14 @@ The modified object ends up with the following user_metadata proper
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.update( id="id", ) @@ -15766,7 +16090,7 @@ client.users.update(
-
client.users.regenerate_recovery_code(...) -> AsyncHttpResponse[RegenerateUsersRecoveryCodeResponseContent] +
client.users.regenerate_recovery_code(...) -> RegenerateUsersRecoveryCodeResponseContent
@@ -15793,11 +16117,14 @@ Remove an existing multi-factor authentication (MFA)
-
client.users.revoke_access(...) -> AsyncHttpResponse[None] +
client.users.revoke_access(...)
@@ -15863,11 +16190,14 @@ Revokes selected resources related to a user (sessions, refresh tokens, ...).
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.revoke_access( id="id", ) @@ -15923,7 +16253,7 @@ client.users.revoke_access(
## Actions Versions -
client.actions.versions.list(...) -> AsyncPager[ActionVersion, ListActionVersionsPaginatedResponseContent] +
client.actions.versions.list(...) -> ListActionVersionsPaginatedResponseContent
@@ -15950,21 +16280,19 @@ Retrieve all of an action's versions. An action version is created whenever an a
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.versions.list( + +client.actions.versions.list( action_id="actionId", page=1, per_page=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -16016,7 +16344,7 @@ for page in response.iter_pages():
-
client.actions.versions.get(...) -> AsyncHttpResponse[GetActionVersionResponseContent] +
client.actions.versions.get(...) -> GetActionVersionResponseContent
@@ -16043,11 +16371,14 @@ Retrieve a specific version of an action. An action version is created whenever
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.versions.get( action_id="actionId", id="id", @@ -16095,7 +16426,7 @@ client.actions.versions.get(
-
client.actions.versions.deploy(...) -> AsyncHttpResponse[DeployActionVersionResponseContent] +
client.actions.versions.deploy(...) -> DeployActionVersionResponseContent
@@ -16122,11 +16453,14 @@ Performs the equivalent of a roll-back of an action to an earlier, specified ver
```python -from auth0 import Auth0, DeployActionVersionRequestContent +from auth0.management import Auth0, DeployActionVersionRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.versions.deploy( action_id="actionId", id="id", @@ -16184,7 +16518,7 @@ client.actions.versions.deploy(
## Actions Executions -
client.actions.executions.get(...) -> AsyncHttpResponse[GetActionExecutionResponseContent] +
client.actions.executions.get(...) -> GetActionExecutionResponseContent
@@ -16211,11 +16545,14 @@ Retrieve information about a specific execution of a trigger. Relevant execution
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.executions.get( id="id", ) @@ -16255,7 +16592,7 @@ client.actions.executions.get(
## Actions Modules -
client.actions.modules.list(...) -> AsyncPager[ActionModuleListItem, GetActionModulesResponseContent] +
client.actions.modules.list(...) -> GetActionModulesResponseContent
@@ -16282,20 +16619,18 @@ Retrieve a paginated list of all Actions Modules with optional filtering and tot
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.modules.list( + +client.actions.modules.list( page=1, per_page=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -16339,7 +16674,7 @@ for page in response.iter_pages():
-
client.actions.modules.create(...) -> AsyncHttpResponse[CreateActionModuleResponseContent] +
client.actions.modules.create(...) -> CreateActionModuleResponseContent
@@ -16366,11 +16701,14 @@ Create a new Actions Module for reusable code across actions.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.create( name="name", code="code", @@ -16406,7 +16744,7 @@ client.actions.modules.create(
-**secrets:** `typing.Optional[typing.Sequence[ActionModuleSecretRequest]]` — The secrets to associate with the action module. +**secrets:** `typing.Optional[typing.List[ActionModuleSecretRequest]]` — The secrets to associate with the action module.
@@ -16414,7 +16752,7 @@ client.actions.modules.create(
-**dependencies:** `typing.Optional[typing.Sequence[ActionModuleDependencyRequest]]` — The npm dependencies of the action module. +**dependencies:** `typing.Optional[typing.List[ActionModuleDependencyRequest]]` — The npm dependencies of the action module.
@@ -16450,7 +16788,7 @@ client.actions.modules.create(
-
client.actions.modules.get(...) -> AsyncHttpResponse[GetActionModuleResponseContent] +
client.actions.modules.get(...) -> GetActionModuleResponseContent
@@ -16477,11 +16815,14 @@ Retrieve details of a specific Actions Module by its unique identifier.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.get( id="id", ) @@ -16520,7 +16861,7 @@ client.actions.modules.get(
-
client.actions.modules.delete(...) -> AsyncHttpResponse[None] +
client.actions.modules.delete(...)
@@ -16547,11 +16888,14 @@ Permanently delete an Actions Module. This will fail if the module is still in u
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.delete( id="id", ) @@ -16590,7 +16934,7 @@ client.actions.modules.delete(
-
client.actions.modules.update(...) -> AsyncHttpResponse[UpdateActionModuleResponseContent] +
client.actions.modules.update(...) -> UpdateActionModuleResponseContent
@@ -16617,11 +16961,14 @@ Update properties of an existing Actions Module, such as code, dependencies, or
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.update( id="id", ) @@ -16656,7 +17003,7 @@ client.actions.modules.update(
-**secrets:** `typing.Optional[typing.Sequence[ActionModuleSecretRequest]]` — The secrets to associate with the action module. +**secrets:** `typing.Optional[typing.List[ActionModuleSecretRequest]]` — The secrets to associate with the action module.
@@ -16664,7 +17011,7 @@ client.actions.modules.update(
-**dependencies:** `typing.Optional[typing.Sequence[ActionModuleDependencyRequest]]` — The npm dependencies of the action module. +**dependencies:** `typing.Optional[typing.List[ActionModuleDependencyRequest]]` — The npm dependencies of the action module.
@@ -16684,7 +17031,7 @@ client.actions.modules.update(
-
client.actions.modules.list_actions(...) -> AsyncPager[ActionModuleAction, GetActionModuleActionsResponseContent] +
client.actions.modules.list_actions(...) -> GetActionModuleActionsResponseContent
@@ -16711,21 +17058,19 @@ Lists all actions that are using a specific Actions Module, showing which deploy
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.modules.list_actions( + +client.actions.modules.list_actions( id="id", page=1, per_page=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -16777,7 +17122,7 @@ for page in response.iter_pages():
-
client.actions.modules.rollback(...) -> AsyncHttpResponse[RollbackActionModuleResponseContent] +
client.actions.modules.rollback(...) -> RollbackActionModuleResponseContent
@@ -16804,11 +17149,14 @@ Rolls back an Actions Module's draft to a previously created version. This actio
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.rollback( id="id", module_version_id="module_version_id", @@ -16857,7 +17205,7 @@ client.actions.modules.rollback(
## Actions Triggers -
client.actions.triggers.list() -> AsyncHttpResponse[ListActionTriggersResponseContent] +
client.actions.triggers.list() -> ListActionTriggersResponseContent
@@ -16884,11 +17232,14 @@ Retrieve the set of triggers currently available within actions. A trigger is an
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.triggers.list() ``` @@ -16918,7 +17269,7 @@ client.actions.triggers.list()
## Actions Modules Versions -
client.actions.modules.versions.list(...) -> AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent] +
client.actions.modules.versions.list(...) -> GetActionModuleVersionsResponseContent
@@ -16945,21 +17296,19 @@ List all published versions of a specific Actions Module.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.modules.versions.list( + +client.actions.modules.versions.list( id="id", page=1, per_page=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -17011,7 +17360,7 @@ for page in response.iter_pages():
-
client.actions.modules.versions.create(...) -> AsyncHttpResponse[CreateActionModuleVersionResponseContent] +
client.actions.modules.versions.create(...) -> CreateActionModuleVersionResponseContent
@@ -17038,11 +17387,14 @@ Creates a new immutable version of an Actions Module from the current draft vers
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.versions.create( id="id", ) @@ -17081,7 +17433,7 @@ client.actions.modules.versions.create(
-
client.actions.modules.versions.get(...) -> AsyncHttpResponse[GetActionModuleVersionResponseContent] +
client.actions.modules.versions.get(...) -> GetActionModuleVersionResponseContent
@@ -17108,11 +17460,14 @@ Retrieve the details of a specific, immutable version of an Actions Module.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.modules.versions.get( id="id", version_id="versionId", @@ -17161,7 +17516,7 @@ client.actions.modules.versions.get(
## Actions Triggers Bindings -
client.actions.triggers.bindings.list(...) -> AsyncPager[ActionBinding, ListActionBindingsPaginatedResponseContent] +
client.actions.triggers.bindings.list(...) -> ListActionBindingsPaginatedResponseContent
@@ -17188,21 +17543,19 @@ Retrieve the actions that are bound to a trigger. Once an action is created and
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.actions.triggers.bindings.list( + +client.actions.triggers.bindings.list( trigger_id="post-login", page=1, per_page=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -17254,7 +17607,7 @@ for page in response.iter_pages():
-
client.actions.triggers.bindings.update_many(...) -> AsyncHttpResponse[UpdateActionBindingsResponseContent] +
client.actions.triggers.bindings.update_many(...) -> UpdateActionBindingsResponseContent
@@ -17281,11 +17634,14 @@ Update the actions that are bound (i.e. attached) to a trigger. Once an action i
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.actions.triggers.bindings.update_many( trigger_id="post-login", ) @@ -17312,7 +17668,7 @@ client.actions.triggers.bindings.update_many(
-**bindings:** `typing.Optional[typing.Sequence[ActionBindingWithRef]]` — The actions that will be bound to this trigger. The order in which they are included will be the order in which they are executed. +**bindings:** `typing.Optional[typing.List[ActionBindingWithRef]]` — The actions that will be bound to this trigger. The order in which they are included will be the order in which they are executed.
@@ -17333,7 +17689,7 @@ client.actions.triggers.bindings.update_many(
## Anomaly Blocks -
client.anomaly.blocks.check_ip(...) -> AsyncHttpResponse[None] +
client.anomaly.blocks.check_ip(...)
@@ -17360,11 +17716,14 @@ Check if the given IP address is blocked via the
-
client.anomaly.blocks.unblock_ip(...) -> AsyncHttpResponse[None] +
client.anomaly.blocks.unblock_ip(...)
@@ -17430,11 +17789,14 @@ Remove a block imposed by ## AttackProtection BotDetection -
client.attack_protection.bot_detection.get() -> AsyncHttpResponse[GetBotDetectionSettingsResponseContent] +
client.attack_protection.bot_detection.get() -> GetBotDetectionSettingsResponseContent
@@ -17501,11 +17863,14 @@ Get the Bot Detection configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.bot_detection.get() ``` @@ -17534,7 +17899,7 @@ client.attack_protection.bot_detection.get()
-
client.attack_protection.bot_detection.update(...) -> AsyncHttpResponse[UpdateBotDetectionSettingsResponseContent] +
client.attack_protection.bot_detection.update(...) -> UpdateBotDetectionSettingsResponseContent
@@ -17561,11 +17926,14 @@ Update the Bot Detection configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.bot_detection.update() ``` @@ -17643,7 +18011,7 @@ client.attack_protection.bot_detection.update()
## AttackProtection BreachedPasswordDetection -
client.attack_protection.breached_password_detection.get() -> AsyncHttpResponse[GetBreachedPasswordDetectionSettingsResponseContent] +
client.attack_protection.breached_password_detection.get() -> GetBreachedPasswordDetectionSettingsResponseContent
@@ -17670,11 +18038,14 @@ Retrieve details of the Breached Password Detection configuration of your tenant
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.breached_password_detection.get() ``` @@ -17703,7 +18074,7 @@ client.attack_protection.breached_password_detection.get()
-
client.attack_protection.breached_password_detection.update(...) -> AsyncHttpResponse[UpdateBreachedPasswordDetectionSettingsResponseContent] +
client.attack_protection.breached_password_detection.update(...) -> UpdateBreachedPasswordDetectionSettingsResponseContent
@@ -17730,11 +18101,14 @@ Update details of the Breached Password Detection configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.breached_password_detection.update() ``` @@ -17759,7 +18133,7 @@ client.attack_protection.breached_password_detection.update()
-**shields:** `typing.Optional[typing.Sequence[BreachedPasswordDetectionShieldsEnum]]` +**shields:** `typing.Optional[typing.List[BreachedPasswordDetectionShieldsEnum]]` Action to take when a breached password is detected during a login. Possible values: block, user_notification, admin_notification. @@ -17770,9 +18144,7 @@ Action to take when a breached password is detected during a login.
-**admin_notification_frequency:** `typing.Optional[ - typing.Sequence[BreachedPasswordDetectionAdminNotificationFrequencyEnum] -]` +**admin_notification_frequency:** `typing.Optional[typing.List[BreachedPasswordDetectionAdminNotificationFrequencyEnum]]` When "admin_notification" is enabled, determines how often email notifications are sent. Possible values: immediately, daily, weekly, monthly. @@ -17812,7 +18184,7 @@ When "admin_notification" is enabled, determines how often email notifications a
## AttackProtection BruteForceProtection -
client.attack_protection.brute_force_protection.get() -> AsyncHttpResponse[GetBruteForceSettingsResponseContent] +
client.attack_protection.brute_force_protection.get() -> GetBruteForceSettingsResponseContent
@@ -17839,11 +18211,14 @@ Retrieve details of the Brute-force Protection configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.brute_force_protection.get() ``` @@ -17872,7 +18247,7 @@ client.attack_protection.brute_force_protection.get()
-
client.attack_protection.brute_force_protection.update(...) -> AsyncHttpResponse[UpdateBruteForceSettingsResponseContent] +
client.attack_protection.brute_force_protection.update(...) -> UpdateBruteForceSettingsResponseContent
@@ -17899,11 +18274,14 @@ Update the Brute-force Protection configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.brute_force_protection.update() ``` @@ -17928,7 +18306,7 @@ client.attack_protection.brute_force_protection.update()
-**shields:** `typing.Optional[typing.Sequence[BruteForceProtectionShieldsEnum]]` +**shields:** `typing.Optional[typing.List[BruteForceProtectionShieldsEnum]]` Action to take when a brute force protection threshold is violated. Possible values: block, user_notification. @@ -17939,7 +18317,7 @@ Action to take when a brute force protection threshold is violated.
-**allowlist:** `typing.Optional[typing.Sequence[str]]` — List of trusted IP addresses that will not have attack protection enforced against them. +**allowlist:** `typing.Optional[typing.List[str]]` — List of trusted IP addresses that will not have attack protection enforced against them.
@@ -17976,7 +18354,7 @@ Action to take when a brute force protection threshold is violated.
## AttackProtection Captcha -
client.attack_protection.captcha.get() -> AsyncHttpResponse[GetAttackProtectionCaptchaResponseContent] +
client.attack_protection.captcha.get() -> GetAttackProtectionCaptchaResponseContent
@@ -18003,11 +18381,14 @@ Get the CAPTCHA configuration for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.captcha.get() ``` @@ -18036,7 +18417,7 @@ client.attack_protection.captcha.get()
-
client.attack_protection.captcha.update(...) -> AsyncHttpResponse[UpdateAttackProtectionCaptchaResponseContent] +
client.attack_protection.captcha.update(...) -> UpdateAttackProtectionCaptchaResponseContent
@@ -18063,11 +18444,14 @@ Update existing CAPTCHA configuration for your client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.captcha.update() ``` @@ -18161,7 +18545,7 @@ client.attack_protection.captcha.update()
## AttackProtection SuspiciousIpThrottling -
client.attack_protection.suspicious_ip_throttling.get() -> AsyncHttpResponse[GetSuspiciousIpThrottlingSettingsResponseContent] +
client.attack_protection.suspicious_ip_throttling.get() -> GetSuspiciousIpThrottlingSettingsResponseContent
@@ -18188,11 +18572,14 @@ Retrieve details of the Suspicious IP Throttling configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.suspicious_ip_throttling.get() ``` @@ -18221,7 +18608,7 @@ client.attack_protection.suspicious_ip_throttling.get()
-
client.attack_protection.suspicious_ip_throttling.update(...) -> AsyncHttpResponse[UpdateSuspiciousIpThrottlingSettingsResponseContent] +
client.attack_protection.suspicious_ip_throttling.update(...) -> UpdateSuspiciousIpThrottlingSettingsResponseContent
@@ -18248,11 +18635,14 @@ Update the details of the Suspicious IP Throttling configuration of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.attack_protection.suspicious_ip_throttling.update() ``` @@ -18277,7 +18667,7 @@ client.attack_protection.suspicious_ip_throttling.update()
-**shields:** `typing.Optional[typing.Sequence[SuspiciousIpThrottlingShieldsEnum]]` +**shields:** `typing.Optional[typing.List[SuspiciousIpThrottlingShieldsEnum]]` Action to take when a suspicious IP throttling threshold is violated. Possible values: block, admin_notification. @@ -18317,7 +18707,7 @@ Action to take when a suspicious IP throttling threshold is violated.
## Branding Templates -
client.branding.templates.get_universal_login() -> AsyncHttpResponse[GetUniversalLoginTemplateResponseContent] +
client.branding.templates.get_universal_login() -> GetUniversalLoginTemplateResponseContent
@@ -18330,11 +18720,14 @@ Action to take when a suspicious IP throttling threshold is violated.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.templates.get_universal_login() ``` @@ -18363,7 +18756,7 @@ client.branding.templates.get_universal_login()
-
client.branding.templates.update_universal_login(...) -> AsyncHttpResponse[None] +
client.branding.templates.update_universal_login(...)
@@ -18413,11 +18806,14 @@ Update the Universal Login branding template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.templates.update_universal_login( request="string", ) @@ -18456,7 +18852,7 @@ client.branding.templates.update_universal_login(
-
client.branding.templates.delete_universal_login() -> AsyncHttpResponse[None] +
client.branding.templates.delete_universal_login()
@@ -18469,11 +18865,14 @@ client.branding.templates.update_universal_login(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.templates.delete_universal_login() ``` @@ -18503,7 +18902,7 @@ client.branding.templates.delete_universal_login()
## Branding Themes -
client.branding.themes.create(...) -> AsyncHttpResponse[CreateBrandingThemeResponseContent] +
client.branding.themes.create(...) -> CreateBrandingThemeResponseContent
@@ -18530,24 +18929,14 @@ Create branding theme.
```python -from auth0 import ( - Auth0, - BrandingThemeBorders, - BrandingThemeColors, - BrandingThemeFontBodyText, - BrandingThemeFontButtonsText, - BrandingThemeFontInputLabels, - BrandingThemeFontLinks, - BrandingThemeFonts, - BrandingThemeFontSubtitle, - BrandingThemeFontTitle, - BrandingThemePageBackground, - BrandingThemeWidget, -) +from auth0.management import Auth0, BrandingThemeBorders, BrandingThemeColors, BrandingThemeFonts, BrandingThemeFontBodyText, BrandingThemeFontButtonsText, BrandingThemeFontInputLabels, BrandingThemeFontLinks, BrandingThemeFontSubtitle, BrandingThemeFontTitle, BrandingThemePageBackground, BrandingThemeWidget +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.themes.create( borders=BrandingThemeBorders( button_border_radius=1.1, @@ -18695,7 +19084,7 @@ client.branding.themes.create(
-
client.branding.themes.get_default() -> AsyncHttpResponse[GetBrandingDefaultThemeResponseContent] +
client.branding.themes.get_default() -> GetBrandingDefaultThemeResponseContent
@@ -18722,11 +19111,14 @@ Retrieve default branding theme.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.themes.get_default() ``` @@ -18755,7 +19147,7 @@ client.branding.themes.get_default()
-
client.branding.themes.get(...) -> AsyncHttpResponse[GetBrandingThemeResponseContent] +
client.branding.themes.get(...) -> GetBrandingThemeResponseContent
@@ -18782,11 +19174,14 @@ Retrieve branding theme.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.themes.get( theme_id="themeId", ) @@ -18825,7 +19220,7 @@ client.branding.themes.get(
-
client.branding.themes.delete(...) -> AsyncHttpResponse[None] +
client.branding.themes.delete(...)
@@ -18852,11 +19247,14 @@ Delete branding theme.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.themes.delete( theme_id="themeId", ) @@ -18895,7 +19293,7 @@ client.branding.themes.delete(
-
client.branding.themes.update(...) -> AsyncHttpResponse[UpdateBrandingThemeResponseContent] +
client.branding.themes.update(...) -> UpdateBrandingThemeResponseContent
@@ -18922,24 +19320,14 @@ Update branding theme.
```python -from auth0 import ( - Auth0, - BrandingThemeBorders, - BrandingThemeColors, - BrandingThemeFontBodyText, - BrandingThemeFontButtonsText, - BrandingThemeFontInputLabels, - BrandingThemeFontLinks, - BrandingThemeFonts, - BrandingThemeFontSubtitle, - BrandingThemeFontTitle, - BrandingThemePageBackground, - BrandingThemeWidget, -) +from auth0.management import Auth0, BrandingThemeBorders, BrandingThemeColors, BrandingThemeFonts, BrandingThemeFontBodyText, BrandingThemeFontButtonsText, BrandingThemeFontInputLabels, BrandingThemeFontLinks, BrandingThemeFontSubtitle, BrandingThemeFontTitle, BrandingThemePageBackground, BrandingThemeWidget +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.themes.update( theme_id="themeId", borders=BrandingThemeBorders( @@ -19097,7 +19485,7 @@ client.branding.themes.update(
## Branding Phone Providers -
client.branding.phone.providers.list(...) -> AsyncHttpResponse[ListBrandingPhoneProvidersResponseContent] +
client.branding.phone.providers.list(...) -> ListBrandingPhoneProvidersResponseContent
@@ -19124,11 +19512,14 @@ Retrieve a list of
-
client.branding.phone.providers.create(...) -> AsyncHttpResponse[CreateBrandingPhoneProviderResponseContent] +
client.branding.phone.providers.create(...) -> CreateBrandingPhoneProviderResponseContent
@@ -19195,11 +19586,14 @@ The credentials object requires different properties depending on t
```python -from auth0 import Auth0, TwilioProviderCredentials +from auth0.management import Auth0, TwilioProviderCredentials +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.providers.create( name="twilio", credentials=TwilioProviderCredentials( @@ -19265,7 +19659,7 @@ client.branding.phone.providers.create(
-
client.branding.phone.providers.get(...) -> AsyncHttpResponse[GetBrandingPhoneProviderResponseContent] +
client.branding.phone.providers.get(...) -> GetBrandingPhoneProviderResponseContent
@@ -19292,11 +19686,14 @@ Retrieve
-
client.branding.phone.providers.delete(...) -> AsyncHttpResponse[None] +
client.branding.phone.providers.delete(...)
@@ -19362,11 +19759,14 @@ Delete the configured phone provider.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.providers.delete( id="id", ) @@ -19405,7 +19805,7 @@ client.branding.phone.providers.delete(
-
client.branding.phone.providers.update(...) -> AsyncHttpResponse[UpdateBrandingPhoneProviderResponseContent] +
client.branding.phone.providers.update(...) -> UpdateBrandingPhoneProviderResponseContent
@@ -19433,11 +19833,14 @@ The credentials object requires different properties depending on t
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.providers.update( id="id", ) @@ -19508,7 +19911,7 @@ client.branding.phone.providers.update(
-
client.branding.phone.providers.test(...) -> AsyncHttpResponse[CreatePhoneProviderSendTestResponseContent] +
client.branding.phone.providers.test(...) -> CreatePhoneProviderSendTestResponseContent
@@ -19521,11 +19924,14 @@ client.branding.phone.providers.update(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.providers.test( id="id", to="to", @@ -19582,7 +19988,7 @@ client.branding.phone.providers.test(
## Branding Phone Templates -
client.branding.phone.templates.list(...) -> AsyncHttpResponse[ListPhoneTemplatesResponseContent] +
client.branding.phone.templates.list(...) -> ListPhoneTemplatesResponseContent
@@ -19595,11 +20001,14 @@ client.branding.phone.providers.test(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.list( disabled=True, ) @@ -19638,7 +20047,7 @@ client.branding.phone.templates.list(
-
client.branding.phone.templates.create(...) -> AsyncHttpResponse[CreatePhoneTemplateResponseContent] +
client.branding.phone.templates.create(...) -> CreatePhoneTemplateResponseContent
@@ -19651,11 +20060,14 @@ client.branding.phone.templates.list(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.create() ``` @@ -19708,7 +20120,7 @@ client.branding.phone.templates.create()
-
client.branding.phone.templates.get(...) -> AsyncHttpResponse[GetPhoneTemplateResponseContent] +
client.branding.phone.templates.get(...) -> GetPhoneTemplateResponseContent
@@ -19721,11 +20133,14 @@ client.branding.phone.templates.create()
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.get( id="id", ) @@ -19764,7 +20179,7 @@ client.branding.phone.templates.get(
-
client.branding.phone.templates.delete(...) -> AsyncHttpResponse[None] +
client.branding.phone.templates.delete(...)
@@ -19777,11 +20192,14 @@ client.branding.phone.templates.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.delete( id="id", ) @@ -19820,7 +20238,7 @@ client.branding.phone.templates.delete(
-
client.branding.phone.templates.update(...) -> AsyncHttpResponse[UpdatePhoneTemplateResponseContent] +
client.branding.phone.templates.update(...) -> UpdatePhoneTemplateResponseContent
@@ -19833,11 +20251,14 @@ client.branding.phone.templates.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.update( id="id", ) @@ -19892,7 +20313,7 @@ client.branding.phone.templates.update(
-
client.branding.phone.templates.reset(...) -> AsyncHttpResponse[ResetPhoneTemplateResponseContent] +
client.branding.phone.templates.reset(...) -> ResetPhoneTemplateResponseContent
@@ -19905,11 +20326,14 @@ client.branding.phone.templates.update(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.reset( id="id", request={"key": "value"}, @@ -19957,7 +20381,7 @@ client.branding.phone.templates.reset(
-
client.branding.phone.templates.test(...) -> AsyncHttpResponse[CreatePhoneTemplateTestNotificationResponseContent] +
client.branding.phone.templates.test(...) -> CreatePhoneTemplateTestNotificationResponseContent
@@ -19970,11 +20394,14 @@ client.branding.phone.templates.reset(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.branding.phone.templates.test( id="id", to="to", @@ -20031,7 +20458,7 @@ client.branding.phone.templates.test(
## ClientGrants Organizations -
client.client_grants.organizations.list(...) -> AsyncPager[Organization, ListClientGrantOrganizationsPaginatedResponseContent] +
client.client_grants.organizations.list(...) -> ListClientGrantOrganizationsPaginatedResponseContent
@@ -20044,21 +20471,19 @@ client.branding.phone.templates.test(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.client_grants.organizations.list( + +client.client_grants.organizations.list( id="id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -20082,7 +20507,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -20111,7 +20536,7 @@ for page in response.iter_pages():
## Clients Credentials -
client.clients.credentials.list(...) -> AsyncHttpResponse[typing.List[ClientCredential]] +
client.clients.credentials.list(...) -> typing.List[ClientCredential]
@@ -20140,11 +20565,14 @@ Get the details of a client credential.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.credentials.list( client_id="client_id", ) @@ -20183,7 +20611,7 @@ client.clients.credentials.list(
-
client.clients.credentials.create(...) -> AsyncHttpResponse[PostClientCredentialResponseContent] +
client.clients.credentials.create(...) -> PostClientCredentialResponseContent
@@ -20242,11 +20670,14 @@ The credential will be created but not yet enabled for use until you set the cor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.credentials.create( client_id="client_id", credential_type="public_key", @@ -20322,7 +20753,7 @@ client.clients.credentials.create(
-**expires_at:** `typing.Optional[dt.datetime]` — The ISO 8601 formatted date representing the expiration of the credential. If not specified (not recommended), the credential never expires. Applies to `public_key` credential type. +**expires_at:** `typing.Optional[datetime.datetime]` — The ISO 8601 formatted date representing the expiration of the credential. If not specified (not recommended), the credential never expires. Applies to `public_key` credential type.
@@ -20350,7 +20781,7 @@ client.clients.credentials.create(
-
client.clients.credentials.get(...) -> AsyncHttpResponse[GetClientCredentialResponseContent] +
client.clients.credentials.get(...) -> GetClientCredentialResponseContent
@@ -20379,11 +20810,14 @@ Get the details of a client credential.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.credentials.get( client_id="client_id", credential_id="credential_id", @@ -20431,7 +20865,7 @@ client.clients.credentials.get(
-
client.clients.credentials.delete(...) -> AsyncHttpResponse[None] +
client.clients.credentials.delete(...)
@@ -20458,11 +20892,14 @@ Delete a client credential you previously created. May be enabled or disabled. F
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.credentials.delete( client_id="client_id", credential_id="credential_id", @@ -20510,7 +20947,7 @@ client.clients.credentials.delete(
-
client.clients.credentials.update(...) -> AsyncHttpResponse[PatchClientCredentialResponseContent] +
client.clients.credentials.update(...) -> PatchClientCredentialResponseContent
@@ -20537,11 +20974,14 @@ Change a client credential you previously created. May be enabled or disabled. F
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.clients.credentials.update( client_id="client_id", credential_id="credential_id", @@ -20577,7 +21017,7 @@ client.clients.credentials.update(
-**expires_at:** `typing.Optional[dt.datetime]` — The ISO 8601 formatted date representing the expiration of the credential. +**expires_at:** `typing.Optional[datetime.datetime]` — The ISO 8601 formatted date representing the expiration of the credential.
@@ -20598,7 +21038,7 @@ client.clients.credentials.update(
## Clients Connections -
client.clients.connections.get(...) -> AsyncPager[ConnectionForList, ListClientConnectionsResponseContent] +
client.clients.connections.get(...) -> ListClientConnectionsResponseContent
@@ -20633,23 +21073,21 @@ Retrieve all connections that are enabled for the specified @@ -20673,11 +21111,7 @@ for page in response.iter_pages():
-**strategy:** `typing.Optional[ - typing.Union[ - ConnectionStrategyEnum, typing.Sequence[ConnectionStrategyEnum] - ] -]` — Provide strategies to only retrieve connections with such strategies +**strategy:** `typing.Optional[typing.Union[typing.Optional[ConnectionStrategyEnum], typing.Sequence[typing.Optional[ConnectionStrategyEnum]]]]` — Provide strategies to only retrieve connections with such strategies
@@ -20685,7 +21119,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -20730,7 +21164,7 @@ for page in response.iter_pages():
## Connections DirectoryProvisioning -
client.connections.directory_provisioning.list(...) -> AsyncPager[DirectoryProvisioning, ListDirectoryProvisioningsResponseContent] +
client.connections.directory_provisioning.list(...) -> ListDirectoryProvisioningsResponseContent
@@ -20757,20 +21191,18 @@ Retrieve a list of directory provisioning configurations of a tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.connections.directory_provisioning.list( + +client.connections.directory_provisioning.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -20786,7 +21218,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -20814,7 +21246,7 @@ for page in response.iter_pages():
-
client.connections.directory_provisioning.get(...) -> AsyncHttpResponse[GetDirectoryProvisioningResponseContent] +
client.connections.directory_provisioning.get(...) -> GetDirectoryProvisioningResponseContent
@@ -20841,11 +21273,14 @@ Retrieve the directory provisioning configuration of a connection.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.get( id="id", ) @@ -20884,7 +21319,7 @@ client.connections.directory_provisioning.get(
-
client.connections.directory_provisioning.create(...) -> AsyncHttpResponse[CreateDirectoryProvisioningResponseContent] +
client.connections.directory_provisioning.create(...) -> CreateDirectoryProvisioningResponseContent
@@ -20911,11 +21346,14 @@ Create a directory provisioning configuration for a connection.
```python -from auth0 import Auth0, CreateDirectoryProvisioningRequestContent +from auth0.management import Auth0, CreateDirectoryProvisioningRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.create( id="id", request=CreateDirectoryProvisioningRequestContent(), @@ -20963,7 +21401,7 @@ client.connections.directory_provisioning.create(
-
client.connections.directory_provisioning.delete(...) -> AsyncHttpResponse[None] +
client.connections.directory_provisioning.delete(...)
@@ -20990,11 +21428,14 @@ Delete the directory provisioning configuration of a connection.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.delete( id="id", ) @@ -21033,7 +21474,7 @@ client.connections.directory_provisioning.delete(
-
client.connections.directory_provisioning.update(...) -> AsyncHttpResponse[UpdateDirectoryProvisioningResponseContent] +
client.connections.directory_provisioning.update(...) -> UpdateDirectoryProvisioningResponseContent
@@ -21060,11 +21501,14 @@ Update the directory provisioning configuration of a connection.
```python -from auth0 import Auth0, UpdateDirectoryProvisioningRequestContent +from auth0.management import Auth0, UpdateDirectoryProvisioningRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.update( id="id", request=UpdateDirectoryProvisioningRequestContent(), @@ -21112,7 +21556,7 @@ client.connections.directory_provisioning.update(
-
client.connections.directory_provisioning.get_default_mapping(...) -> AsyncHttpResponse[GetDirectoryProvisioningDefaultMappingResponseContent] +
client.connections.directory_provisioning.get_default_mapping(...) -> GetDirectoryProvisioningDefaultMappingResponseContent
@@ -21139,11 +21583,14 @@ Retrieve the directory provisioning default attribute mapping of a connection.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.get_default_mapping( id="id", ) @@ -21183,7 +21630,7 @@ client.connections.directory_provisioning.get_default_mapping(
## Connections ScimConfiguration -
client.connections.scim_configuration.list(...) -> AsyncPager[ScimConfiguration, ListScimConfigurationsResponseContent] +
client.connections.scim_configuration.list(...) -> ListScimConfigurationsResponseContent
@@ -21210,20 +21657,18 @@ Retrieve a list of SCIM configurations of a tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.connections.scim_configuration.list( + +client.connections.scim_configuration.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -21239,7 +21684,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -21267,7 +21712,7 @@ for page in response.iter_pages():
-
client.connections.scim_configuration.get(...) -> AsyncHttpResponse[GetScimConfigurationResponseContent] +
client.connections.scim_configuration.get(...) -> GetScimConfigurationResponseContent
@@ -21294,11 +21739,14 @@ Retrieves a scim configuration by its connectionId.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.get( id="id", ) @@ -21337,7 +21785,7 @@ client.connections.scim_configuration.get(
-
client.connections.scim_configuration.create(...) -> AsyncHttpResponse[CreateScimConfigurationResponseContent] +
client.connections.scim_configuration.create(...) -> CreateScimConfigurationResponseContent
@@ -21364,11 +21812,14 @@ Create a scim configuration for a connection.
```python -from auth0 import Auth0, CreateScimConfigurationRequestContent +from auth0.management import Auth0, CreateScimConfigurationRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.create( id="id", request=CreateScimConfigurationRequestContent(), @@ -21416,7 +21867,7 @@ client.connections.scim_configuration.create(
-
client.connections.scim_configuration.delete(...) -> AsyncHttpResponse[None] +
client.connections.scim_configuration.delete(...)
@@ -21443,11 +21894,14 @@ Deletes a scim configuration by its connectionId.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.delete( id="id", ) @@ -21486,7 +21940,7 @@ client.connections.scim_configuration.delete(
-
client.connections.scim_configuration.update(...) -> AsyncHttpResponse[UpdateScimConfigurationResponseContent] +
client.connections.scim_configuration.update(...) -> UpdateScimConfigurationResponseContent
@@ -21513,15 +21967,20 @@ Update a scim configuration by its connectionId.
```python -from auth0 import Auth0, ScimMappingItem +from auth0.management import Auth0, ScimMappingItem +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.update( id="id", user_id_attribute="user_id_attribute", - mapping=[ScimMappingItem()], + mapping=[ + ScimMappingItem() + ], ) ``` @@ -21554,7 +22013,7 @@ client.connections.scim_configuration.update(
-**mapping:** `typing.Sequence[ScimMappingItem]` — The mapping between auth0 and SCIM +**mapping:** `typing.List[ScimMappingItem]` — The mapping between auth0 and SCIM
@@ -21574,7 +22033,7 @@ client.connections.scim_configuration.update(
-
client.connections.scim_configuration.get_default_mapping(...) -> AsyncHttpResponse[GetScimConfigurationDefaultMappingResponseContent] +
client.connections.scim_configuration.get_default_mapping(...) -> GetScimConfigurationDefaultMappingResponseContent
@@ -21601,11 +22060,14 @@ Retrieves a scim configuration's default mapping by its connectionId ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.get_default_mapping( id="id", ) @@ -21645,7 +22107,7 @@ client.connections.scim_configuration.get_default_mapping(
## Connections Clients -
client.connections.clients.get(...) -> AsyncPager[ConnectionEnabledClient, GetConnectionEnabledClientsResponseContent] +
client.connections.clients.get(...) -> GetConnectionEnabledClientsResponseContent
@@ -21674,21 +22136,19 @@ Retrieve all clients that have the specified @@ -21720,7 +22180,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -21740,7 +22200,7 @@ for page in response.iter_pages():
-
client.connections.clients.update(...) -> AsyncHttpResponse[None] +
client.connections.clients.update(...)
@@ -21753,11 +22213,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0, UpdateEnabledClientConnectionsRequestContentItem +from auth0.management import Auth0, UpdateEnabledClientConnectionsRequestContentItem +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.clients.update( id="id", request=[ @@ -21811,7 +22274,7 @@ client.connections.clients.update(
## Connections Keys -
client.connections.keys.get(...) -> AsyncHttpResponse[typing.List[ConnectionKey]] +
client.connections.keys.get(...) -> typing.List[ConnectionKey]
@@ -21838,11 +22301,14 @@ Gets the connection keys for the Okta or OIDC connection strategy.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.keys.get( id="id", ) @@ -21881,7 +22347,7 @@ client.connections.keys.get(
-
client.connections.keys.create(...) -> AsyncHttpResponse[PostConnectionsKeysResponseContent] +
client.connections.keys.create(...) -> PostConnectionsKeysResponseContent
@@ -21908,11 +22374,14 @@ Provision initial connection keys for Okta or OIDC connection strategies. This e
```python -from auth0 import Auth0, PostConnectionKeysRequestContent +from auth0.management import Auth0, PostConnectionKeysRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.keys.create( id="id", request=PostConnectionKeysRequestContent(), @@ -21960,7 +22429,7 @@ client.connections.keys.create(
-
client.connections.keys.rotate(...) -> AsyncHttpResponse[RotateConnectionsKeysResponseContent] +
client.connections.keys.rotate(...) -> RotateConnectionsKeysResponseContent
@@ -21987,11 +22456,14 @@ Rotates the connection keys for the Okta or OIDC connection strategies.
```python -from auth0 import Auth0, RotateConnectionKeysRequestContent +from auth0.management import Auth0, RotateConnectionKeysRequestContent +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.keys.rotate( id="id", request=RotateConnectionKeysRequestContent(), @@ -22040,7 +22512,7 @@ client.connections.keys.rotate(
## Connections Users -
client.connections.users.delete_by_email(...) -> AsyncHttpResponse[None] +
client.connections.users.delete_by_email(...)
@@ -22067,11 +22539,14 @@ Deletes a specified connection user by its email (you cannot delete all users fr
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.users.delete_by_email( id="id", email="email", @@ -22120,7 +22595,7 @@ client.connections.users.delete_by_email(
## Connections DirectoryProvisioning Synchronizations -
client.connections.directory_provisioning.synchronizations.create(...) -> AsyncHttpResponse[CreateDirectorySynchronizationResponseContent] +
client.connections.directory_provisioning.synchronizations.create(...) -> CreateDirectorySynchronizationResponseContent
@@ -22147,11 +22622,14 @@ Request an on-demand synchronization of the directory.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.directory_provisioning.synchronizations.create( id="id", ) @@ -22191,7 +22669,7 @@ client.connections.directory_provisioning.synchronizations.create(
## Connections ScimConfiguration Tokens -
client.connections.scim_configuration.tokens.get(...) -> AsyncHttpResponse[GetScimTokensResponseContent] +
client.connections.scim_configuration.tokens.get(...) -> GetScimTokensResponseContent
@@ -22218,11 +22696,14 @@ Retrieves all scim tokens by its connection id.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.tokens.get( id="id", ) @@ -22261,7 +22742,7 @@ client.connections.scim_configuration.tokens.get(
-
client.connections.scim_configuration.tokens.create(...) -> AsyncHttpResponse[CreateScimTokenResponseContent] +
client.connections.scim_configuration.tokens.create(...) -> CreateScimTokenResponseContent
@@ -22288,11 +22769,14 @@ Create a scim token for a scim client.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.tokens.create( id="id", ) @@ -22319,7 +22803,7 @@ client.connections.scim_configuration.tokens.create(
-**scopes:** `typing.Optional[typing.Sequence[str]]` — The scopes of the scim token +**scopes:** `typing.Optional[typing.List[str]]` — The scopes of the scim token
@@ -22347,7 +22831,7 @@ client.connections.scim_configuration.tokens.create(
-
client.connections.scim_configuration.tokens.delete(...) -> AsyncHttpResponse[None] +
client.connections.scim_configuration.tokens.delete(...)
@@ -22374,11 +22858,14 @@ Deletes a scim token by its connection id and tokenId.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.connections.scim_configuration.tokens.delete( id="id", token_id="tokenId", @@ -22427,7 +22914,7 @@ client.connections.scim_configuration.tokens.delete(
## Emails Provider -
client.emails.provider.get(...) -> AsyncHttpResponse[GetEmailProviderResponseContent] +
client.emails.provider.get(...) -> GetEmailProviderResponseContent
@@ -22454,11 +22941,14 @@ Retrieve details of the
-
client.emails.provider.create(...) -> AsyncHttpResponse[CreateEmailProviderResponseContent] +
client.emails.provider.create(...) -> CreateEmailProviderResponseContent
@@ -22574,11 +23064,14 @@ options, which will be used when sending an email:
```python -from auth0 import Auth0, EmailProviderCredentialsSchemaZero +from auth0.management import Auth0, EmailProviderCredentialsSchemaZero +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.emails.provider.create( name="mailgun", credentials=EmailProviderCredentialsSchemaZero( @@ -22652,7 +23145,7 @@ client.emails.provider.create(
-
client.emails.provider.delete() -> AsyncHttpResponse[None] +
client.emails.provider.delete()
@@ -22679,11 +23172,14 @@ Delete the email provider.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.emails.provider.delete() ``` @@ -22712,7 +23208,7 @@ client.emails.provider.delete()
-
client.emails.provider.update(...) -> AsyncHttpResponse[UpdateEmailProviderResponseContent] +
client.emails.provider.update(...) -> UpdateEmailProviderResponseContent
@@ -22778,11 +23274,14 @@ options, which will be used when sending an email:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.emails.provider.update() ``` @@ -22852,7 +23351,7 @@ client.emails.provider.update()
## EventStreams Deliveries -
client.event_streams.deliveries.list(...) -> AsyncHttpResponse[typing.List[EventStreamDelivery]] +
client.event_streams.deliveries.list(...) -> typing.List[EventStreamDelivery]
@@ -22865,11 +23364,14 @@ client.emails.provider.update()
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.deliveries.list( id="id", statuses="statuses", @@ -22934,7 +23436,7 @@ client.event_streams.deliveries.list(
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -22962,7 +23464,7 @@ client.event_streams.deliveries.list(
-
client.event_streams.deliveries.get_history(...) -> AsyncHttpResponse[GetEventStreamDeliveryHistoryResponseContent] +
client.event_streams.deliveries.get_history(...) -> GetEventStreamDeliveryHistoryResponseContent
@@ -22975,11 +23477,14 @@ client.event_streams.deliveries.list(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.deliveries.get_history( id="id", event_id="event_id", @@ -23028,7 +23533,7 @@ client.event_streams.deliveries.get_history(
## EventStreams Redeliveries -
client.event_streams.redeliveries.create(...) -> AsyncHttpResponse[CreateEventStreamRedeliveryResponseContent] +
client.event_streams.redeliveries.create(...) -> CreateEventStreamRedeliveryResponseContent
@@ -23041,11 +23546,14 @@ client.event_streams.deliveries.get_history(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.redeliveries.create( id="id", ) @@ -23072,7 +23580,7 @@ client.event_streams.redeliveries.create(
-**date_from:** `typing.Optional[dt.datetime]` — An RFC-3339 date-time for redelivery start, inclusive. Does not allow sub-second precision. +**date_from:** `typing.Optional[datetime.datetime]` — An RFC-3339 date-time for redelivery start, inclusive. Does not allow sub-second precision.
@@ -23080,7 +23588,7 @@ client.event_streams.redeliveries.create(
-**date_to:** `typing.Optional[dt.datetime]` — An RFC-3339 date-time for redelivery end, exclusive. Does not allow sub-second precision. +**date_to:** `typing.Optional[datetime.datetime]` — An RFC-3339 date-time for redelivery end, exclusive. Does not allow sub-second precision.
@@ -23088,7 +23596,7 @@ client.event_streams.redeliveries.create(
-**statuses:** `typing.Optional[typing.Sequence[EventStreamDeliveryStatusEnum]]` — Filter by status +**statuses:** `typing.Optional[typing.List[EventStreamDeliveryStatusEnum]]` — Filter by status
@@ -23096,7 +23604,7 @@ client.event_streams.redeliveries.create(
-**event_types:** `typing.Optional[typing.Sequence[EventStreamEventTypeEnum]]` — Filter by event type +**event_types:** `typing.Optional[typing.List[EventStreamEventTypeEnum]]` — Filter by event type
@@ -23116,7 +23624,7 @@ client.event_streams.redeliveries.create(
-
client.event_streams.redeliveries.create_by_id(...) -> AsyncHttpResponse[None] +
client.event_streams.redeliveries.create_by_id(...)
@@ -23129,11 +23637,14 @@ client.event_streams.redeliveries.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.event_streams.redeliveries.create_by_id( id="id", event_id="event_id", @@ -23182,7 +23693,7 @@ client.event_streams.redeliveries.create_by_id(
## Flows Executions -
client.flows.executions.list(...) -> AsyncPager[FlowExecutionSummary, ListFlowExecutionsPaginatedResponseContent] +
client.flows.executions.list(...) -> ListFlowExecutionsPaginatedResponseContent
@@ -23195,21 +23706,19 @@ client.event_streams.redeliveries.create_by_id(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.flows.executions.list( + +client.flows.executions.list( flow_id="flow_id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -23233,7 +23742,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -23261,7 +23770,7 @@ for page in response.iter_pages():
-
client.flows.executions.get(...) -> AsyncHttpResponse[GetFlowExecutionResponseContent] +
client.flows.executions.get(...) -> GetFlowExecutionResponseContent
@@ -23274,11 +23783,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.executions.get( flow_id="flow_id", execution_id="execution_id", @@ -23314,12 +23826,7 @@ client.flows.executions.get(
-**hydrate:** `typing.Optional[ - typing.Union[ - GetFlowExecutionRequestParametersHydrateEnum, - typing.Sequence[GetFlowExecutionRequestParametersHydrateEnum], - ] -]` — Hydration param +**hydrate:** `typing.Optional[typing.Union[typing.Optional[GetFlowExecutionRequestParametersHydrateEnum], typing.Sequence[typing.Optional[GetFlowExecutionRequestParametersHydrateEnum]]]]` — Hydration param
@@ -23339,7 +23846,7 @@ client.flows.executions.get(
-
client.flows.executions.delete(...) -> AsyncHttpResponse[None] +
client.flows.executions.delete(...)
@@ -23352,11 +23859,14 @@ client.flows.executions.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.executions.delete( flow_id="flow_id", execution_id="execution_id", @@ -23405,10 +23915,7 @@ client.flows.executions.delete(
## Flows Vault Connections -
client.flows.vault.connections.list(...) -> AsyncPager[ - FlowsVaultConnectionSummary, - ListFlowsVaultConnectionsOffsetPaginatedResponseContent, -] +
client.flows.vault.connections.list(...) -> ListFlowsVaultConnectionsOffsetPaginatedResponseContent
@@ -23421,21 +23928,19 @@ client.flows.executions.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.flows.vault.connections.list( + +client.flows.vault.connections.list( page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -23487,7 +23992,7 @@ for page in response.iter_pages():
-
client.flows.vault.connections.create(...) -> AsyncHttpResponse[CreateFlowsVaultConnectionResponseContent] +
client.flows.vault.connections.create(...) -> CreateFlowsVaultConnectionResponseContent
@@ -23500,15 +24005,14 @@ for page in response.iter_pages():
```python -from auth0 import ( - Auth0, - CreateFlowsVaultConnectionActivecampaignApiKey, - FlowsVaultConnectioSetupApiKeyWithBaseUrl, -) +from auth0.management import Auth0, CreateFlowsVaultConnectionActivecampaignApiKey, FlowsVaultConnectioSetupApiKeyWithBaseUrl +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.vault.connections.create( request=CreateFlowsVaultConnectionActivecampaignApiKey( name="name", @@ -23555,7 +24059,7 @@ client.flows.vault.connections.create(
-
client.flows.vault.connections.get(...) -> AsyncHttpResponse[GetFlowsVaultConnectionResponseContent] +
client.flows.vault.connections.get(...) -> GetFlowsVaultConnectionResponseContent
@@ -23568,11 +24072,14 @@ client.flows.vault.connections.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.vault.connections.get( id="id", ) @@ -23611,7 +24118,7 @@ client.flows.vault.connections.get(
-
client.flows.vault.connections.delete(...) -> AsyncHttpResponse[None] +
client.flows.vault.connections.delete(...)
@@ -23624,11 +24131,14 @@ client.flows.vault.connections.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.vault.connections.delete( id="id", ) @@ -23667,7 +24177,7 @@ client.flows.vault.connections.delete(
-
client.flows.vault.connections.update(...) -> AsyncHttpResponse[UpdateFlowsVaultConnectionResponseContent] +
client.flows.vault.connections.update(...) -> UpdateFlowsVaultConnectionResponseContent
@@ -23680,11 +24190,14 @@ client.flows.vault.connections.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.flows.vault.connections.update( id="id", ) @@ -23740,7 +24253,7 @@ client.flows.vault.connections.update(
## Groups Members -
client.groups.members.get(...) -> AsyncPager[GroupMember, GetGroupMembersResponseContent] +
client.groups.members.get(...) -> GetGroupMembersResponseContent
@@ -23767,23 +24280,21 @@ List all users that are a member of this group.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.groups.members.get( + +client.groups.members.get( id="id", fields="fields", include_fields=True, from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -23823,7 +24334,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -23852,7 +24363,7 @@ for page in response.iter_pages():
## Guardian Enrollments -
client.guardian.enrollments.create_ticket(...) -> AsyncHttpResponse[CreateGuardianEnrollmentTicketResponseContent] +
client.guardian.enrollments.create_ticket(...) -> CreateGuardianEnrollmentTicketResponseContent
@@ -23882,11 +24393,14 @@ Note: Users cannot enroll in Email as a factor through custom enrollment tickets
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.enrollments.create_ticket( user_id="user_id", ) @@ -23965,7 +24479,7 @@ client.guardian.enrollments.create_ticket(
-
client.guardian.enrollments.get(...) -> AsyncHttpResponse[GetGuardianEnrollmentResponseContent] +
client.guardian.enrollments.get(...) -> GetGuardianEnrollmentResponseContent
@@ -23992,11 +24506,14 @@ Retrieve details, such as status and type, for a specific multi-factor authentic
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.enrollments.get( id="id", ) @@ -24035,7 +24552,7 @@ client.guardian.enrollments.get(
-
client.guardian.enrollments.delete(...) -> AsyncHttpResponse[None] +
client.guardian.enrollments.delete(...)
@@ -24062,11 +24579,14 @@ Remove a specific multi-factor authentication (MFA) enrollment from a user's acc
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.enrollments.delete( id="id", ) @@ -24106,7 +24626,7 @@ client.guardian.enrollments.delete(
## Guardian Factors -
client.guardian.factors.list() -> AsyncHttpResponse[typing.List[GuardianFactor]] +
client.guardian.factors.list() -> typing.List[GuardianFactor]
@@ -24133,11 +24653,14 @@ Retrieve details of all
-
client.guardian.factors.set(...) -> AsyncHttpResponse[SetGuardianFactorResponseContent] +
client.guardian.factors.set(...) -> SetGuardianFactorResponseContent
@@ -24193,11 +24716,14 @@ Update the status (i.e., enabled or disabled) of a specific multi-factor authent
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.set( name="push-notification", enabled=True, @@ -24246,7 +24772,7 @@ client.guardian.factors.set(
## Guardian Policies -
client.guardian.policies.list() -> AsyncHttpResponse[ListGuardianPoliciesResponseContent] +
client.guardian.policies.list() -> ListGuardianPoliciesResponseContent
@@ -24281,11 +24807,14 @@ The following policies are supported:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.policies.list() ``` @@ -24314,7 +24843,7 @@ client.guardian.policies.list()
-
client.guardian.policies.set(...) -> AsyncHttpResponse[SetGuardianPoliciesResponseContent] +
client.guardian.policies.set(...) -> SetGuardianPoliciesResponseContent
@@ -24349,13 +24878,18 @@ The following policies are supported:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.policies.set( - request=["all-applications"], + request=[ + "all-applications" + ], ) ``` @@ -24393,7 +24927,7 @@ client.guardian.policies.set(
## Guardian Factors Phone -
client.guardian.factors.phone.get_message_types() -> AsyncHttpResponse[GetGuardianFactorPhoneMessageTypesResponseContent] +
client.guardian.factors.phone.get_message_types() -> GetGuardianFactorPhoneMessageTypesResponseContent
@@ -24420,11 +24954,14 @@ Retrieve list of
-
client.guardian.factors.phone.set_message_types(...) -> AsyncHttpResponse[SetGuardianFactorPhoneMessageTypesResponseContent] +
client.guardian.factors.phone.set_message_types(...) -> SetGuardianFactorPhoneMessageTypesResponseContent
@@ -24480,13 +25017,18 @@ Replace the list of
-**message_types:** `typing.Sequence[GuardianFactorPhoneFactorMessageTypeEnum]` — The list of phone factors to enable on the tenant. Can include `sms` and `voice`. +**message_types:** `typing.List[GuardianFactorPhoneFactorMessageTypeEnum]` — The list of phone factors to enable on the tenant. Can include `sms` and `voice`.
@@ -24523,7 +25065,7 @@ client.guardian.factors.phone.set_message_types(
-
client.guardian.factors.phone.get_twilio_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderPhoneTwilioResponseContent] +
client.guardian.factors.phone.get_twilio_provider() -> GetGuardianFactorsProviderPhoneTwilioResponseContent
@@ -24550,11 +25092,14 @@ Retrieve configuration details for a Twilio phone provider that has been set up
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.get_twilio_provider() ``` @@ -24583,7 +25128,7 @@ client.guardian.factors.phone.get_twilio_provider()
-
client.guardian.factors.phone.set_twilio_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPhoneTwilioResponseContent] +
client.guardian.factors.phone.set_twilio_provider(...) -> SetGuardianFactorsProviderPhoneTwilioResponseContent
@@ -24610,11 +25155,14 @@ Update the configuration of a Twilio phone provider that has been set up in your
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.set_twilio_provider() ``` @@ -24631,7 +25179,7 @@ client.guardian.factors.phone.set_twilio_provider()
-**from_:** `typing.Optional[str]` — From number +**from:** `typing.Optional[str]` — From number
@@ -24675,7 +25223,7 @@ client.guardian.factors.phone.set_twilio_provider()
-
client.guardian.factors.phone.get_selected_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderPhoneResponseContent] +
client.guardian.factors.phone.get_selected_provider() -> GetGuardianFactorsProviderPhoneResponseContent
@@ -24702,11 +25250,14 @@ Retrieve details of the multi-factor authentication phone provider configured fo
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.get_selected_provider() ``` @@ -24735,7 +25286,7 @@ client.guardian.factors.phone.get_selected_provider()
-
client.guardian.factors.phone.set_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPhoneResponseContent] +
client.guardian.factors.phone.set_provider(...) -> SetGuardianFactorsProviderPhoneResponseContent
@@ -24748,11 +25299,14 @@ client.guardian.factors.phone.get_selected_provider()
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.set_provider( provider="auth0", ) @@ -24791,7 +25345,7 @@ client.guardian.factors.phone.set_provider(
-
client.guardian.factors.phone.get_templates() -> AsyncHttpResponse[GetGuardianFactorPhoneTemplatesResponseContent] +
client.guardian.factors.phone.get_templates() -> GetGuardianFactorPhoneTemplatesResponseContent
@@ -24818,11 +25372,14 @@ Retrieve details of the multi-factor authentication enrollment and verification
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.get_templates() ``` @@ -24851,7 +25408,7 @@ client.guardian.factors.phone.get_templates()
-
client.guardian.factors.phone.set_templates(...) -> AsyncHttpResponse[SetGuardianFactorPhoneTemplatesResponseContent] +
client.guardian.factors.phone.set_templates(...) -> SetGuardianFactorPhoneTemplatesResponseContent
@@ -24878,11 +25435,14 @@ Customize the messages sent to complete phone enrollment and verification (subsc
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.phone.set_templates( enrollment_message="enrollment_message", verification_message="verification_message", @@ -24931,7 +25491,7 @@ client.guardian.factors.phone.set_templates(
## Guardian Factors PushNotification -
client.guardian.factors.push_notification.get_apns_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderApnsResponseContent] +
client.guardian.factors.push_notification.get_apns_provider() -> GetGuardianFactorsProviderApnsResponseContent
@@ -24958,11 +25518,14 @@ Retrieve configuration details for the multi-factor authentication APNS provider
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.get_apns_provider() ``` @@ -24991,7 +25554,7 @@ client.guardian.factors.push_notification.get_apns_provider()
-
client.guardian.factors.push_notification.set_apns_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPushNotificationApnsResponseContent] +
client.guardian.factors.push_notification.set_apns_provider(...) -> SetGuardianFactorsProviderPushNotificationApnsResponseContent
@@ -25018,11 +25581,14 @@ Overwrite all configuration details of the multi-factor authentication APNS prov
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.set_apns_provider() ``` @@ -25075,9 +25641,7 @@ client.guardian.factors.push_notification.set_apns_provider()
-
client.guardian.factors.push_notification.update_apns_provider(...) -> AsyncHttpResponse[ - UpdateGuardianFactorsProviderPushNotificationApnsResponseContent -] +
client.guardian.factors.push_notification.update_apns_provider(...) -> UpdateGuardianFactorsProviderPushNotificationApnsResponseContent
@@ -25104,11 +25668,14 @@ Modify configuration details of the multi-factor authentication APNS provider as
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.update_apns_provider() ``` @@ -25161,7 +25728,7 @@ client.guardian.factors.push_notification.update_apns_provider()
-
client.guardian.factors.push_notification.set_fcm_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPushNotificationFcmResponseContent] +
client.guardian.factors.push_notification.set_fcm_provider(...) -> SetGuardianFactorsProviderPushNotificationFcmResponseContent
@@ -25188,11 +25755,14 @@ Overwrite all configuration details of the multi-factor authentication FCM provi
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.set_fcm_provider() ``` @@ -25229,9 +25799,7 @@ client.guardian.factors.push_notification.set_fcm_provider()
-
client.guardian.factors.push_notification.update_fcm_provider(...) -> AsyncHttpResponse[ - UpdateGuardianFactorsProviderPushNotificationFcmResponseContent -] +
client.guardian.factors.push_notification.update_fcm_provider(...) -> UpdateGuardianFactorsProviderPushNotificationFcmResponseContent
@@ -25258,11 +25826,14 @@ Modify configuration details of the multi-factor authentication FCM provider ass
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.update_fcm_provider() ``` @@ -25299,9 +25870,7 @@ client.guardian.factors.push_notification.update_fcm_provider()
-
client.guardian.factors.push_notification.set_fcmv_1_provider(...) -> AsyncHttpResponse[ - SetGuardianFactorsProviderPushNotificationFcmv1ResponseContent -] +
client.guardian.factors.push_notification.set_fcmv_1_provider(...) -> SetGuardianFactorsProviderPushNotificationFcmv1ResponseContent
@@ -25328,11 +25897,14 @@ Overwrite all configuration details of the multi-factor authentication FCMV1 pro
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.set_fcmv_1_provider() ``` @@ -25369,9 +25941,7 @@ client.guardian.factors.push_notification.set_fcmv_1_provider()
-
client.guardian.factors.push_notification.update_fcmv_1_provider(...) -> AsyncHttpResponse[ - UpdateGuardianFactorsProviderPushNotificationFcmv1ResponseContent -] +
client.guardian.factors.push_notification.update_fcmv_1_provider(...) -> UpdateGuardianFactorsProviderPushNotificationFcmv1ResponseContent
@@ -25398,11 +25968,14 @@ Modify configuration details of the multi-factor authentication FCMV1 provider a
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.update_fcmv_1_provider() ``` @@ -25439,7 +26012,7 @@ client.guardian.factors.push_notification.update_fcmv_1_provider()
-
client.guardian.factors.push_notification.get_sns_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderSnsResponseContent] +
client.guardian.factors.push_notification.get_sns_provider() -> GetGuardianFactorsProviderSnsResponseContent
@@ -25466,11 +26039,14 @@ Retrieve configuration details for an AWS SNS push notification provider that ha
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.get_sns_provider() ``` @@ -25499,7 +26075,7 @@ client.guardian.factors.push_notification.get_sns_provider()
-
client.guardian.factors.push_notification.set_sns_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPushNotificationSnsResponseContent] +
client.guardian.factors.push_notification.set_sns_provider(...) -> SetGuardianFactorsProviderPushNotificationSnsResponseContent
@@ -25526,11 +26102,14 @@ Configure the
-
client.guardian.factors.push_notification.update_sns_provider(...) -> AsyncHttpResponse[ - UpdateGuardianFactorsProviderPushNotificationSnsResponseContent -] +
client.guardian.factors.push_notification.update_sns_provider(...) -> UpdateGuardianFactorsProviderPushNotificationSnsResponseContent
@@ -25628,11 +26205,14 @@ Configure the
-
client.guardian.factors.push_notification.get_selected_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderPushNotificationResponseContent] +
client.guardian.factors.push_notification.get_selected_provider() -> GetGuardianFactorsProviderPushNotificationResponseContent
@@ -25728,11 +26308,14 @@ Modify the push notification provider configured for your tenant. For more infor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.get_selected_provider() ``` @@ -25761,7 +26344,7 @@ client.guardian.factors.push_notification.get_selected_provider()
-
client.guardian.factors.push_notification.set_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderPushNotificationResponseContent] +
client.guardian.factors.push_notification.set_provider(...) -> SetGuardianFactorsProviderPushNotificationResponseContent
@@ -25788,11 +26371,14 @@ Modify the push notification provider configured for your tenant. For more infor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.push_notification.set_provider( provider="guardian", ) @@ -25832,7 +26418,7 @@ client.guardian.factors.push_notification.set_provider(
## Guardian Factors Sms -
client.guardian.factors.sms.get_twilio_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderSmsTwilioResponseContent] +
client.guardian.factors.sms.get_twilio_provider() -> GetGuardianFactorsProviderSmsTwilioResponseContent
@@ -25861,11 +26447,14 @@ Retrieve the
-
client.guardian.factors.sms.set_twilio_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderSmsTwilioResponseContent] +
client.guardian.factors.sms.set_twilio_provider(...) -> SetGuardianFactorsProviderSmsTwilioResponseContent
@@ -25923,11 +26512,14 @@ This endpoint has been deprecated. To complete this action, use the
-**from_:** `typing.Optional[str]` — From number +**from:** `typing.Optional[str]` — From number
@@ -25988,7 +26580,7 @@ client.guardian.factors.sms.set_twilio_provider()
-
client.guardian.factors.sms.get_selected_provider() -> AsyncHttpResponse[GetGuardianFactorsProviderSmsResponseContent] +
client.guardian.factors.sms.get_selected_provider() -> GetGuardianFactorsProviderSmsResponseContent
@@ -26017,11 +26609,14 @@ This endpoint has been deprecated. To complete this action, use the
-
client.guardian.factors.sms.set_provider(...) -> AsyncHttpResponse[SetGuardianFactorsProviderSmsResponseContent] +
client.guardian.factors.sms.set_provider(...) -> SetGuardianFactorsProviderSmsResponseContent
@@ -26079,11 +26674,14 @@ This endpoint has been deprecated. To complete this action, use the
-
client.guardian.factors.sms.get_templates() -> AsyncHttpResponse[GetGuardianFactorSmsTemplatesResponseContent] +
client.guardian.factors.sms.get_templates() -> GetGuardianFactorSmsTemplatesResponseContent
@@ -26151,11 +26749,14 @@ This endpoint has been deprecated. To complete this action, use the
-
client.guardian.factors.sms.set_templates(...) -> AsyncHttpResponse[SetGuardianFactorSmsTemplatesResponseContent] +
client.guardian.factors.sms.set_templates(...) -> SetGuardianFactorSmsTemplatesResponseContent
@@ -26213,11 +26814,14 @@ This endpoint has been deprecated. To complete this action, use the ## Guardian Factors Duo Settings -
client.guardian.factors.duo.settings.get() -> AsyncHttpResponse[GetGuardianFactorDuoSettingsResponseContent] +
client.guardian.factors.duo.settings.get() -> GetGuardianFactorDuoSettingsResponseContent
@@ -26293,11 +26897,14 @@ Retrieves the DUO account and factor configuration.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.duo.settings.get() ``` @@ -26326,7 +26933,7 @@ client.guardian.factors.duo.settings.get()
-
client.guardian.factors.duo.settings.set(...) -> AsyncHttpResponse[SetGuardianFactorDuoSettingsResponseContent] +
client.guardian.factors.duo.settings.set(...) -> SetGuardianFactorDuoSettingsResponseContent
@@ -26353,11 +26960,14 @@ Set the DUO account configuration and other properties specific to this factor.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.duo.settings.set() ``` @@ -26410,7 +27020,7 @@ client.guardian.factors.duo.settings.set()
-
client.guardian.factors.duo.settings.update(...) -> AsyncHttpResponse[UpdateGuardianFactorDuoSettingsResponseContent] +
client.guardian.factors.duo.settings.update(...) -> UpdateGuardianFactorDuoSettingsResponseContent
@@ -26423,11 +27033,14 @@ client.guardian.factors.duo.settings.set()
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.guardian.factors.duo.settings.update() ``` @@ -26481,7 +27094,7 @@ client.guardian.factors.duo.settings.update()
## Hooks Secrets -
client.hooks.secrets.get(...) -> AsyncHttpResponse[GetHookSecretResponseContent] +
client.hooks.secrets.get(...) -> GetHookSecretResponseContent
@@ -26508,11 +27121,14 @@ Retrieve a hook's secrets by the ID of the hook.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.secrets.get( id="id", ) @@ -26551,7 +27167,7 @@ client.hooks.secrets.get(
-
client.hooks.secrets.create(...) -> AsyncHttpResponse[None] +
client.hooks.secrets.create(...)
@@ -26578,14 +27194,19 @@ Add one or more secrets to an existing hook. Accepts an object of key-value pair
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.secrets.create( id="id", - request={"key": "value"}, + request={ + "key": "value" + }, ) ``` @@ -26630,7 +27251,7 @@ client.hooks.secrets.create(
-
client.hooks.secrets.delete(...) -> AsyncHttpResponse[None] +
client.hooks.secrets.delete(...)
@@ -26657,14 +27278,19 @@ Delete one or more existing secrets for a given hook. Accepts an array of secret
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.secrets.delete( id="id", - request=["string"], + request=[ + "string" + ], ) ``` @@ -26709,7 +27335,7 @@ client.hooks.secrets.delete(
-
client.hooks.secrets.update(...) -> AsyncHttpResponse[None] +
client.hooks.secrets.update(...)
@@ -26736,14 +27362,19 @@ Update one or more existing secrets for an existing hook. Accepts an object of k
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.hooks.secrets.update( id="id", - request={"key": "value"}, + request={ + "key": "value" + }, ) ``` @@ -26789,7 +27420,7 @@ client.hooks.secrets.update(
## Jobs UsersExports -
client.jobs.users_exports.create(...) -> AsyncHttpResponse[CreateExportUsersResponseContent] +
client.jobs.users_exports.create(...) -> CreateExportUsersResponseContent
@@ -26816,11 +27447,14 @@ Export all users to a file via a long-running job.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.jobs.users_exports.create() ``` @@ -26861,7 +27495,7 @@ client.jobs.users_exports.create()
-**fields:** `typing.Optional[typing.Sequence[CreateExportUsersFields]]` — List of fields to be included in the CSV. Defaults to a predefined set of fields. +**fields:** `typing.Optional[typing.List[CreateExportUsersFields]]` — List of fields to be included in the CSV. Defaults to a predefined set of fields.
@@ -26882,7 +27516,7 @@ client.jobs.users_exports.create()
## Jobs UsersImports -
client.jobs.users_imports.create(...) -> AsyncHttpResponse[CreateImportUsersResponseContent] +
client.jobs.users_imports.create(...) -> CreateImportUsersResponseContent
@@ -26909,12 +27543,16 @@ Import users from a
-**users:** `from __future__ import annotations - -core.File` — See core.File for more documentation +**users:** `core.File`
@@ -26987,7 +27623,7 @@ core.File` — See core.File for more documentation
## Jobs VerificationEmail -
client.jobs.verification_email.create(...) -> AsyncHttpResponse[CreateVerificationEmailResponseContent] +
client.jobs.verification_email.create(...) -> CreateVerificationEmailResponseContent
@@ -27016,11 +27652,14 @@ Note: You must have the `Status` toggle enabled for the verification email templ
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.jobs.verification_email.create( user_id="user_id", ) @@ -27084,7 +27723,7 @@ client.jobs.verification_email.create(
## Jobs Errors -
client.jobs.errors.get(...) -> AsyncHttpResponse[ErrorsGetResponse] +
client.jobs.errors.get(...) -> ErrorsGetResponse
@@ -27111,11 +27750,14 @@ Retrieve error details of a failed job.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.jobs.errors.get( id="id", ) @@ -27155,7 +27797,7 @@ client.jobs.errors.get(
## Keys CustomSigning -
client.keys.custom_signing.get() -> AsyncHttpResponse[GetCustomSigningKeysResponseContent] +
client.keys.custom_signing.get() -> GetCustomSigningKeysResponseContent
@@ -27182,11 +27824,14 @@ Get entire jwks representation of custom signing keys.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.custom_signing.get() ``` @@ -27215,7 +27860,7 @@ client.keys.custom_signing.get()
-
client.keys.custom_signing.set(...) -> AsyncHttpResponse[SetCustomSigningKeysResponseContent] +
client.keys.custom_signing.set(...) -> SetCustomSigningKeysResponseContent
@@ -27242,11 +27887,14 @@ Create or replace entire jwks representation of custom signing keys.
```python -from auth0 import Auth0, CustomSigningKeyJwk +from auth0.management import Auth0, CustomSigningKeyJwk +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.custom_signing.set( keys=[ CustomSigningKeyJwk( @@ -27269,7 +27917,7 @@ client.keys.custom_signing.set(
-**keys:** `typing.Sequence[CustomSigningKeyJwk]` — An array of custom public signing keys. +**keys:** `typing.List[CustomSigningKeyJwk]` — An array of custom public signing keys.
@@ -27289,7 +27937,7 @@ client.keys.custom_signing.set(
-
client.keys.custom_signing.delete() -> AsyncHttpResponse[None] +
client.keys.custom_signing.delete()
@@ -27316,11 +27964,14 @@ Delete entire jwks representation of custom signing keys.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.custom_signing.delete() ``` @@ -27350,7 +28001,7 @@ client.keys.custom_signing.delete()
## Keys Encryption -
client.keys.encryption.list(...) -> AsyncPager[EncryptionKey, ListEncryptionKeyOffsetPaginatedResponseContent] +
client.keys.encryption.list(...) -> ListEncryptionKeyOffsetPaginatedResponseContent
@@ -27377,21 +28028,19 @@ Retrieve details of all the encryption keys associated with your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.keys.encryption.list( + +client.keys.encryption.list( page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -27443,7 +28092,7 @@ for page in response.iter_pages():
-
client.keys.encryption.create(...) -> AsyncHttpResponse[CreateEncryptionKeyResponseContent] +
client.keys.encryption.create(...) -> CreateEncryptionKeyResponseContent
@@ -27470,11 +28119,14 @@ Create the new, pre-activated encryption key, without the key material.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.create( type="customer-provided-root-key", ) @@ -27513,7 +28165,7 @@ client.keys.encryption.create(
-
client.keys.encryption.rekey() -> AsyncHttpResponse[None] +
client.keys.encryption.rekey()
@@ -27540,11 +28192,14 @@ Perform rekeying operation on the key hierarchy.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.rekey() ``` @@ -27573,7 +28228,7 @@ client.keys.encryption.rekey()
-
client.keys.encryption.get(...) -> AsyncHttpResponse[GetEncryptionKeyResponseContent] +
client.keys.encryption.get(...) -> GetEncryptionKeyResponseContent
@@ -27600,11 +28255,14 @@ Retrieve details of the encryption key with the given ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.get( kid="kid", ) @@ -27643,7 +28301,7 @@ client.keys.encryption.get(
-
client.keys.encryption.import_(...) -> AsyncHttpResponse[ImportEncryptionKeyResponseContent] +
client.keys.encryption.import(...) -> ImportEncryptionKeyResponseContent
@@ -27670,11 +28328,14 @@ Import wrapped key material and activate encryption key.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.import_( kid="kid", wrapped_key="wrapped_key", @@ -27722,7 +28383,7 @@ client.keys.encryption.import_(
-
client.keys.encryption.delete(...) -> AsyncHttpResponse[None] +
client.keys.encryption.delete(...)
@@ -27749,11 +28410,14 @@ Delete the custom provided encryption key with the given ID and move back to usi
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.delete( kid="kid", ) @@ -27792,7 +28456,7 @@ client.keys.encryption.delete(
-
client.keys.encryption.create_public_wrapping_key(...) -> AsyncHttpResponse[CreateEncryptionKeyPublicWrappingResponseContent] +
client.keys.encryption.create_public_wrapping_key(...) -> CreateEncryptionKeyPublicWrappingResponseContent
@@ -27819,11 +28483,14 @@ Create the public wrapping key to wrap your own encryption key material.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.encryption.create_public_wrapping_key( kid="kid", ) @@ -27863,7 +28530,7 @@ client.keys.encryption.create_public_wrapping_key(
## Keys Signing -
client.keys.signing.list() -> AsyncHttpResponse[typing.List[SigningKeys]] +
client.keys.signing.list() -> typing.List[SigningKeys]
@@ -27890,11 +28557,14 @@ Retrieve details of all the application signing keys associated with your tenant
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.signing.list() ``` @@ -27923,7 +28593,7 @@ client.keys.signing.list()
-
client.keys.signing.rotate() -> AsyncHttpResponse[RotateSigningKeysResponseContent] +
client.keys.signing.rotate() -> RotateSigningKeysResponseContent
@@ -27950,11 +28620,14 @@ Rotate the application signing key of your tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.signing.rotate() ``` @@ -27983,7 +28656,7 @@ client.keys.signing.rotate()
-
client.keys.signing.get(...) -> AsyncHttpResponse[GetSigningKeysResponseContent] +
client.keys.signing.get(...) -> GetSigningKeysResponseContent
@@ -28010,11 +28683,14 @@ Retrieve details of the application signing key with the given ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.signing.get( kid="kid", ) @@ -28053,7 +28729,7 @@ client.keys.signing.get(
-
client.keys.signing.revoke(...) -> AsyncHttpResponse[RevokedSigningKeysResponseContent] +
client.keys.signing.revoke(...) -> RevokedSigningKeysResponseContent
@@ -28080,11 +28756,14 @@ Revoke the application signing key with the given ID.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.keys.signing.revoke( kid="kid", ) @@ -28124,10 +28803,7 @@ client.keys.signing.revoke(
## Organizations ClientGrants -
client.organizations.client_grants.list(...) -> AsyncPager[ - OrganizationClientGrant, - ListOrganizationClientGrantsOffsetPaginatedResponseContent, -] +
client.organizations.client_grants.list(...) -> ListOrganizationClientGrantsOffsetPaginatedResponseContent
@@ -28140,12 +28816,15 @@ client.keys.signing.revoke(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.client_grants.list( + +client.organizations.client_grants.list( id="id", audience="audience", client_id="client_id", @@ -28153,11 +28832,6 @@ response = client.organizations.client_grants.list( per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -28197,7 +28871,7 @@ for page in response.iter_pages():
-**grant_ids:** `typing.Optional[typing.Union[str, typing.Sequence[str]]]` — Optional filter on the ID of the client grant. Must be URL encoded and may be specified multiple times (max 10).
e.g. ../client-grants?grant_ids=id1&grant_ids=id2 +**grant_ids:** `typing.Optional[typing.Union[typing.Optional[str], typing.Sequence[typing.Optional[str]]]]` — Optional filter on the ID of the client grant. Must be URL encoded and may be specified multiple times (max 10).
e.g. ../client-grants?grant_ids=id1&grant_ids=id2
@@ -28241,7 +28915,7 @@ for page in response.iter_pages():
-
client.organizations.client_grants.create(...) -> AsyncHttpResponse[AssociateOrganizationClientGrantResponseContent] +
client.organizations.client_grants.create(...) -> AssociateOrganizationClientGrantResponseContent
@@ -28254,11 +28928,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.client_grants.create( id="id", grant_id="grant_id", @@ -28306,7 +28983,7 @@ client.organizations.client_grants.create(
-
client.organizations.client_grants.delete(...) -> AsyncHttpResponse[None] +
client.organizations.client_grants.delete(...)
@@ -28319,11 +28996,14 @@ client.organizations.client_grants.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.client_grants.delete( id="id", grant_id="grant_id", @@ -28372,10 +29052,7 @@ client.organizations.client_grants.delete(
## Organizations Connections -
client.organizations.connections.list(...) -> AsyncPager[ - OrganizationAllConnectionPost, - ListOrganizationAllConnectionsOffsetPaginatedResponseContent, -] +
client.organizations.connections.list(...) -> ListOrganizationAllConnectionsOffsetPaginatedResponseContent
@@ -28388,23 +29065,21 @@ client.organizations.client_grants.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.connections.list( + +client.organizations.connections.list( id="id", page=1, per_page=1, include_totals=True, is_enabled=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -28472,7 +29147,7 @@ for page in response.iter_pages():
-
client.organizations.connections.create(...) -> AsyncHttpResponse[CreateOrganizationAllConnectionResponseContent] +
client.organizations.connections.create(...) -> CreateOrganizationAllConnectionResponseContent
@@ -28485,11 +29160,14 @@ for page in response.iter_pages():
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.connections.create( id="id", connection_id="connection_id", @@ -28585,7 +29263,7 @@ client.organizations.connections.create(
-
client.organizations.connections.get(...) -> AsyncHttpResponse[GetOrganizationAllConnectionResponseContent] +
client.organizations.connections.get(...) -> GetOrganizationAllConnectionResponseContent
@@ -28598,11 +29276,14 @@ client.organizations.connections.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.connections.get( id="id", connection_id="connection_id", @@ -28650,7 +29331,7 @@ client.organizations.connections.get(
-
client.organizations.connections.delete(...) -> AsyncHttpResponse[None] +
client.organizations.connections.delete(...)
@@ -28663,11 +29344,14 @@ client.organizations.connections.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.connections.delete( id="id", connection_id="connection_id", @@ -28715,7 +29399,7 @@ client.organizations.connections.delete(
-
client.organizations.connections.update(...) -> AsyncHttpResponse[UpdateOrganizationAllConnectionResponseContent] +
client.organizations.connections.update(...) -> UpdateOrganizationAllConnectionResponseContent
@@ -28728,11 +29412,14 @@ client.organizations.connections.delete(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.connections.update( id="id", connection_id="connection_id", @@ -28829,9 +29516,7 @@ client.organizations.connections.update(
## Organizations DiscoveryDomains -
client.organizations.discovery_domains.list(...) -> AsyncPager[ - OrganizationDiscoveryDomain, ListOrganizationDiscoveryDomainsResponseContent -] +
client.organizations.discovery_domains.list(...) -> ListOrganizationDiscoveryDomainsResponseContent
@@ -28859,21 +29544,19 @@ This endpoint is subject to eventual consistency; newly created, updated, or del
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.discovery_domains.list( + +client.organizations.discovery_domains.list( id="id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -28897,7 +29580,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -28925,7 +29608,7 @@ for page in response.iter_pages():
-
client.organizations.discovery_domains.create(...) -> AsyncHttpResponse[CreateOrganizationDiscoveryDomainResponseContent] +
client.organizations.discovery_domains.create(...) -> CreateOrganizationDiscoveryDomainResponseContent
@@ -28952,11 +29635,14 @@ Create a new discovery domain for an organization.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.discovery_domains.create( id="id", domain="domain", @@ -29020,7 +29706,7 @@ client.organizations.discovery_domains.create(
-
client.organizations.discovery_domains.get_by_name(...) -> AsyncHttpResponse[GetOrganizationDiscoveryDomainByNameResponseContent] +
client.organizations.discovery_domains.get_by_name(...) -> GetOrganizationDiscoveryDomainByNameResponseContent
@@ -29048,11 +29734,14 @@ This endpoint is subject to eventual consistency; newly created, updated, or del
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.discovery_domains.get_by_name( id="id", discovery_domain="discovery_domain", @@ -29100,7 +29789,7 @@ client.organizations.discovery_domains.get_by_name(
-
client.organizations.discovery_domains.get(...) -> AsyncHttpResponse[GetOrganizationDiscoveryDomainResponseContent] +
client.organizations.discovery_domains.get(...) -> GetOrganizationDiscoveryDomainResponseContent
@@ -29128,11 +29817,14 @@ This endpoint is subject to eventual consistency; newly created, updated, or del
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.discovery_domains.get( id="id", discovery_domain_id="discovery_domain_id", @@ -29180,7 +29872,7 @@ client.organizations.discovery_domains.get(
-
client.organizations.discovery_domains.delete(...) -> AsyncHttpResponse[None] +
client.organizations.discovery_domains.delete(...)
@@ -29207,11 +29899,14 @@ Remove a discovery domain from an organization. This action cannot be undone.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.discovery_domains.delete( id="id", discovery_domain_id="discovery_domain_id", @@ -29259,7 +29954,7 @@ client.organizations.discovery_domains.delete(
-
client.organizations.discovery_domains.update(...) -> AsyncHttpResponse[UpdateOrganizationDiscoveryDomainResponseContent] +
client.organizations.discovery_domains.update(...) -> UpdateOrganizationDiscoveryDomainResponseContent
@@ -29286,11 +29981,14 @@ Update the verification status and/or use_for_organization_discovery for an orga
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.discovery_domains.update( id="id", discovery_domain_id="discovery_domain_id", @@ -29355,10 +30053,7 @@ client.organizations.discovery_domains.update(
## Organizations EnabledConnections -
client.organizations.enabled_connections.list(...) -> AsyncPager[ - OrganizationConnection, - ListOrganizationConnectionsOffsetPaginatedResponseContent, -] +
client.organizations.enabled_connections.list(...) -> ListOrganizationConnectionsOffsetPaginatedResponseContent
@@ -29385,22 +30080,20 @@ Retrieve details about a specific connection currently enabled for an Organizati
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.enabled_connections.list( + +client.organizations.enabled_connections.list( id="id", page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -29460,7 +30153,7 @@ for page in response.iter_pages():
-
client.organizations.enabled_connections.add(...) -> AsyncHttpResponse[AddOrganizationConnectionResponseContent] +
client.organizations.enabled_connections.add(...) -> AddOrganizationConnectionResponseContent
@@ -29489,11 +30182,14 @@ Enable a specific connection for a given Organization. To enable a connection, i
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.enabled_connections.add( id="id", connection_id="connection_id", @@ -29565,7 +30261,7 @@ client.organizations.enabled_connections.add(
-
client.organizations.enabled_connections.get(...) -> AsyncHttpResponse[GetOrganizationConnectionResponseContent] +
client.organizations.enabled_connections.get(...) -> GetOrganizationConnectionResponseContent
@@ -29592,11 +30288,14 @@ Retrieve details about a specific connection currently enabled for an Organizati
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.enabled_connections.get( id="id", connection_id="connectionId", @@ -29644,7 +30343,7 @@ client.organizations.enabled_connections.get(
-
client.organizations.enabled_connections.delete(...) -> AsyncHttpResponse[None] +
client.organizations.enabled_connections.delete(...)
@@ -29673,11 +30372,14 @@ Disable a specific connection for an Organization. Once disabled, Organization m
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.enabled_connections.delete( id="id", connection_id="connectionId", @@ -29725,7 +30427,7 @@ client.organizations.enabled_connections.delete(
-
client.organizations.enabled_connections.update(...) -> AsyncHttpResponse[UpdateOrganizationConnectionResponseContent] +
client.organizations.enabled_connections.update(...) -> UpdateOrganizationConnectionResponseContent
@@ -29752,11 +30454,14 @@ Modify the details of a specific connection currently enabled for an Organizatio
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.enabled_connections.update( id="id", connection_id="connectionId", @@ -29829,10 +30534,7 @@ client.organizations.enabled_connections.update(
## Organizations Invitations -
client.organizations.invitations.list(...) -> AsyncPager[ - OrganizationInvitation, - ListOrganizationInvitationsOffsetPaginatedResponseContent, -] +
client.organizations.invitations.list(...) -> ListOrganizationInvitationsOffsetPaginatedResponseContent
@@ -29859,12 +30561,15 @@ Retrieve a detailed list of invitations sent to users for a specific Organizatio
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.invitations.list( + +client.organizations.invitations.list( id="id", page=1, per_page=1, @@ -29873,11 +30578,6 @@ response = client.organizations.invitations.list( include_fields=True, sort="sort", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -29961,7 +30661,7 @@ for page in response.iter_pages():
-
client.organizations.invitations.create(...) -> AsyncHttpResponse[CreateOrganizationInvitationResponseContent] +
client.organizations.invitations.create(...) -> CreateOrganizationInvitationResponseContent
@@ -29988,15 +30688,14 @@ Create a user invitation for a specific Organization. Upon creation, the listed
```python -from auth0 import ( - Auth0, - OrganizationInvitationInvitee, - OrganizationInvitationInviter, -) +from auth0.management import Auth0, OrganizationInvitationInviter, OrganizationInvitationInvitee +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.invitations.create( id="id", inviter=OrganizationInvitationInviter( @@ -30086,7 +30785,7 @@ client.organizations.invitations.create(
-**roles:** `typing.Optional[typing.Sequence[str]]` — List of roles IDs to associated with the user. +**roles:** `typing.Optional[typing.List[str]]` — List of roles IDs to associated with the user.
@@ -30114,7 +30813,7 @@ client.organizations.invitations.create(
-
client.organizations.invitations.get(...) -> AsyncHttpResponse[GetOrganizationInvitationResponseContent] +
client.organizations.invitations.get(...) -> GetOrganizationInvitationResponseContent
@@ -30127,11 +30826,14 @@ client.organizations.invitations.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.invitations.get( id="id", invitation_id="invitation_id", @@ -30197,7 +30899,7 @@ client.organizations.invitations.get(
-
client.organizations.invitations.delete(...) -> AsyncHttpResponse[None] +
client.organizations.invitations.delete(...)
@@ -30210,11 +30912,14 @@ client.organizations.invitations.get(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.invitations.delete( id="id", invitation_id="invitation_id", @@ -30263,7 +30968,7 @@ client.organizations.invitations.delete(
## Organizations Members -
client.organizations.members.list(...) -> AsyncPager[OrganizationMember, ListOrganizationMembersPaginatedResponseContent] +
client.organizations.members.list(...) -> ListOrganizationMembersPaginatedResponseContent
@@ -30311,23 +31016,21 @@ To search by checkpoint, use the following parameters: - from: Optional id from
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.members.list( + +client.organizations.members.list( id="id", from_="from", take=1, fields="fields", include_fields=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -30351,7 +31054,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -30395,7 +31098,7 @@ for page in response.iter_pages():
-
client.organizations.members.create(...) -> AsyncHttpResponse[None] +
client.organizations.members.create(...)
@@ -30424,14 +31127,19 @@ To add a user to an Organization through this action, the user must already exis
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.members.create( id="id", - members=["members"], + members=[ + "members" + ], ) ``` @@ -30456,7 +31164,7 @@ client.organizations.members.create(
-**members:** `typing.Sequence[str]` — List of user IDs to add to the organization as members. +**members:** `typing.List[str]` — List of user IDs to add to the organization as members.
@@ -30476,7 +31184,7 @@ client.organizations.members.create(
-
client.organizations.members.delete(...) -> AsyncHttpResponse[None] +
client.organizations.members.delete(...)
@@ -30489,14 +31197,19 @@ client.organizations.members.create(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.members.delete( id="id", - members=["members"], + members=[ + "members" + ], ) ``` @@ -30521,7 +31234,7 @@ client.organizations.members.delete(
-**members:** `typing.Sequence[str]` — List of user IDs to remove from the organization. +**members:** `typing.List[str]` — List of user IDs to remove from the organization.
@@ -30542,7 +31255,7 @@ client.organizations.members.delete(
## Organizations Members Roles -
client.organizations.members.roles.list(...) -> AsyncPager[Role, ListOrganizationMemberRolesOffsetPaginatedResponseContent] +
client.organizations.members.roles.list(...) -> ListOrganizationMemberRolesOffsetPaginatedResponseContent
@@ -30571,23 +31284,21 @@ Users can be members of multiple Organizations with unique roles assigned for ea
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.organizations.members.roles.list( + +client.organizations.members.roles.list( id="id", user_id="user_id", page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -30655,7 +31366,7 @@ for page in response.iter_pages():
-
client.organizations.members.roles.assign(...) -> AsyncHttpResponse[None] +
client.organizations.members.roles.assign(...)
@@ -30684,15 +31395,20 @@ Users can be members of multiple Organizations with unique roles assigned for ea
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.members.roles.assign( id="id", user_id="user_id", - roles=["roles"], + roles=[ + "roles" + ], ) ``` @@ -30725,7 +31441,7 @@ client.organizations.members.roles.assign(
-**roles:** `typing.Sequence[str]` — List of roles IDs to associated with the user. +**roles:** `typing.List[str]` — List of roles IDs to associated with the user.
@@ -30745,7 +31461,7 @@ client.organizations.members.roles.assign(
-
client.organizations.members.roles.delete(...) -> AsyncHttpResponse[None] +
client.organizations.members.roles.delete(...)
@@ -30774,15 +31490,20 @@ Users can be members of multiple Organizations with unique roles assigned for ea
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.organizations.members.roles.delete( id="id", user_id="user_id", - roles=["roles"], + roles=[ + "roles" + ], ) ``` @@ -30815,7 +31536,7 @@ client.organizations.members.roles.delete(
-**roles:** `typing.Sequence[str]` — List of roles IDs associated with the organization member to remove. +**roles:** `typing.List[str]` — List of roles IDs associated with the organization member to remove.
@@ -30836,9 +31557,7 @@ client.organizations.members.roles.delete(
## Prompts Rendering -
client.prompts.rendering.list(...) -> AsyncPager[ - ListAculsResponseContentItem, ListAculsOffsetPaginatedResponseContent -] +
client.prompts.rendering.list(...) -> ListAculsOffsetPaginatedResponseContent
@@ -30865,12 +31584,15 @@ Get render setting configurations for all screens.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.prompts.rendering.list( + +client.prompts.rendering.list( fields="fields", include_fields=True, page=1, @@ -30880,11 +31602,6 @@ response = client.prompts.rendering.list( screen="screen", rendering_mode="advanced", ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -30976,7 +31693,7 @@ for page in response.iter_pages():
-
client.prompts.rendering.bulk_update(...) -> AsyncHttpResponse[BulkUpdateAculResponseContent] +
client.prompts.rendering.bulk_update(...) -> BulkUpdateAculResponseContent
@@ -31003,11 +31720,14 @@ Learn more about ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.rendering.update( prompt="login", screen="login", @@ -31229,7 +31955,7 @@ client.prompts.rendering.update(
-**head_tags:** `typing.Optional[typing.Sequence[AculHeadTag]]` — An array of head tags +**head_tags:** `typing.Optional[typing.List[AculHeadTag]]` — An array of head tags
@@ -31258,7 +31984,7 @@ client.prompts.rendering.update(
## Prompts CustomText -
client.prompts.custom_text.get(...) -> AsyncHttpResponse[GetCustomTextsByLanguageResponseContent] +
client.prompts.custom_text.get(...) -> GetCustomTextsByLanguageResponseContent
@@ -31285,11 +32011,14 @@ Retrieve custom text for a specific prompt and language.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.custom_text.get( prompt="login", language="am", @@ -31337,7 +32066,7 @@ client.prompts.custom_text.get(
-
client.prompts.custom_text.set(...) -> AsyncHttpResponse[None] +
client.prompts.custom_text.set(...)
@@ -31364,15 +32093,20 @@ Set custom text for a specific prompt. Existing texts will be overwritten.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.custom_text.set( prompt="login", language="am", - request={"key": "value"}, + request={ + "key": "value" + }, ) ``` @@ -31426,7 +32160,7 @@ client.prompts.custom_text.set(
## Prompts Partials -
client.prompts.partials.get(...) -> AsyncHttpResponse[GetPartialsResponseContent] +
client.prompts.partials.get(...) -> GetPartialsResponseContent
@@ -31453,11 +32187,14 @@ Get template partials for a prompt
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.partials.get( prompt="login", ) @@ -31496,7 +32233,7 @@ client.prompts.partials.get(
-
client.prompts.partials.set(...) -> AsyncHttpResponse[None] +
client.prompts.partials.set(...)
@@ -31523,14 +32260,19 @@ Set template partials for a prompt
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.prompts.partials.set( prompt="login", - request={"key": "value"}, + request={ + "key": "value" + }, ) ``` @@ -31576,7 +32318,7 @@ client.prompts.partials.set(
## RiskAssessments Settings -
client.risk_assessments.settings.get() -> AsyncHttpResponse[GetRiskAssessmentsSettingsResponseContent] +
client.risk_assessments.settings.get() -> GetRiskAssessmentsSettingsResponseContent
@@ -31603,11 +32345,14 @@ Gets the tenant settings for risk assessments
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.risk_assessments.settings.get() ``` @@ -31636,7 +32381,7 @@ client.risk_assessments.settings.get()
-
client.risk_assessments.settings.update(...) -> AsyncHttpResponse[UpdateRiskAssessmentsSettingsResponseContent] +
client.risk_assessments.settings.update(...) -> UpdateRiskAssessmentsSettingsResponseContent
@@ -31663,11 +32408,14 @@ Updates the tenant settings for risk assessments
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.risk_assessments.settings.update( enabled=True, ) @@ -31707,7 +32455,7 @@ client.risk_assessments.settings.update(
## RiskAssessments Settings NewDevice -
client.risk_assessments.settings.new_device.get() -> AsyncHttpResponse[GetRiskAssessmentsSettingsNewDeviceResponseContent] +
client.risk_assessments.settings.new_device.get() -> GetRiskAssessmentsSettingsNewDeviceResponseContent
@@ -31734,11 +32482,14 @@ Gets the risk assessment settings for the new device assessor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.risk_assessments.settings.new_device.get() ``` @@ -31767,7 +32518,7 @@ client.risk_assessments.settings.new_device.get()
-
client.risk_assessments.settings.new_device.update(...) -> AsyncHttpResponse[UpdateRiskAssessmentsSettingsNewDeviceResponseContent] +
client.risk_assessments.settings.new_device.update(...) -> UpdateRiskAssessmentsSettingsNewDeviceResponseContent
@@ -31794,11 +32545,14 @@ Updates the risk assessment settings for the new device assessor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.risk_assessments.settings.new_device.update( remember_for=1, ) @@ -31838,10 +32592,7 @@ client.risk_assessments.settings.new_device.update(
## Roles Permissions -
client.roles.permissions.list(...) -> AsyncPager[ - PermissionsResponsePayload, - ListRolePermissionsOffsetPaginatedResponseContent, -] +
client.roles.permissions.list(...) -> ListRolePermissionsOffsetPaginatedResponseContent
@@ -31868,22 +32619,20 @@ Retrieve detailed list (name, description, resource server) of permissions grant
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.roles.permissions.list( + +client.roles.permissions.list( id="id", per_page=1, page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -31943,7 +32692,7 @@ for page in response.iter_pages():
-
client.roles.permissions.add(...) -> AsyncHttpResponse[None] +
client.roles.permissions.add(...)
@@ -31970,11 +32719,14 @@ Add one or more
-**permissions:** `typing.Sequence[PermissionRequestPayload]` — array of resource_server_identifier, permission_name pairs. +**permissions:** `typing.List[PermissionRequestPayload]` — array of resource_server_identifier, permission_name pairs.
@@ -32027,7 +32779,7 @@ client.roles.permissions.add(
-
client.roles.permissions.delete(...) -> AsyncHttpResponse[None] +
client.roles.permissions.delete(...)
@@ -32054,11 +32806,14 @@ Remove one or more
-**permissions:** `typing.Sequence[PermissionRequestPayload]` — array of resource_server_identifier, permission_name pairs. +**permissions:** `typing.List[PermissionRequestPayload]` — array of resource_server_identifier, permission_name pairs.
@@ -32112,7 +32867,7 @@ client.roles.permissions.delete(
## Roles Users -
client.roles.users.list(...) -> AsyncPager[RoleUser, ListRoleUsersPaginatedResponseContent] +
client.roles.users.list(...) -> ListRoleUsersPaginatedResponseContent
@@ -32157,21 +32912,19 @@ To search by checkpoint, use the following parameters:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.roles.users.list( + +client.roles.users.list( id="id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -32195,7 +32948,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -32223,7 +32976,7 @@ for page in response.iter_pages():
-
client.roles.users.assign(...) -> AsyncHttpResponse[None] +
client.roles.users.assign(...)
@@ -32252,14 +33005,19 @@ Assign one or more users to an existing user role. To learn more, review ```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.roles.users.assign( id="id", - users=["users"], + users=[ + "users" + ], ) ``` @@ -32284,7 +33042,7 @@ client.roles.users.assign(
-**users:** `typing.Sequence[str]` — user_id's of the users to assign the role to. +**users:** `typing.List[str]` — user_id's of the users to assign the role to.
@@ -32305,7 +33063,7 @@ client.roles.users.assign(
## SelfServiceProfiles CustomText -
client.self_service_profiles.custom_text.list(...) -> AsyncHttpResponse[ListSelfServiceProfileCustomTextResponseContent] +
client.self_service_profiles.custom_text.list(...) -> ListSelfServiceProfileCustomTextResponseContent
@@ -32332,11 +33090,14 @@ Retrieves text customizations for a given self-service profile, language and Sel
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.custom_text.list( id="id", language="en", @@ -32393,7 +33154,7 @@ client.self_service_profiles.custom_text.list(
-
client.self_service_profiles.custom_text.set(...) -> AsyncHttpResponse[SetSelfServiceProfileCustomTextResponseContent] +
client.self_service_profiles.custom_text.set(...) -> SetSelfServiceProfileCustomTextResponseContent
@@ -32420,16 +33181,21 @@ Updates text customizations for a given self-service profile, language and Self
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.custom_text.set( id="id", language="en", page="get-started", - request={"key": "value"}, + request={ + "key": "value" + }, ) ``` @@ -32491,7 +33257,7 @@ client.self_service_profiles.custom_text.set(
## SelfServiceProfiles SsoTicket -
client.self_service_profiles.sso_ticket.create(...) -> AsyncHttpResponse[CreateSelfServiceProfileSsoTicketResponseContent] +
client.self_service_profiles.sso_ticket.create(...) -> CreateSelfServiceProfileSsoTicketResponseContent
@@ -32518,11 +33284,14 @@ Creates an SSO access ticket to initiate the Self Service SSO Flow using a self-
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.sso_ticket.create( id="id", ) @@ -32565,7 +33334,7 @@ client.self_service_profiles.sso_ticket.create(
-**enabled_clients:** `typing.Optional[typing.Sequence[str]]` — List of client_ids that the connection will be enabled for. +**enabled_clients:** `typing.Optional[typing.List[str]]` — List of client_ids that the connection will be enabled for.
@@ -32573,7 +33342,7 @@ client.self_service_profiles.sso_ticket.create(
-**enabled_organizations:** `typing.Optional[typing.Sequence[SelfServiceProfileSsoTicketEnabledOrganization]]` — List of organizations that the connection will be enabled for. +**enabled_organizations:** `typing.Optional[typing.List[SelfServiceProfileSsoTicketEnabledOrganization]]` — List of organizations that the connection will be enabled for.
@@ -32625,7 +33394,7 @@ client.self_service_profiles.sso_ticket.create(
-
client.self_service_profiles.sso_ticket.revoke(...) -> AsyncHttpResponse[None] +
client.self_service_profiles.sso_ticket.revoke(...)
@@ -32653,11 +33422,14 @@ Clients should treat these `202` responses as an acknowledgment that the request
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.self_service_profiles.sso_ticket.revoke( profile_id="profileId", id="id", @@ -32706,7 +33478,7 @@ client.self_service_profiles.sso_ticket.revoke(
## Tenants Settings -
client.tenants.settings.get(...) -> AsyncHttpResponse[GetTenantSettingsResponseContent] +
client.tenants.settings.get(...) -> GetTenantSettingsResponseContent
@@ -32733,11 +33505,14 @@ Retrieve tenant settings. A list of fields to include or exclude may also be spe
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.tenants.settings.get( fields="fields", include_fields=True, @@ -32785,7 +33560,7 @@ client.tenants.settings.get(
-
client.tenants.settings.update(...) -> AsyncHttpResponse[UpdateTenantSettingsResponseContent] +
client.tenants.settings.update(...) -> UpdateTenantSettingsResponseContent
@@ -32812,11 +33587,14 @@ Update settings for a tenant.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.tenants.settings.update() ``` @@ -32929,7 +33707,7 @@ client.tenants.settings.update()
-**allowed_logout_urls:** `typing.Optional[typing.Sequence[str]]` — URLs that are valid to redirect to after logout from Auth0. +**allowed_logout_urls:** `typing.Optional[typing.List[str]]` — URLs that are valid to redirect to after logout from Auth0.
@@ -32993,7 +33771,7 @@ client.tenants.settings.update()
-**enabled_locales:** `typing.Optional[typing.Sequence[TenantSettingsSupportedLocalesEnum]]` — Supported locales for the user interface +**enabled_locales:** `typing.Optional[typing.List[TenantSettingsSupportedLocalesEnum]]` — Supported locales for the user interface
@@ -33041,7 +33819,7 @@ client.tenants.settings.update()
-**acr_values_supported:** `typing.Optional[typing.Sequence[str]]` — Supported ACR values +**acr_values_supported:** `typing.Optional[typing.List[str]]` — Supported ACR values
@@ -33122,10 +33900,7 @@ See https://auth0.com/docs/secure/security-guidance/measures-against-app-imperso
## Users AuthenticationMethods -
client.users.authentication_methods.list(...) -> AsyncPager[ - UserAuthenticationMethod, - ListUserAuthenticationMethodsOffsetPaginatedResponseContent, -] +
client.users.authentication_methods.list(...) -> ListUserAuthenticationMethodsOffsetPaginatedResponseContent
@@ -33152,22 +33927,20 @@ Retrieve detailed list of authentication methods associated with a specified use
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.authentication_methods.list( + +client.users.authentication_methods.list( id="id", page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -33227,7 +34000,7 @@ for page in response.iter_pages():
-
client.users.authentication_methods.create(...) -> AsyncHttpResponse[CreateUserAuthenticationMethodResponseContent] +
client.users.authentication_methods.create(...) -> CreateUserAuthenticationMethodResponseContent
@@ -33254,11 +34027,14 @@ Create an authentication method. Authentication methods created via this endpoin
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authentication_methods.create( id="id", type="phone", @@ -33370,7 +34146,7 @@ client.users.authentication_methods.create(
-
client.users.authentication_methods.set(...) -> AsyncHttpResponse[typing.List[SetUserAuthenticationMethodResponseContent]] +
client.users.authentication_methods.set(...) -> typing.List[SetUserAuthenticationMethodResponseContent]
@@ -33399,11 +34175,14 @@ Replace the specified user
-
client.users.authentication_methods.delete_all(...) -> AsyncHttpResponse[None] +
client.users.authentication_methods.delete_all(...)
@@ -33482,11 +34261,14 @@ Remove all authentication methods (i.e., enrolled MFA factors) from the specifie
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authentication_methods.delete_all( id="id", ) @@ -33525,7 +34307,7 @@ client.users.authentication_methods.delete_all(
-
client.users.authentication_methods.get(...) -> AsyncHttpResponse[GetUserAuthenticationMethodResponseContent] +
client.users.authentication_methods.get(...) -> GetUserAuthenticationMethodResponseContent
@@ -33538,11 +34320,14 @@ client.users.authentication_methods.delete_all(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authentication_methods.get( id="id", authentication_method_id="authentication_method_id", @@ -33590,7 +34375,7 @@ client.users.authentication_methods.get(
-
client.users.authentication_methods.delete(...) -> AsyncHttpResponse[None] +
client.users.authentication_methods.delete(...)
@@ -33617,11 +34402,14 @@ Remove the authentication method with the given ID from the specified user. For
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authentication_methods.delete( id="id", authentication_method_id="authentication_method_id", @@ -33669,7 +34457,7 @@ client.users.authentication_methods.delete(
-
client.users.authentication_methods.update(...) -> AsyncHttpResponse[UpdateUserAuthenticationMethodResponseContent] +
client.users.authentication_methods.update(...) -> UpdateUserAuthenticationMethodResponseContent
@@ -33696,11 +34484,14 @@ Modify the authentication method with the given ID from the specified user. For
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authentication_methods.update( id="id", authentication_method_id="authentication_method_id", @@ -33765,7 +34556,7 @@ client.users.authentication_methods.update(
## Users Authenticators -
client.users.authenticators.delete_all(...) -> AsyncHttpResponse[None] +
client.users.authenticators.delete_all(...)
@@ -33792,11 +34583,14 @@ Remove all authenticators registered to a given user ID, such as OTP, email, pho
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.authenticators.delete_all( id="id", ) @@ -33836,7 +34630,7 @@ client.users.authenticators.delete_all(
## Users ConnectedAccounts -
client.users.connected_accounts.list(...) -> AsyncPager[ConnectedAccount, ListUserConnectedAccountsResponseContent] +
client.users.connected_accounts.list(...) -> ListUserConnectedAccountsResponseContent
@@ -33863,21 +34657,19 @@ Retrieve all connected accounts associated with the user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.connected_accounts.list( + +client.users.connected_accounts.list( id="id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -33901,7 +34693,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -33930,7 +34722,7 @@ for page in response.iter_pages():
## Users Enrollments -
client.users.enrollments.get(...) -> AsyncHttpResponse[typing.List[UsersEnrollment]] +
client.users.enrollments.get(...) -> typing.List[UsersEnrollment]
@@ -33957,11 +34749,14 @@ Retrieve the first ## Users FederatedConnectionsTokensets -
client.users.federated_connections_tokensets.list(...) -> AsyncHttpResponse[typing.List[FederatedConnectionTokenSet]] +
client.users.federated_connections_tokensets.list(...) -> typing.List[FederatedConnectionTokenSet]
@@ -34028,11 +34823,14 @@ List active federated connections tokensets for a provided user
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.federated_connections_tokensets.list( id="id", ) @@ -34071,7 +34869,7 @@ client.users.federated_connections_tokensets.list(
-
client.users.federated_connections_tokensets.delete(...) -> AsyncHttpResponse[None] +
client.users.federated_connections_tokensets.delete(...)
@@ -34084,11 +34882,14 @@ client.users.federated_connections_tokensets.list(
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.federated_connections_tokensets.delete( id="id", tokenset_id="tokenset_id", @@ -34137,7 +34938,7 @@ client.users.federated_connections_tokensets.delete(
## Users Groups -
client.users.groups.get(...) -> AsyncPager[UserGroupsResponseSchema, GetUserGroupsPaginatedResponseContent] +
client.users.groups.get(...) -> GetUserGroupsPaginatedResponseContent
@@ -34164,23 +34965,21 @@ List all groups to which this user belongs.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.groups.get( + +client.users.groups.get( id="id", fields="fields", include_fields=True, from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -34220,7 +35019,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -34249,7 +35048,7 @@ for page in response.iter_pages():
## Users Identities -
client.users.identities.link(...) -> AsyncHttpResponse[typing.List[UserIdentity]] +
client.users.identities.link(...) -> typing.List[UserIdentity]
@@ -34303,11 +35102,14 @@ Note: There are two ways of invoking the endpoint:
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.identities.link( id="id", ) @@ -34378,7 +35180,7 @@ client.users.identities.link(
-
client.users.identities.delete(...) -> AsyncHttpResponse[DeleteUserIdentityResponseContent] +
client.users.identities.delete(...) -> DeleteUserIdentityResponseContent
@@ -34407,11 +35209,14 @@ Unlinking the secondary account removes it from the identities array of the targ
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.identities.delete( id="id", provider="ad", @@ -34469,7 +35274,7 @@ client.users.identities.delete(
## Users Logs -
client.users.logs.list(...) -> AsyncPager[Log, UserListLogOffsetPaginatedResponseContent] +
client.users.logs.list(...) -> UserListLogOffsetPaginatedResponseContent
@@ -34502,23 +35307,21 @@ Auth0 @@ -34587,7 +35390,7 @@ for page in response.iter_pages():
## Users Multifactor -
client.users.multifactor.invalidate_remember_browser(...) -> AsyncHttpResponse[None] +
client.users.multifactor.invalidate_remember_browser(...)
@@ -34614,11 +35417,14 @@ Invalidate all remembered browsers across all
-
client.users.multifactor.delete_provider(...) -> AsyncHttpResponse[None] +
client.users.multifactor.delete_provider(...)
@@ -34684,11 +35490,14 @@ Remove a multifactor
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.multifactor.delete_provider( id="id", provider="duo", @@ -34737,7 +35546,7 @@ client.users.multifactor.delete_provider(
## Users Organizations -
client.users.organizations.list(...) -> AsyncPager[Organization, ListUserOrganizationsOffsetPaginatedResponseContent] +
client.users.organizations.list(...) -> ListUserOrganizationsOffsetPaginatedResponseContent
@@ -34764,22 +35573,20 @@ Retrieve list of the specified user's current Organization memberships. User mus
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.organizations.list( + +client.users.organizations.list( id="id", page=1, per_page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -34840,9 +35647,7 @@ for page in response.iter_pages():
## Users Permissions -
client.users.permissions.list(...) -> AsyncPager[ - UserPermissionSchema, ListUserPermissionsOffsetPaginatedResponseContent -] +
client.users.permissions.list(...) -> ListUserPermissionsOffsetPaginatedResponseContent
@@ -34869,22 +35674,20 @@ Retrieve all permissions associated with the user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.permissions.list( + +client.users.permissions.list( id="id", per_page=1, page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -34944,7 +35747,7 @@ for page in response.iter_pages():
-
client.users.permissions.create(...) -> AsyncHttpResponse[None] +
client.users.permissions.create(...)
@@ -34971,11 +35774,14 @@ Assign permissions to a user.
```python -from auth0 import Auth0, PermissionRequestPayload +from auth0.management import Auth0, PermissionRequestPayload +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.permissions.create( id="id", permissions=[ @@ -35008,7 +35814,7 @@ client.users.permissions.create(
-**permissions:** `typing.Sequence[PermissionRequestPayload]` — List of permissions to add to this user. +**permissions:** `typing.List[PermissionRequestPayload]` — List of permissions to add to this user.
@@ -35028,7 +35834,7 @@ client.users.permissions.create(
-
client.users.permissions.delete(...) -> AsyncHttpResponse[None] +
client.users.permissions.delete(...)
@@ -35055,11 +35861,14 @@ Remove permissions from a user.
```python -from auth0 import Auth0, PermissionRequestPayload +from auth0.management import Auth0, PermissionRequestPayload +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.permissions.delete( id="id", permissions=[ @@ -35092,7 +35901,7 @@ client.users.permissions.delete(
-**permissions:** `typing.Sequence[PermissionRequestPayload]` — List of permissions to remove from this user. +**permissions:** `typing.List[PermissionRequestPayload]` — List of permissions to remove from this user.
@@ -35113,7 +35922,7 @@ client.users.permissions.delete(
## Users RiskAssessments -
client.users.risk_assessments.clear(...) -> AsyncHttpResponse[None] +
client.users.risk_assessments.clear(...)
@@ -35140,15 +35949,20 @@ Clear risk assessment assessors for a specific user
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.risk_assessments.clear( id="id", connection="connection", - assessors=["new-device"], + assessors=[ + "new-device" + ], ) ``` @@ -35181,7 +35995,7 @@ client.users.risk_assessments.clear(
-**assessors:** `typing.Sequence[AssessorsTypeEnum]` — List of assessors to clear. +**assessors:** `typing.List[AssessorsTypeEnum]` — List of assessors to clear.
@@ -35202,7 +36016,7 @@ client.users.risk_assessments.clear(
## Users Roles -
client.users.roles.list(...) -> AsyncPager[Role, ListUserRolesOffsetPaginatedResponseContent] +
client.users.roles.list(...) -> ListUserRolesOffsetPaginatedResponseContent
@@ -35231,22 +36045,20 @@ Retrieve detailed list of all user roles currently assigned to a user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.roles.list( + +client.users.roles.list( id="id", per_page=1, page=1, include_totals=True, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -35306,7 +36118,7 @@ for page in response.iter_pages():
-
client.users.roles.assign(...) -> AsyncHttpResponse[None] +
client.users.roles.assign(...)
@@ -35335,14 +36147,19 @@ Assign one or more existing user roles to a user. For more information, review <
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.roles.assign( id="id", - roles=["roles"], + roles=[ + "roles" + ], ) ``` @@ -35367,7 +36184,7 @@ client.users.roles.assign(
-**roles:** `typing.Sequence[str]` — List of roles IDs to associated with the user. +**roles:** `typing.List[str]` — List of roles IDs to associated with the user.
@@ -35387,7 +36204,7 @@ client.users.roles.assign(
-
client.users.roles.delete(...) -> AsyncHttpResponse[None] +
client.users.roles.delete(...)
@@ -35416,14 +36233,19 @@ Remove one or more specified user roles assigned to a user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.roles.delete( id="id", - roles=["roles"], + roles=[ + "roles" + ], ) ``` @@ -35448,7 +36270,7 @@ client.users.roles.delete(
-**roles:** `typing.Sequence[str]` — List of roles IDs to remove from the user. +**roles:** `typing.List[str]` — List of roles IDs to remove from the user.
@@ -35469,9 +36291,7 @@ client.users.roles.delete(
## Users RefreshToken -
client.users.refresh_token.list(...) -> AsyncPager[ - RefreshTokenResponseContent, ListRefreshTokensPaginatedResponseContent -] +
client.users.refresh_token.list(...) -> ListRefreshTokensPaginatedResponseContent
@@ -35498,21 +36318,19 @@ Retrieve details for a user's refresh tokens.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.refresh_token.list( + +client.users.refresh_token.list( user_id="user_id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -35536,7 +36354,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — An optional cursor from which to start the selection (exclusive). +**from:** `typing.Optional[str]` — An optional cursor from which to start the selection (exclusive).
@@ -35564,7 +36382,7 @@ for page in response.iter_pages():
-
client.users.refresh_token.delete(...) -> AsyncHttpResponse[None] +
client.users.refresh_token.delete(...)
@@ -35591,11 +36409,14 @@ Delete all refresh tokens for a user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.refresh_token.delete( user_id="user_id", ) @@ -35635,7 +36456,7 @@ client.users.refresh_token.delete(
## Users Sessions -
client.users.sessions.list(...) -> AsyncPager[SessionResponseContent, ListUserSessionsPaginatedResponseContent] +
client.users.sessions.list(...) -> ListUserSessionsPaginatedResponseContent
@@ -35662,21 +36483,19 @@ Retrieve details for a user's sessions.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.users.sessions.list( + +client.users.sessions.list( user_id="user_id", from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -35700,7 +36519,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — An optional cursor from which to start the selection (exclusive). +**from:** `typing.Optional[str]` — An optional cursor from which to start the selection (exclusive).
@@ -35728,7 +36547,7 @@ for page in response.iter_pages():
-
client.users.sessions.delete(...) -> AsyncHttpResponse[None] +
client.users.sessions.delete(...)
@@ -35755,11 +36574,14 @@ Delete all sessions for a user.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.users.sessions.delete( user_id="user_id", ) @@ -35799,10 +36621,7 @@ client.users.sessions.delete(
## VerifiableCredentials Verification Templates -
client.verifiable_credentials.verification.templates.list(...) -> AsyncPager[ - VerifiableCredentialTemplateResponse, - ListVerifiableCredentialTemplatesPaginatedResponseContent, -] +
client.verifiable_credentials.verification.templates.list(...) -> ListVerifiableCredentialTemplatesPaginatedResponseContent
@@ -35829,20 +36648,18 @@ List a verifiable credential templates.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) -response = client.verifiable_credentials.verification.templates.list( + +client.verifiable_credentials.verification.templates.list( from_="from", take=1, ) -for item in response: - yield item -# alternatively, you can paginate page-by-page -for page in response.iter_pages(): - yield page ```
@@ -35858,7 +36675,7 @@ for page in response.iter_pages():
-**from_:** `typing.Optional[str]` — Optional Id from which to start selection. +**from:** `typing.Optional[str]` — Optional Id from which to start selection.
@@ -35886,7 +36703,7 @@ for page in response.iter_pages():
-
client.verifiable_credentials.verification.templates.create(...) -> AsyncHttpResponse[CreateVerifiableCredentialTemplateResponseContent] +
client.verifiable_credentials.verification.templates.create(...) -> CreateVerifiableCredentialTemplateResponseContent
@@ -35913,16 +36730,14 @@ Create a verifiable credential template.
```python -from auth0 import ( - Auth0, - MdlPresentationProperties, - MdlPresentationRequest, - MdlPresentationRequestProperties, -) +from auth0.management import Auth0, MdlPresentationRequest, MdlPresentationRequestProperties, MdlPresentationProperties +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.verifiable_credentials.verification.templates.create( name="name", type="type", @@ -36009,7 +36824,7 @@ client.verifiable_credentials.verification.templates.create(
-
client.verifiable_credentials.verification.templates.get(...) -> AsyncHttpResponse[GetVerifiableCredentialTemplateResponseContent] +
client.verifiable_credentials.verification.templates.get(...) -> GetVerifiableCredentialTemplateResponseContent
@@ -36036,11 +36851,14 @@ Get a verifiable credential template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.verifiable_credentials.verification.templates.get( id="id", ) @@ -36079,7 +36897,7 @@ client.verifiable_credentials.verification.templates.get(
-
client.verifiable_credentials.verification.templates.delete(...) -> AsyncHttpResponse[None] +
client.verifiable_credentials.verification.templates.delete(...)
@@ -36106,11 +36924,14 @@ Delete a verifiable credential template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.verifiable_credentials.verification.templates.delete( id="id", ) @@ -36149,7 +36970,7 @@ client.verifiable_credentials.verification.templates.delete(
-
client.verifiable_credentials.verification.templates.update(...) -> AsyncHttpResponse[UpdateVerifiableCredentialTemplateResponseContent] +
client.verifiable_credentials.verification.templates.update(...) -> UpdateVerifiableCredentialTemplateResponseContent
@@ -36176,11 +36997,14 @@ Update a verifiable credential template.
```python -from auth0 import Auth0 +from auth0.management import Auth0 +from auth0.management.environment import Auth0Environment client = Auth0( - token="YOUR_TOKEN", + token="", + environment=Auth0Environment.DEFAULT, ) + client.verifiable_credentials.verification.templates.update( id="id", ) diff --git a/src/auth0/management/_default_clients.py b/src/auth0/management/_default_clients.py new file mode 100644 index 00000000..55bac38b --- /dev/null +++ b/src/auth0/management/_default_clients.py @@ -0,0 +1,32 @@ +# This file was auto-generated by Fern from our API Definition. + +import typing + +import httpx + +SDK_DEFAULT_TIMEOUT = 60 + +try: + import httpx_aiohttp # type: ignore[import-not-found] +except ImportError: + + class DefaultAioHttpClient(httpx.AsyncClient): # type: ignore + def __init__(self, **kwargs: typing.Any) -> None: + raise RuntimeError( + "To use the aiohttp client, install the aiohttp extra: pip install auth0-python[aiohttp]" + ) + +else: + + class DefaultAioHttpClient(httpx_aiohttp.HttpxAiohttpClient): # type: ignore + def __init__(self, **kwargs: typing.Any) -> None: + kwargs.setdefault("timeout", SDK_DEFAULT_TIMEOUT) + kwargs.setdefault("follow_redirects", True) + super().__init__(**kwargs) + + +class DefaultAsyncHttpxClient(httpx.AsyncClient): + def __init__(self, **kwargs: typing.Any) -> None: + kwargs.setdefault("timeout", SDK_DEFAULT_TIMEOUT) + kwargs.setdefault("follow_redirects", True) + super().__init__(**kwargs) diff --git a/src/auth0/management/actions/executions/raw_client.py b/src/auth0/management/actions/executions/raw_client.py index b6ff4b7c..ce5e35f1 100644 --- a/src/auth0/management/actions/executions/raw_client.py +++ b/src/auth0/management/actions/executions/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.get_action_execution_response_content import GetActionExecutionResponseContent +from pydantic import ValidationError class RawExecutionsClient: @@ -41,7 +43,7 @@ def get( The execution was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"actions/executions/{jsonable_encoder(id)}", + f"actions/executions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -113,6 +115,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -140,7 +146,7 @@ async def get( The execution was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/executions/{jsonable_encoder(id)}", + f"actions/executions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -212,4 +218,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/modules/raw_client.py b/src/auth0/management/actions/modules/raw_client.py index 8cd04365..16c67be2 100644 --- a/src/auth0/management/actions/modules/raw_client.py +++ b/src/auth0/management/actions/modules/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -28,6 +29,7 @@ from ...types.get_action_modules_response_content import GetActionModulesResponseContent from ...types.rollback_action_module_response_content import RollbackActionModuleResponseContent from ...types.update_action_module_response_content import UpdateActionModuleResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -138,6 +140,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -271,6 +277,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -293,7 +303,7 @@ def get( The action module was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -365,6 +375,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -384,7 +398,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -460,6 +474,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -497,7 +515,7 @@ def update( The action module was updated. """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="PATCH", json={ "code": code, @@ -593,6 +611,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def list_actions( @@ -628,7 +650,7 @@ def list_actions( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/actions", + f"actions/modules/{encode_path_param(id)}/actions", method="GET", params={ "page": page, @@ -712,6 +734,10 @@ def list_actions( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def rollback( @@ -737,7 +763,7 @@ def rollback( The rollback was successful. """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/rollback", + f"actions/modules/{encode_path_param(id)}/rollback", method="POST", json={ "module_version_id": module_version_id, @@ -827,6 +853,10 @@ def rollback( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -938,6 +968,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1071,6 +1105,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1093,7 +1131,7 @@ async def get( The action module was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1165,6 +1203,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1186,7 +1228,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1262,6 +1304,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1299,7 +1345,7 @@ async def update( The action module was updated. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}", + f"actions/modules/{encode_path_param(id)}", method="PATCH", json={ "code": code, @@ -1395,6 +1441,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def list_actions( @@ -1430,7 +1480,7 @@ async def list_actions( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/actions", + f"actions/modules/{encode_path_param(id)}/actions", method="GET", params={ "page": page, @@ -1517,6 +1567,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def rollback( @@ -1542,7 +1596,7 @@ async def rollback( The rollback was successful. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/rollback", + f"actions/modules/{encode_path_param(id)}/rollback", method="POST", json={ "module_version_id": module_version_id, @@ -1632,4 +1686,8 @@ async def rollback( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/modules/versions/raw_client.py b/src/auth0/management/actions/modules/versions/raw_client.py index 37418f8b..044a9696 100644 --- a/src/auth0/management/actions/modules/versions/raw_client.py +++ b/src/auth0/management/actions/modules/versions/raw_client.py @@ -6,8 +6,9 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param from ....core.pagination import AsyncPager, SyncPager +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ from ....types.create_action_module_version_response_content import CreateActionModuleVersionResponseContent from ....types.get_action_module_version_response_content import GetActionModuleVersionResponseContent from ....types.get_action_module_versions_response_content import GetActionModuleVersionsResponseContent +from pydantic import ValidationError class RawVersionsClient: @@ -60,7 +62,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions", + f"actions/modules/{encode_path_param(id)}/versions", method="GET", params={ "page": page, @@ -144,6 +146,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -166,7 +172,7 @@ def create( The action module version was created. """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions", + f"actions/modules/{encode_path_param(id)}/versions", method="POST", request_options=request_options, ) @@ -249,6 +255,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -274,7 +284,7 @@ def get( The module version was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions/{jsonable_encoder(version_id)}", + f"actions/modules/{encode_path_param(id)}/versions/{encode_path_param(version_id)}", method="GET", request_options=request_options, ) @@ -346,6 +356,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -386,7 +400,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions", + f"actions/modules/{encode_path_param(id)}/versions", method="GET", params={ "page": page, @@ -473,6 +487,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -495,7 +513,7 @@ async def create( The action module version was created. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions", + f"actions/modules/{encode_path_param(id)}/versions", method="POST", request_options=request_options, ) @@ -578,6 +596,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -603,7 +625,7 @@ async def get( The module version was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/modules/{jsonable_encoder(id)}/versions/{jsonable_encoder(version_id)}", + f"actions/modules/{encode_path_param(id)}/versions/{encode_path_param(version_id)}", method="GET", request_options=request_options, ) @@ -675,4 +697,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/raw_client.py b/src/auth0/management/actions/raw_client.py index 1950b940..0a3634cb 100644 --- a/src/auth0/management/actions/raw_client.py +++ b/src/auth0/management/actions/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -29,6 +30,7 @@ from ..types.test_action_payload import TestActionPayload from ..types.test_action_response_content import TestActionResponseContent from ..types.update_action_response_content import UpdateActionResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -163,6 +165,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -299,6 +305,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -321,7 +331,7 @@ def get( The action was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -393,6 +403,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -417,7 +431,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="DELETE", params={ "force": force, @@ -485,6 +499,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -538,7 +556,7 @@ def update( Action successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -631,6 +649,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def deploy( @@ -653,7 +675,7 @@ def deploy( Request to create action version was accepted. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}/deploy", + f"actions/actions/{encode_path_param(id)}/deploy", method="POST", request_options=request_options, ) @@ -714,6 +736,10 @@ def deploy( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def test( @@ -738,7 +764,7 @@ def test( Test action version successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}/test", + f"actions/actions/{encode_path_param(id)}/test", method="POST", json={ "payload": payload, @@ -806,6 +832,10 @@ def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -941,6 +971,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1077,6 +1111,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1099,7 +1137,7 @@ async def get( The action was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1171,6 +1209,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1195,7 +1237,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="DELETE", params={ "force": force, @@ -1263,6 +1305,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1316,7 +1362,7 @@ async def update( Action successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1409,6 +1455,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def deploy( @@ -1431,7 +1481,7 @@ async def deploy( Request to create action version was accepted. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}/deploy", + f"actions/actions/{encode_path_param(id)}/deploy", method="POST", request_options=request_options, ) @@ -1492,6 +1542,10 @@ async def deploy( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def test( @@ -1516,7 +1570,7 @@ async def test( Test action version successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(id)}/test", + f"actions/actions/{encode_path_param(id)}/test", method="POST", json={ "payload": payload, @@ -1584,4 +1638,8 @@ async def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/triggers/bindings/raw_client.py b/src/auth0/management/actions/triggers/bindings/raw_client.py index d393e30e..16874af1 100644 --- a/src/auth0/management/actions/triggers/bindings/raw_client.py +++ b/src/auth0/management/actions/triggers/bindings/raw_client.py @@ -6,8 +6,9 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param from ....core.pagination import AsyncPager, SyncPager +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....core.serialization import convert_and_respect_annotation_metadata @@ -20,6 +21,7 @@ from ....types.action_trigger_type_enum import ActionTriggerTypeEnum from ....types.list_action_bindings_paginated_response_content import ListActionBindingsPaginatedResponseContent from ....types.update_action_bindings_response_content import UpdateActionBindingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -62,7 +64,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"actions/triggers/{jsonable_encoder(trigger_id)}/bindings", + f"actions/triggers/{encode_path_param(trigger_id)}/bindings", method="GET", params={ "page": page, @@ -135,6 +137,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_many( @@ -164,7 +170,7 @@ def update_many( The bindings were updated. """ _response = self._client_wrapper.httpx_client.request( - f"actions/triggers/{jsonable_encoder(trigger_id)}/bindings", + f"actions/triggers/{encode_path_param(trigger_id)}/bindings", method="PATCH", json={ "bindings": convert_and_respect_annotation_metadata( @@ -234,6 +240,10 @@ def update_many( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -274,7 +284,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"actions/triggers/{jsonable_encoder(trigger_id)}/bindings", + f"actions/triggers/{encode_path_param(trigger_id)}/bindings", method="GET", params={ "page": page, @@ -350,6 +360,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_many( @@ -379,7 +393,7 @@ async def update_many( The bindings were updated. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/triggers/{jsonable_encoder(trigger_id)}/bindings", + f"actions/triggers/{encode_path_param(trigger_id)}/bindings", method="PATCH", json={ "bindings": convert_and_respect_annotation_metadata( @@ -449,4 +463,8 @@ async def update_many( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/triggers/raw_client.py b/src/auth0/management/actions/triggers/raw_client.py index 03f34103..9726738d 100644 --- a/src/auth0/management/actions/triggers/raw_client.py +++ b/src/auth0/management/actions/triggers/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -13,6 +14,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.list_action_triggers_response_content import ListActionTriggersResponseContent +from pydantic import ValidationError class RawTriggersClient: @@ -97,6 +99,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -182,4 +188,8 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/actions/versions/raw_client.py b/src/auth0/management/actions/versions/raw_client.py index 8da3a88c..94e4c9f4 100644 --- a/src/auth0/management/actions/versions/raw_client.py +++ b/src/auth0/management/actions/versions/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -21,6 +22,7 @@ from ...types.deploy_action_version_response_content import DeployActionVersionResponseContent from ...types.get_action_version_response_content import GetActionVersionResponseContent from ...types.list_action_versions_paginated_response_content import ListActionVersionsPaginatedResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -63,7 +65,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions", + f"actions/actions/{encode_path_param(action_id)}/versions", method="GET", params={ "page": page, @@ -136,6 +138,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -161,7 +167,7 @@ def get( The action version was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(action_id)}/versions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -233,6 +239,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def deploy( @@ -265,7 +275,7 @@ def deploy( Request to create action version was accepted. """ _response = self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions/{jsonable_encoder(id)}/deploy", + f"actions/actions/{encode_path_param(action_id)}/versions/{encode_path_param(id)}/deploy", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[DeployActionVersionRequestContent], direction="write" @@ -333,6 +343,10 @@ def deploy( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -373,7 +387,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions", + f"actions/actions/{encode_path_param(action_id)}/versions", method="GET", params={ "page": page, @@ -449,6 +463,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -474,7 +492,7 @@ async def get( The action version was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions/{jsonable_encoder(id)}", + f"actions/actions/{encode_path_param(action_id)}/versions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -546,6 +564,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def deploy( @@ -578,7 +600,7 @@ async def deploy( Request to create action version was accepted. """ _response = await self._client_wrapper.httpx_client.request( - f"actions/actions/{jsonable_encoder(action_id)}/versions/{jsonable_encoder(id)}/deploy", + f"actions/actions/{encode_path_param(action_id)}/versions/{encode_path_param(id)}/deploy", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[DeployActionVersionRequestContent], direction="write" @@ -646,4 +668,8 @@ async def deploy( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/anomaly/blocks/raw_client.py b/src/auth0/management/anomaly/blocks/raw_client.py index f8261825..eb5bd533 100644 --- a/src/auth0/management/anomaly/blocks/raw_client.py +++ b/src/auth0/management/anomaly/blocks/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.anomaly_ip_format import AnomalyIpFormat +from pydantic import ValidationError class RawBlocksClient: @@ -40,7 +42,7 @@ def check_ip( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"anomaly/blocks/ips/{jsonable_encoder(id)}", + f"anomaly/blocks/ips/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -105,6 +107,10 @@ def check_ip( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def unblock_ip( @@ -126,7 +132,7 @@ def unblock_ip( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"anomaly/blocks/ips/{jsonable_encoder(id)}", + f"anomaly/blocks/ips/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -180,6 +186,10 @@ def unblock_ip( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -206,7 +216,7 @@ async def check_ip( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"anomaly/blocks/ips/{jsonable_encoder(id)}", + f"anomaly/blocks/ips/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -271,6 +281,10 @@ async def check_ip( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def unblock_ip( @@ -292,7 +306,7 @@ async def unblock_ip( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"anomaly/blocks/ips/{jsonable_encoder(id)}", + f"anomaly/blocks/ips/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -346,4 +360,8 @@ async def unblock_ip( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/attack_protection/bot_detection/raw_client.py b/src/auth0/management/attack_protection/bot_detection/raw_client.py index 8f07c1b9..d5a20d6a 100644 --- a/src/auth0/management/attack_protection/bot_detection/raw_client.py +++ b/src/auth0/management/attack_protection/bot_detection/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -25,6 +26,7 @@ from ...types.bot_detection_monitoring_mode_enabled import BotDetectionMonitoringModeEnabled from ...types.get_bot_detection_settings_response_content import GetBotDetectionSettingsResponseContent from ...types.update_bot_detection_settings_response_content import UpdateBotDetectionSettingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -112,6 +114,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -235,6 +241,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -320,6 +330,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -443,4 +457,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/attack_protection/breached_password_detection/raw_client.py b/src/auth0/management/attack_protection/breached_password_detection/raw_client.py index da45825a..a4a98701 100644 --- a/src/auth0/management/attack_protection/breached_password_detection/raw_client.py +++ b/src/auth0/management/attack_protection/breached_password_detection/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -25,6 +26,7 @@ from ...types.update_breached_password_detection_settings_response_content import ( UpdateBreachedPasswordDetectionSettingsResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -101,6 +103,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -218,6 +224,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -292,6 +302,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -409,4 +423,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/attack_protection/brute_force_protection/raw_client.py b/src/auth0/management/attack_protection/brute_force_protection/raw_client.py index 66882537..3945aa20 100644 --- a/src/auth0/management/attack_protection/brute_force_protection/raw_client.py +++ b/src/auth0/management/attack_protection/brute_force_protection/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ...types.brute_force_protection_shields_enum import BruteForceProtectionShieldsEnum from ...types.get_brute_force_settings_response_content import GetBruteForceSettingsResponseContent from ...types.update_brute_force_settings_response_content import UpdateBruteForceSettingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -92,6 +94,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -205,6 +211,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -279,6 +289,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -392,4 +406,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/attack_protection/captcha/raw_client.py b/src/auth0/management/attack_protection/captcha/raw_client.py index a3b90078..5b599b4e 100644 --- a/src/auth0/management/attack_protection/captcha/raw_client.py +++ b/src/auth0/management/attack_protection/captcha/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -27,6 +28,7 @@ from ...types.attack_protection_update_captcha_recaptcha_v_2 import AttackProtectionUpdateCaptchaRecaptchaV2 from ...types.get_attack_protection_captcha_response_content import GetAttackProtectionCaptchaResponseContent from ...types.update_attack_protection_captcha_response_content import UpdateAttackProtectionCaptchaResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -114,6 +116,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -248,6 +254,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -333,6 +343,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -467,4 +481,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/attack_protection/suspicious_ip_throttling/raw_client.py b/src/auth0/management/attack_protection/suspicious_ip_throttling/raw_client.py index 8c08ced3..b57078d0 100644 --- a/src/auth0/management/attack_protection/suspicious_ip_throttling/raw_client.py +++ b/src/auth0/management/attack_protection/suspicious_ip_throttling/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -22,6 +23,7 @@ from ...types.update_suspicious_ip_throttling_settings_response_content import ( UpdateSuspiciousIpThrottlingSettingsResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -98,6 +100,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -207,6 +213,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -281,6 +291,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -390,4 +404,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/branding/phone/providers/raw_client.py b/src/auth0/management/branding/phone/providers/raw_client.py index c6216f66..9e5ce4df 100644 --- a/src/auth0/management/branding/phone/providers/raw_client.py +++ b/src/auth0/management/branding/phone/providers/raw_client.py @@ -6,7 +6,8 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....core.serialization import convert_and_respect_annotation_metadata @@ -25,6 +26,7 @@ from ....types.phone_provider_delivery_method_enum import PhoneProviderDeliveryMethodEnum from ....types.phone_provider_name_enum import PhoneProviderNameEnum from ....types.update_branding_phone_provider_response_content import UpdateBrandingPhoneProviderResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -118,6 +120,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -239,6 +245,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -260,7 +270,7 @@ def get( Phone provider successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -332,6 +342,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -350,7 +364,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -404,6 +418,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -442,7 +460,7 @@ def update( Phone provider successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -539,6 +557,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def test( @@ -568,7 +590,7 @@ def test( Phone notification sent. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}/try", + f"branding/phone/providers/{encode_path_param(id)}/try", method="POST", json={ "to": to, @@ -659,6 +681,10 @@ def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -750,6 +776,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -871,6 +901,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -892,7 +926,7 @@ async def get( Phone provider successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -964,6 +998,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -984,7 +1022,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1038,6 +1076,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1076,7 +1118,7 @@ async def update( Phone provider successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}", + f"branding/phone/providers/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1173,6 +1215,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def test( @@ -1202,7 +1248,7 @@ async def test( Phone notification sent. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/providers/{jsonable_encoder(id)}/try", + f"branding/phone/providers/{encode_path_param(id)}/try", method="POST", json={ "to": to, @@ -1293,4 +1339,8 @@ async def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/branding/phone/templates/raw_client.py b/src/auth0/management/branding/phone/templates/raw_client.py index a85af8f5..de52bf9c 100644 --- a/src/auth0/management/branding/phone/templates/raw_client.py +++ b/src/auth0/management/branding/phone/templates/raw_client.py @@ -6,7 +6,8 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....core.serialization import convert_and_respect_annotation_metadata @@ -29,6 +30,7 @@ from ....types.reset_phone_template_request_content import ResetPhoneTemplateRequestContent from ....types.reset_phone_template_response_content import ResetPhoneTemplateResponseContent from ....types.update_phone_template_response_content import UpdatePhoneTemplateResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -120,6 +122,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -232,6 +238,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -251,7 +261,7 @@ def get( The phone notification template were retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -323,6 +333,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -339,7 +353,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -404,6 +418,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -433,7 +451,7 @@ def update( The phone notification template was updated. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="PATCH", json={ "content": convert_and_respect_annotation_metadata( @@ -515,6 +533,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def reset( @@ -540,7 +562,7 @@ def reset( The phone notification template was reset. """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}/reset", + f"branding/phone/templates/{encode_path_param(id)}/reset", method="PATCH", json=request, headers={ @@ -606,6 +628,10 @@ def reset( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def test( @@ -636,7 +662,7 @@ def test( The phone testing notification for the template was sent """ _response = self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}/try", + f"branding/phone/templates/{encode_path_param(id)}/try", method="POST", json={ "to": to, @@ -716,6 +742,10 @@ def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -805,6 +835,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -917,6 +951,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -936,7 +974,7 @@ async def get( The phone notification template were retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1008,6 +1046,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1026,7 +1068,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1091,6 +1133,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1120,7 +1166,7 @@ async def update( The phone notification template was updated. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}", + f"branding/phone/templates/{encode_path_param(id)}", method="PATCH", json={ "content": convert_and_respect_annotation_metadata( @@ -1202,6 +1248,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def reset( @@ -1227,7 +1277,7 @@ async def reset( The phone notification template was reset. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}/reset", + f"branding/phone/templates/{encode_path_param(id)}/reset", method="PATCH", json=request, headers={ @@ -1293,6 +1343,10 @@ async def reset( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def test( @@ -1323,7 +1377,7 @@ async def test( The phone testing notification for the template was sent """ _response = await self._client_wrapper.httpx_client.request( - f"branding/phone/templates/{jsonable_encoder(id)}/try", + f"branding/phone/templates/{encode_path_param(id)}/try", method="POST", json={ "to": to, @@ -1403,4 +1457,8 @@ async def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/branding/raw_client.py b/src/auth0/management/branding/raw_client.py index 05a9bc69..1e650c65 100644 --- a/src/auth0/management/branding/raw_client.py +++ b/src/auth0/management/branding/raw_client.py @@ -6,6 +6,7 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -17,6 +18,7 @@ from ..types.update_branding_colors import UpdateBrandingColors from ..types.update_branding_font import UpdateBrandingFont from ..types.update_branding_response_content import UpdateBrandingResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -93,6 +95,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -203,6 +209,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -277,6 +287,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -387,4 +401,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/branding/templates/raw_client.py b/src/auth0/management/branding/templates/raw_client.py index 8dae3ed0..c370cf09 100644 --- a/src/auth0/management/branding/templates/raw_client.py +++ b/src/auth0/management/branding/templates/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -18,6 +19,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.get_universal_login_template_response_content import GetUniversalLoginTemplateResponseContent from ...types.update_universal_login_template_request_content import UpdateUniversalLoginTemplateRequestContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -114,6 +116,10 @@ def get_universal_login( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_universal_login( @@ -243,6 +249,10 @@ def update_universal_login( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete_universal_login(self, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -311,6 +321,10 @@ def delete_universal_login(self, *, request_options: typing.Optional[RequestOpti _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -405,6 +419,10 @@ async def get_universal_login( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_universal_login( @@ -534,6 +552,10 @@ async def update_universal_login( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete_universal_login( @@ -604,4 +626,8 @@ async def delete_universal_login( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/branding/themes/raw_client.py b/src/auth0/management/branding/themes/raw_client.py index 76ea0fb9..870535ce 100644 --- a/src/auth0/management/branding/themes/raw_client.py +++ b/src/auth0/management/branding/themes/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -25,6 +26,7 @@ from ...types.get_branding_default_theme_response_content import GetBrandingDefaultThemeResponseContent from ...types.get_branding_theme_response_content import GetBrandingThemeResponseContent from ...types.update_branding_theme_response_content import UpdateBrandingThemeResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -166,6 +168,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_default( @@ -246,6 +252,10 @@ def get_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -268,7 +278,7 @@ def get( Branding theme successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="GET", request_options=request_options, ) @@ -329,6 +339,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, theme_id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -348,7 +362,7 @@ def delete(self, theme_id: str, *, request_options: typing.Optional[RequestOptio HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="DELETE", request_options=request_options, ) @@ -402,6 +416,10 @@ def delete(self, theme_id: str, *, request_options: typing.Optional[RequestOptio _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -446,7 +464,7 @@ def update( Branding settings successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="PATCH", json={ "borders": convert_and_respect_annotation_metadata( @@ -540,6 +558,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -679,6 +701,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_default( @@ -759,6 +785,10 @@ async def get_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -781,7 +811,7 @@ async def get( Branding theme successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="GET", request_options=request_options, ) @@ -842,6 +872,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -863,7 +897,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="DELETE", request_options=request_options, ) @@ -917,6 +951,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -961,7 +999,7 @@ async def update( Branding settings successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"branding/themes/{jsonable_encoder(theme_id)}", + f"branding/themes/{encode_path_param(theme_id)}", method="PATCH", json={ "borders": convert_and_respect_annotation_metadata( @@ -1055,4 +1093,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/client.py b/src/auth0/management/client.py index 64e95bed..d2f099cc 100644 --- a/src/auth0/management/client.py +++ b/src/auth0/management/client.py @@ -521,6 +521,24 @@ def verifiable_credentials(self): return self._verifiable_credentials +def _make_default_async_client( + timeout: typing.Optional[float], + follow_redirects: typing.Optional[bool], +) -> httpx.AsyncClient: + try: + import httpx_aiohttp # type: ignore[import-not-found] + except ImportError: + pass + else: + if follow_redirects is not None: + return httpx_aiohttp.HttpxAiohttpClient(timeout=timeout, follow_redirects=follow_redirects) + return httpx_aiohttp.HttpxAiohttpClient(timeout=timeout) + + if follow_redirects is not None: + return httpx.AsyncClient(timeout=timeout, follow_redirects=follow_redirects) + return httpx.AsyncClient(timeout=timeout) + + class AsyncAuth0: """ Use this class to access the different functions within the SDK. You can instantiate any number of clients with different configuration that will propagate to these functions. @@ -546,6 +564,9 @@ class AsyncAuth0: headers : typing.Optional[typing.Dict[str, str]] Additional headers to send with every request. + async_token : typing.Optional[typing.Callable[[], typing.Awaitable[str]]] + An async callable that returns a bearer token. Use this when token acquisition involves async I/O (e.g., refreshing tokens via an async HTTP client). When provided, this is used instead of the synchronous token for async requests. + timeout : typing.Optional[float] The timeout to be used, in seconds, for requests. By default the timeout is 60 seconds, unless a custom httpx client is used, in which case this default is not enforced. @@ -575,6 +596,7 @@ def __init__( tenant_domain: typing.Optional[str] = None, token: typing.Union[str, typing.Callable[[], str]], headers: typing.Optional[typing.Dict[str, str]] = None, + async_token: typing.Optional[typing.Callable[[], typing.Awaitable[str]]] = None, timeout: typing.Optional[float] = None, follow_redirects: typing.Optional[bool] = True, httpx_client: typing.Optional[httpx.AsyncClient] = None, @@ -590,11 +612,10 @@ def __init__( base_url=_get_base_url(base_url=base_url, environment=environment), token=token, headers=headers, + async_token=async_token, httpx_client=httpx_client if httpx_client is not None - else httpx.AsyncClient(timeout=_defaulted_timeout, follow_redirects=follow_redirects) - if follow_redirects is not None - else httpx.AsyncClient(timeout=_defaulted_timeout), + else _make_default_async_client(timeout=_defaulted_timeout, follow_redirects=follow_redirects), timeout=_defaulted_timeout, logging=logging, ) diff --git a/src/auth0/management/client_grants/organizations/raw_client.py b/src/auth0/management/client_grants/organizations/raw_client.py index d9ed45ce..3b5126f3 100644 --- a/src/auth0/management/client_grants/organizations/raw_client.py +++ b/src/auth0/management/client_grants/organizations/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ ListClientGrantOrganizationsPaginatedResponseContent, ) from ...types.organization import Organization +from pydantic import ValidationError class RawOrganizationsClient: @@ -52,7 +54,7 @@ def list( Organizations successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}/organizations", + f"client-grants/{encode_path_param(id)}/organizations", method="GET", params={ "from": from_, @@ -126,6 +128,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -162,7 +168,7 @@ async def list( Organizations successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}/organizations", + f"client-grants/{encode_path_param(id)}/organizations", method="GET", params={ "from": from_, @@ -239,4 +245,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/client_grants/raw_client.py b/src/auth0/management/client_grants/raw_client.py index d9b823ca..226a43d1 100644 --- a/src/auth0/management/client_grants/raw_client.py +++ b/src/auth0/management/client_grants/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -25,6 +26,7 @@ from ..types.get_client_grant_response_content import GetClientGrantResponseContent from ..types.list_client_grant_paginated_response_content import ListClientGrantPaginatedResponseContent from ..types.update_client_grant_response_content import UpdateClientGrantResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -147,6 +149,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -295,6 +301,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -318,7 +328,7 @@ def get( Client grant successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -379,6 +389,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -398,7 +412,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -452,6 +466,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -496,7 +514,7 @@ def update( Client grant successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="PATCH", json={ "scope": scope, @@ -579,6 +597,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -702,6 +724,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -850,6 +876,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -873,7 +903,7 @@ async def get( Client grant successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -934,6 +964,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -955,7 +989,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1009,6 +1043,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1053,7 +1091,7 @@ async def update( Client grant successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"client-grants/{jsonable_encoder(id)}", + f"client-grants/{encode_path_param(id)}", method="PATCH", json={ "scope": scope, @@ -1136,4 +1174,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/clients/connections/raw_client.py b/src/auth0/management/clients/connections/raw_client.py index 42746604..e093b35b 100644 --- a/src/auth0/management/clients/connections/raw_client.py +++ b/src/auth0/management/clients/connections/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ...types.connection_for_list import ConnectionForList from ...types.connection_strategy_enum import ConnectionStrategyEnum from ...types.list_client_connections_response_content import ListClientConnectionsResponseContent +from pydantic import ValidationError class RawConnectionsClient: @@ -74,7 +76,7 @@ def get( Success """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}/connections", + f"clients/{encode_path_param(id)}/connections", method="GET", params={ "strategy": strategy, @@ -165,6 +167,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -223,7 +229,7 @@ async def get( Success """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}/connections", + f"clients/{encode_path_param(id)}/connections", method="GET", params={ "strategy": strategy, @@ -317,4 +323,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/clients/credentials/raw_client.py b/src/auth0/management/clients/credentials/raw_client.py index fb77c87f..9bb46211 100644 --- a/src/auth0/management/clients/credentials/raw_client.py +++ b/src/auth0/management/clients/credentials/raw_client.py @@ -7,7 +7,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ from ...types.patch_client_credential_response_content import PatchClientCredentialResponseContent from ...types.post_client_credential_response_content import PostClientCredentialResponseContent from ...types.public_key_credential_algorithm_enum import PublicKeyCredentialAlgorithmEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -52,7 +54,7 @@ def list( Credentials successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials", + f"clients/{encode_path_param(client_id)}/credentials", method="GET", request_options=request_options, ) @@ -113,6 +115,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -200,7 +206,7 @@ def create( Credential successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials", + f"clients/{encode_path_param(client_id)}/credentials", method="POST", json={ "credential_type": credential_type, @@ -286,6 +292,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -313,7 +323,7 @@ def get( Credential successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="GET", request_options=request_options, ) @@ -374,6 +384,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -398,7 +412,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="DELETE", request_options=request_options, ) @@ -452,6 +466,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -485,7 +503,7 @@ def update( Credential successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="PATCH", json={ "expires_at": expires_at, @@ -564,6 +582,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -593,7 +615,7 @@ async def list( Credentials successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials", + f"clients/{encode_path_param(client_id)}/credentials", method="GET", request_options=request_options, ) @@ -654,6 +676,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -741,7 +767,7 @@ async def create( Credential successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials", + f"clients/{encode_path_param(client_id)}/credentials", method="POST", json={ "credential_type": credential_type, @@ -827,6 +853,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -854,7 +884,7 @@ async def get( Credential successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="GET", request_options=request_options, ) @@ -915,6 +945,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -939,7 +973,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="DELETE", request_options=request_options, ) @@ -993,6 +1027,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1026,7 +1064,7 @@ async def update( Credential successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(client_id)}/credentials/{jsonable_encoder(credential_id)}", + f"clients/{encode_path_param(client_id)}/credentials/{encode_path_param(credential_id)}", method="PATCH", json={ "expires_at": expires_at, @@ -1105,4 +1143,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/clients/raw_client.py b/src/auth0/management/clients/raw_client.py index 41ac2a97..40f6fa09 100644 --- a/src/auth0/management/clients/raw_client.py +++ b/src/auth0/management/clients/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -61,6 +62,7 @@ from ..types.rotate_client_secret_response_content import RotateClientSecretResponseContent from ..types.update_client_response_content import UpdateClientResponseContent from ..types.update_token_quota import UpdateTokenQuota +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -251,6 +253,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -634,6 +640,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def preview_cimd_metadata( @@ -739,6 +749,10 @@ def preview_cimd_metadata( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def register_cimd_client( @@ -843,6 +857,10 @@ def register_cimd_client( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -906,7 +924,7 @@ def get( Client successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -982,6 +1000,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -1001,7 +1023,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1055,6 +1077,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -1273,7 +1299,7 @@ def update( Client successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1445,6 +1471,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def rotate_secret( @@ -1471,7 +1501,7 @@ def rotate_secret( Secret successfully rotated. """ _response = self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}/rotate-secret", + f"clients/{encode_path_param(id)}/rotate-secret", method="POST", request_options=request_options, ) @@ -1543,6 +1573,10 @@ def rotate_secret( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -1734,6 +1768,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -2117,6 +2155,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def preview_cimd_metadata( @@ -2222,6 +2264,10 @@ async def preview_cimd_metadata( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def register_cimd_client( @@ -2326,6 +2372,10 @@ async def register_cimd_client( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -2389,7 +2439,7 @@ async def get( Client successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -2465,6 +2515,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -2486,7 +2540,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -2540,6 +2594,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -2758,7 +2816,7 @@ async def update( Client successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}", + f"clients/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -2930,6 +2988,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def rotate_secret( @@ -2956,7 +3018,7 @@ async def rotate_secret( Secret successfully rotated. """ _response = await self._client_wrapper.httpx_client.request( - f"clients/{jsonable_encoder(id)}/rotate-secret", + f"clients/{encode_path_param(id)}/rotate-secret", method="POST", request_options=request_options, ) @@ -3028,4 +3090,8 @@ async def rotate_secret( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connection_profiles/raw_client.py b/src/auth0/management/connection_profiles/raw_client.py index db1815e6..effb0314 100644 --- a/src/auth0/management/connection_profiles/raw_client.py +++ b/src/auth0/management/connection_profiles/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -30,6 +31,7 @@ from ..types.list_connection_profile_template_response_content import ListConnectionProfileTemplateResponseContent from ..types.list_connection_profiles_paginated_response_content import ListConnectionProfilesPaginatedResponseContent from ..types.update_connection_profile_response_content import UpdateConnectionProfileResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -139,6 +141,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -268,6 +274,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def list_templates( @@ -337,6 +347,10 @@ def list_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_template( @@ -359,7 +373,7 @@ def get_template( Connection Profile Template successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"connection-profiles/templates/{jsonable_encoder(id)}", + f"connection-profiles/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -420,6 +434,10 @@ def get_template( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -442,7 +460,7 @@ def get( Record for existing connection profile. """ _response = self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -503,6 +521,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -522,7 +544,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -565,6 +587,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -608,7 +634,7 @@ def update( Connection profile successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -687,6 +713,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -797,6 +827,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -926,6 +960,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def list_templates( @@ -995,6 +1033,10 @@ async def list_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_template( @@ -1017,7 +1059,7 @@ async def get_template( Connection Profile Template successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"connection-profiles/templates/{jsonable_encoder(id)}", + f"connection-profiles/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1078,6 +1120,10 @@ async def get_template( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1100,7 +1146,7 @@ async def get( Record for existing connection profile. """ _response = await self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1161,6 +1207,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1182,7 +1232,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1225,6 +1275,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1268,7 +1322,7 @@ async def update( Connection profile successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"connection-profiles/{jsonable_encoder(id)}", + f"connection-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1347,4 +1401,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/clients/raw_client.py b/src/auth0/management/connections/clients/raw_client.py index ba9c0f8a..03909174 100644 --- a/src/auth0/management/connections/clients/raw_client.py +++ b/src/auth0/management/connections/clients/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -19,6 +20,7 @@ from ...types.connection_enabled_client import ConnectionEnabledClient from ...types.get_connection_enabled_clients_response_content import GetConnectionEnabledClientsResponseContent from ...types.update_enabled_client_connections_request_content import UpdateEnabledClientConnectionsRequestContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -61,7 +63,7 @@ def get( Success """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/clients", + f"connections/{encode_path_param(id)}/clients", method="GET", params={ "take": take, @@ -146,6 +148,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -171,7 +177,7 @@ def update( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/clients", + f"connections/{encode_path_param(id)}/clients", method="PATCH", json=convert_and_respect_annotation_metadata( object_=request, annotation=UpdateEnabledClientConnectionsRequestContent, direction="write" @@ -243,6 +249,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -283,7 +293,7 @@ async def get( Success """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/clients", + f"connections/{encode_path_param(id)}/clients", method="GET", params={ "take": take, @@ -371,6 +381,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -396,7 +410,7 @@ async def update( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/clients", + f"connections/{encode_path_param(id)}/clients", method="PATCH", json=convert_and_respect_annotation_metadata( object_=request, annotation=UpdateEnabledClientConnectionsRequestContent, direction="write" @@ -468,4 +482,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/directory_provisioning/raw_client.py b/src/auth0/management/connections/directory_provisioning/raw_client.py index 6481e227..1b5b87d6 100644 --- a/src/auth0/management/connections/directory_provisioning/raw_client.py +++ b/src/auth0/management/connections/directory_provisioning/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -27,6 +28,7 @@ from ...types.list_directory_provisionings_response_content import ListDirectoryProvisioningsResponseContent from ...types.update_directory_provisioning_request_content import UpdateDirectoryProvisioningRequestContent from ...types.update_directory_provisioning_response_content import UpdateDirectoryProvisioningResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -136,6 +138,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -158,7 +164,7 @@ def get( The connection's directory provisioning configuration. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="GET", request_options=request_options, ) @@ -230,6 +236,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -258,7 +268,7 @@ def create( The connection's directory provisioning configuration was created. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="POST", json=convert_and_respect_annotation_metadata( object_=request, @@ -350,6 +360,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -369,7 +383,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="DELETE", request_options=request_options, ) @@ -434,6 +448,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -462,7 +480,7 @@ def update( The connection's directory provisioning configuration was updated. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="PATCH", json=convert_and_respect_annotation_metadata( object_=request, @@ -543,6 +561,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_default_mapping( @@ -565,7 +587,7 @@ def get_default_mapping( The connection's directory provisioning default mapping. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning/default-mapping", + f"connections/{encode_path_param(id)}/directory-provisioning/default-mapping", method="GET", request_options=request_options, ) @@ -637,6 +659,10 @@ def get_default_mapping( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -747,6 +773,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -769,7 +799,7 @@ async def get( The connection's directory provisioning configuration. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="GET", request_options=request_options, ) @@ -841,6 +871,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -869,7 +903,7 @@ async def create( The connection's directory provisioning configuration was created. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="POST", json=convert_and_respect_annotation_metadata( object_=request, @@ -961,6 +995,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -982,7 +1020,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="DELETE", request_options=request_options, ) @@ -1047,6 +1085,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1075,7 +1117,7 @@ async def update( The connection's directory provisioning configuration was updated. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning", + f"connections/{encode_path_param(id)}/directory-provisioning", method="PATCH", json=convert_and_respect_annotation_metadata( object_=request, @@ -1156,6 +1198,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_default_mapping( @@ -1178,7 +1224,7 @@ async def get_default_mapping( The connection's directory provisioning default mapping. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning/default-mapping", + f"connections/{encode_path_param(id)}/directory-provisioning/default-mapping", method="GET", request_options=request_options, ) @@ -1250,4 +1296,8 @@ async def get_default_mapping( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/directory_provisioning/synchronizations/raw_client.py b/src/auth0/management/connections/directory_provisioning/synchronizations/raw_client.py index 5829c8f7..6811302c 100644 --- a/src/auth0/management/connections/directory_provisioning/synchronizations/raw_client.py +++ b/src/auth0/management/connections/directory_provisioning/synchronizations/raw_client.py @@ -6,7 +6,8 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ....errors.too_many_requests_error import TooManyRequestsError from ....errors.unauthorized_error import UnauthorizedError from ....types.create_directory_synchronization_response_content import CreateDirectorySynchronizationResponseContent +from pydantic import ValidationError class RawSynchronizationsClient: @@ -42,7 +44,7 @@ def create( The directory synchronization was triggered. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning/synchronizations", + f"connections/{encode_path_param(id)}/directory-provisioning/synchronizations", method="POST", request_options=request_options, ) @@ -125,6 +127,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -152,7 +158,7 @@ async def create( The directory synchronization was triggered. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/directory-provisioning/synchronizations", + f"connections/{encode_path_param(id)}/directory-provisioning/synchronizations", method="POST", request_options=request_options, ) @@ -235,4 +241,8 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/keys/raw_client.py b/src/auth0/management/connections/keys/raw_client.py index 688852ae..02fb302a 100644 --- a/src/auth0/management/connections/keys/raw_client.py +++ b/src/auth0/management/connections/keys/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -21,6 +22,7 @@ from ...types.post_connections_keys_response_content import PostConnectionsKeysResponseContent from ...types.rotate_connection_keys_request_content import RotateConnectionKeysRequestContent from ...types.rotate_connections_keys_response_content import RotateConnectionsKeysResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -50,7 +52,7 @@ def get( Connection keys successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys", + f"connections/{encode_path_param(id)}/keys", method="GET", request_options=request_options, ) @@ -122,6 +124,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -150,7 +156,7 @@ def create( Connection keys successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys", + f"connections/{encode_path_param(id)}/keys", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[PostConnectionKeysRequestContent], direction="write" @@ -240,6 +246,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def rotate( @@ -268,7 +278,7 @@ def rotate( Connection keys successfully rotated. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys/rotate", + f"connections/{encode_path_param(id)}/keys/rotate", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[RotateConnectionKeysRequestContent], direction="write" @@ -347,6 +357,10 @@ def rotate( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -374,7 +388,7 @@ async def get( Connection keys successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys", + f"connections/{encode_path_param(id)}/keys", method="GET", request_options=request_options, ) @@ -446,6 +460,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -474,7 +492,7 @@ async def create( Connection keys successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys", + f"connections/{encode_path_param(id)}/keys", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[PostConnectionKeysRequestContent], direction="write" @@ -564,6 +582,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def rotate( @@ -592,7 +614,7 @@ async def rotate( Connection keys successfully rotated. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/keys/rotate", + f"connections/{encode_path_param(id)}/keys/rotate", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[RotateConnectionKeysRequestContent], direction="write" @@ -671,4 +693,8 @@ async def rotate( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/raw_client.py b/src/auth0/management/connections/raw_client.py index 1c79421e..4d8f8cc8 100644 --- a/src/auth0/management/connections/raw_client.py +++ b/src/auth0/management/connections/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -31,6 +32,7 @@ ) from ..types.update_connection_options import UpdateConnectionOptions from ..types.update_connection_response_content import UpdateConnectionResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -182,6 +184,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -339,6 +345,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -372,7 +382,7 @@ def get( The connection was retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -448,6 +458,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -469,7 +483,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -523,6 +537,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -582,7 +600,7 @@ def update( The connection was updated. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="PATCH", json={ "display_name": display_name, @@ -686,6 +704,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def check_status(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -705,7 +727,7 @@ def check_status(self, id: str, *, request_options: typing.Optional[RequestOptio HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/status", + f"connections/{encode_path_param(id)}/status", method="GET", request_options=request_options, ) @@ -770,6 +792,10 @@ def check_status(self, id: str, *, request_options: typing.Optional[RequestOptio _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -922,6 +948,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1079,6 +1109,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1112,7 +1146,7 @@ async def get( The connection was retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -1188,6 +1222,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1211,7 +1249,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1265,6 +1303,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1324,7 +1366,7 @@ async def update( The connection was updated. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}", + f"connections/{encode_path_param(id)}", method="PATCH", json={ "display_name": display_name, @@ -1428,6 +1470,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def check_status( @@ -1449,7 +1495,7 @@ async def check_status( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/status", + f"connections/{encode_path_param(id)}/status", method="GET", request_options=request_options, ) @@ -1514,4 +1560,8 @@ async def check_status( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/scim_configuration/raw_client.py b/src/auth0/management/connections/scim_configuration/raw_client.py index f6f4ddd4..331ddf5d 100644 --- a/src/auth0/management/connections/scim_configuration/raw_client.py +++ b/src/auth0/management/connections/scim_configuration/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -26,6 +27,7 @@ from ...types.scim_configuration import ScimConfiguration from ...types.scim_mapping_item import ScimMappingItem from ...types.update_scim_configuration_response_content import UpdateScimConfigurationResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -135,6 +137,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -157,7 +163,7 @@ def get( The connection's SCIM configuration was retrieved. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="GET", request_options=request_options, ) @@ -196,6 +202,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -224,7 +234,7 @@ def create( The connection's SCIM configuration was created. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[CreateScimConfigurationRequestContent], direction="write" @@ -270,6 +280,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -289,7 +303,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="DELETE", request_options=request_options, ) @@ -321,6 +335,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -354,7 +372,7 @@ def update( The connection's SCIM configuration was updated. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="PATCH", json={ "user_id_attribute": user_id_attribute, @@ -403,6 +421,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_default_mapping( @@ -425,7 +447,7 @@ def get_default_mapping( The connection's default SCIM mapping was retrieved. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/default-mapping", + f"connections/{encode_path_param(id)}/scim-configuration/default-mapping", method="GET", request_options=request_options, ) @@ -464,6 +486,10 @@ def get_default_mapping( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -574,6 +600,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -596,7 +626,7 @@ async def get( The connection's SCIM configuration was retrieved. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="GET", request_options=request_options, ) @@ -635,6 +665,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -663,7 +697,7 @@ async def create( The connection's SCIM configuration was created. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="POST", json=convert_and_respect_annotation_metadata( object_=request, annotation=typing.Optional[CreateScimConfigurationRequestContent], direction="write" @@ -709,6 +743,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -730,7 +768,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="DELETE", request_options=request_options, ) @@ -762,6 +800,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -795,7 +837,7 @@ async def update( The connection's SCIM configuration was updated. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration", + f"connections/{encode_path_param(id)}/scim-configuration", method="PATCH", json={ "user_id_attribute": user_id_attribute, @@ -844,6 +886,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_default_mapping( @@ -866,7 +912,7 @@ async def get_default_mapping( The connection's default SCIM mapping was retrieved. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/default-mapping", + f"connections/{encode_path_param(id)}/scim-configuration/default-mapping", method="GET", request_options=request_options, ) @@ -905,4 +951,8 @@ async def get_default_mapping( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/scim_configuration/tokens/raw_client.py b/src/auth0/management/connections/scim_configuration/tokens/raw_client.py index 7b8fab67..98197d36 100644 --- a/src/auth0/management/connections/scim_configuration/tokens/raw_client.py +++ b/src/auth0/management/connections/scim_configuration/tokens/raw_client.py @@ -6,7 +6,8 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -14,6 +15,7 @@ from ....errors.not_found_error import NotFoundError from ....types.create_scim_token_response_content import CreateScimTokenResponseContent from ....types.get_scim_tokens_response_content import GetScimTokensResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -43,7 +45,7 @@ def get( The connection's SCIM tokens were retrieved. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens", + f"connections/{encode_path_param(id)}/scim-configuration/tokens", method="GET", request_options=request_options, ) @@ -82,6 +84,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -115,7 +121,7 @@ def create( The connection's SCIM token was created. See Response Schemas for schema. """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens", + f"connections/{encode_path_param(id)}/scim-configuration/tokens", method="POST", json={ "scopes": scopes, @@ -173,6 +179,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -197,7 +207,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens/{jsonable_encoder(token_id)}", + f"connections/{encode_path_param(id)}/scim-configuration/tokens/{encode_path_param(token_id)}", method="DELETE", request_options=request_options, ) @@ -229,6 +239,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -256,7 +270,7 @@ async def get( The connection's SCIM tokens were retrieved. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens", + f"connections/{encode_path_param(id)}/scim-configuration/tokens", method="GET", request_options=request_options, ) @@ -295,6 +309,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -328,7 +346,7 @@ async def create( The connection's SCIM token was created. See Response Schemas for schema. """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens", + f"connections/{encode_path_param(id)}/scim-configuration/tokens", method="POST", json={ "scopes": scopes, @@ -386,6 +404,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -410,7 +432,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/scim-configuration/tokens/{jsonable_encoder(token_id)}", + f"connections/{encode_path_param(id)}/scim-configuration/tokens/{encode_path_param(token_id)}", method="DELETE", request_options=request_options, ) @@ -442,4 +464,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/connections/users/raw_client.py b/src/auth0/management/connections/users/raw_client.py index 43e9098e..f3caa18e 100644 --- a/src/auth0/management/connections/users/raw_client.py +++ b/src/auth0/management/connections/users/raw_client.py @@ -6,13 +6,15 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError from ...errors.forbidden_error import ForbiddenError from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError +from pydantic import ValidationError class RawUsersClient: @@ -41,7 +43,7 @@ def delete_by_email( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/users", + f"connections/{encode_path_param(id)}/users", method="DELETE", params={ "email": email, @@ -98,6 +100,10 @@ def delete_by_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -127,7 +133,7 @@ async def delete_by_email( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"connections/{jsonable_encoder(id)}/users", + f"connections/{encode_path_param(id)}/users", method="DELETE", params={ "email": email, @@ -184,4 +190,8 @@ async def delete_by_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/core/__init__.py b/src/auth0/management/core/__init__.py index 5385a6ce..e2be580f 100644 --- a/src/auth0/management/core/__init__.py +++ b/src/auth0/management/core/__init__.py @@ -8,13 +8,14 @@ if typing.TYPE_CHECKING: from .api_error import ApiError from .client_wrapper import AsyncClientWrapper, BaseClientWrapper, SyncClientWrapper - from .datetime_utils import serialize_datetime + from .datetime_utils import Rfc2822DateTime, parse_rfc2822_datetime, serialize_datetime from .file import File, convert_file_dict_to_httpx_tuples, with_content_type from .http_client import AsyncHttpClient, HttpClient from .http_response import AsyncHttpResponse, HttpResponse - from .jsonable_encoder import jsonable_encoder + from .jsonable_encoder import encode_path_param, jsonable_encoder from .logging import ConsoleLogger, ILogger, LogConfig, LogLevel, Logger, create_logger from .pagination import AsyncPager, SyncPager + from .parse_error import ParsingError from .pydantic_utilities import ( IS_PYDANTIC_V2, UniversalBaseModel, @@ -45,7 +46,9 @@ "LogConfig": ".logging", "LogLevel": ".logging", "Logger": ".logging", + "ParsingError": ".parse_error", "RequestOptions": ".request_options", + "Rfc2822DateTime": ".datetime_utils", "SyncClientWrapper": ".client_wrapper", "SyncPager": ".pagination", "UniversalBaseModel": ".pydantic_utilities", @@ -53,9 +56,11 @@ "convert_and_respect_annotation_metadata": ".serialization", "convert_file_dict_to_httpx_tuples": ".file", "create_logger": ".logging", + "encode_path_param": ".jsonable_encoder", "encode_query": ".query_encoder", "jsonable_encoder": ".jsonable_encoder", "parse_obj_as": ".pydantic_utilities", + "parse_rfc2822_datetime": ".datetime_utils", "remove_none_from_dict": ".remove_none_from_dict", "serialize_datetime": ".datetime_utils", "universal_field_validator": ".pydantic_utilities", @@ -103,7 +108,9 @@ def __dir__(): "LogConfig", "LogLevel", "Logger", + "ParsingError", "RequestOptions", + "Rfc2822DateTime", "SyncClientWrapper", "SyncPager", "UniversalBaseModel", @@ -111,9 +118,11 @@ def __dir__(): "convert_and_respect_annotation_metadata", "convert_file_dict_to_httpx_tuples", "create_logger", + "encode_path_param", "encode_query", "jsonable_encoder", "parse_obj_as", + "parse_rfc2822_datetime", "remove_none_from_dict", "serialize_datetime", "universal_field_validator", diff --git a/src/auth0/management/core/datetime_utils.py b/src/auth0/management/core/datetime_utils.py index 7c9864a9..a12b2ad0 100644 --- a/src/auth0/management/core/datetime_utils.py +++ b/src/auth0/management/core/datetime_utils.py @@ -1,6 +1,48 @@ # This file was auto-generated by Fern from our API Definition. import datetime as dt +from email.utils import parsedate_to_datetime +from typing import Any + +import pydantic + +IS_PYDANTIC_V2 = pydantic.VERSION.startswith("2.") + + +def parse_rfc2822_datetime(v: Any) -> dt.datetime: + """ + Parse an RFC 2822 datetime string (e.g., "Wed, 02 Oct 2002 13:00:00 GMT") + into a datetime object. If the value is already a datetime, return it as-is. + Falls back to ISO 8601 parsing if RFC 2822 parsing fails. + """ + if isinstance(v, dt.datetime): + return v + if isinstance(v, str): + try: + return parsedate_to_datetime(v) + except Exception: + pass + # Fallback to ISO 8601 parsing + return dt.datetime.fromisoformat(v.replace("Z", "+00:00")) + raise ValueError(f"Expected str or datetime, got {type(v)}") + + +class Rfc2822DateTime(dt.datetime): + """A datetime subclass that parses RFC 2822 date strings. + + On Pydantic V1, uses __get_validators__ for pre-validation. + On Pydantic V2, uses __get_pydantic_core_schema__ for BeforeValidator-style parsing. + """ + + @classmethod + def __get_validators__(cls): # type: ignore[no-untyped-def] + yield parse_rfc2822_datetime + + @classmethod + def __get_pydantic_core_schema__(cls, _source_type: Any, _handler: Any) -> Any: # type: ignore[override] + from pydantic_core import core_schema + + return core_schema.no_info_before_validator_function(parse_rfc2822_datetime, core_schema.datetime_schema()) def serialize_datetime(v: dt.datetime) -> str: diff --git a/src/auth0/management/core/http_client.py b/src/auth0/management/core/http_client.py index ee937589..f0a39ca8 100644 --- a/src/auth0/management/core/http_client.py +++ b/src/auth0/management/core/http_client.py @@ -118,6 +118,12 @@ def _retry_timeout(response: httpx.Response, retries: int) -> float: return _add_symmetric_jitter(backoff) +def _retry_timeout_from_retries(retries: int) -> float: + """Determine retry timeout using exponential backoff when no response is available.""" + backoff = min(INITIAL_RETRY_DELAY_SECONDS * pow(2.0, retries), MAX_RETRY_DELAY_SECONDS) + return _add_symmetric_jitter(backoff) + + def _should_retry(response: httpx.Response) -> bool: retryable_400s = [429, 408, 409] return response.status_code >= 500 or response.status_code in retryable_400s @@ -265,11 +271,13 @@ def __init__( base_timeout: typing.Callable[[], typing.Optional[float]], base_headers: typing.Callable[[], typing.Dict[str, str]], base_url: typing.Optional[typing.Callable[[], str]] = None, + base_max_retries: int = 2, logging_config: typing.Optional[typing.Union[LogConfig, Logger]] = None, ): self.base_url = base_url self.base_timeout = base_timeout self.base_headers = base_headers + self.base_max_retries = base_max_retries self.httpx_client = httpx_client self.logger = create_logger(logging_config) @@ -364,19 +372,44 @@ def request( has_body=json_body is not None or data_body is not None, ) - response = self.httpx_client.request( - method=method, - url=_request_url, - headers=_request_headers, - params=_encoded_params if _encoded_params else None, - json=json_body, - data=data_body, - content=content, - files=request_files, - timeout=timeout, + max_retries: int = ( + request_options.get("max_retries", self.base_max_retries) + if request_options is not None + else self.base_max_retries ) - max_retries: int = request_options.get("max_retries", 2) if request_options is not None else 2 + try: + response = self.httpx_client.request( + method=method, + url=_request_url, + headers=_request_headers, + params=_encoded_params if _encoded_params else None, + json=json_body, + data=data_body, + content=content, + files=request_files, + timeout=timeout, + ) + except (httpx.ConnectError, httpx.RemoteProtocolError): + if retries < max_retries: + time.sleep(_retry_timeout_from_retries(retries=retries)) + return self.request( + path=path, + method=method, + base_url=base_url, + params=params, + json=json, + data=data, + content=content, + files=files, + headers=headers, + request_options=request_options, + retries=retries + 1, + omit=omit, + force_multipart=force_multipart, + ) + raise + if _should_retry(response=response): if retries < max_retries: time.sleep(_retry_timeout(response=response, retries=retries)) @@ -386,12 +419,14 @@ def request( base_url=base_url, params=params, json=json, + data=data, content=content, files=files, headers=headers, request_options=request_options, retries=retries + 1, omit=omit, + force_multipart=force_multipart, ) if self.logger.is_debug(): @@ -518,12 +553,14 @@ def __init__( base_timeout: typing.Callable[[], typing.Optional[float]], base_headers: typing.Callable[[], typing.Dict[str, str]], base_url: typing.Optional[typing.Callable[[], str]] = None, + base_max_retries: int = 2, async_base_headers: typing.Optional[typing.Callable[[], typing.Awaitable[typing.Dict[str, str]]]] = None, logging_config: typing.Optional[typing.Union[LogConfig, Logger]] = None, ): self.base_url = base_url self.base_timeout = base_timeout self.base_headers = base_headers + self.base_max_retries = base_max_retries self.async_base_headers = async_base_headers self.httpx_client = httpx_client self.logger = create_logger(logging_config) @@ -627,19 +664,44 @@ async def request( has_body=json_body is not None or data_body is not None, ) - response = await self.httpx_client.request( - method=method, - url=_request_url, - headers=_request_headers, - params=_encoded_params if _encoded_params else None, - json=json_body, - data=data_body, - content=content, - files=request_files, - timeout=timeout, + max_retries: int = ( + request_options.get("max_retries", self.base_max_retries) + if request_options is not None + else self.base_max_retries ) - max_retries: int = request_options.get("max_retries", 2) if request_options is not None else 2 + try: + response = await self.httpx_client.request( + method=method, + url=_request_url, + headers=_request_headers, + params=_encoded_params if _encoded_params else None, + json=json_body, + data=data_body, + content=content, + files=request_files, + timeout=timeout, + ) + except (httpx.ConnectError, httpx.RemoteProtocolError): + if retries < max_retries: + await asyncio.sleep(_retry_timeout_from_retries(retries=retries)) + return await self.request( + path=path, + method=method, + base_url=base_url, + params=params, + json=json, + data=data, + content=content, + files=files, + headers=headers, + request_options=request_options, + retries=retries + 1, + omit=omit, + force_multipart=force_multipart, + ) + raise + if _should_retry(response=response): if retries < max_retries: await asyncio.sleep(_retry_timeout(response=response, retries=retries)) @@ -649,12 +711,14 @@ async def request( base_url=base_url, params=params, json=json, + data=data, content=content, files=files, headers=headers, request_options=request_options, retries=retries + 1, omit=omit, + force_multipart=force_multipart, ) if self.logger.is_debug(): diff --git a/src/auth0/management/core/jsonable_encoder.py b/src/auth0/management/core/jsonable_encoder.py index f8beaeaf..5b0902eb 100644 --- a/src/auth0/management/core/jsonable_encoder.py +++ b/src/auth0/management/core/jsonable_encoder.py @@ -106,3 +106,15 @@ def fallback_serializer(o: Any) -> Any: return jsonable_encoder(data, custom_encoder=custom_encoder) return to_jsonable_with_fallback(obj, fallback_serializer) + + +def encode_path_param(obj: Any) -> str: + """Encode a value for use in a URL path segment. + + Ensures proper string conversion for all types, including + booleans which need lowercase 'true'/'false' rather than + Python's 'True'/'False'. + """ + if isinstance(obj, bool): + return "true" if obj else "false" + return str(jsonable_encoder(obj)) diff --git a/src/auth0/management/core/parse_error.py b/src/auth0/management/core/parse_error.py new file mode 100644 index 00000000..4527c6a8 --- /dev/null +++ b/src/auth0/management/core/parse_error.py @@ -0,0 +1,36 @@ +# This file was auto-generated by Fern from our API Definition. + +from typing import Any, Dict, Optional + + +class ParsingError(Exception): + """ + Raised when the SDK fails to parse/validate a response from the server. + This typically indicates that the server returned a response whose shape + does not match the expected schema. + """ + + headers: Optional[Dict[str, str]] + status_code: Optional[int] + body: Any + cause: Optional[Exception] + + def __init__( + self, + *, + headers: Optional[Dict[str, str]] = None, + status_code: Optional[int] = None, + body: Any = None, + cause: Optional[Exception] = None, + ) -> None: + self.headers = headers + self.status_code = status_code + self.body = body + self.cause = cause + super().__init__() + if cause is not None: + self.__cause__ = cause + + def __str__(self) -> str: + cause_str = f", cause: {self.cause}" if self.cause is not None else "" + return f"headers: {self.headers}, status_code: {self.status_code}, body: {self.body}{cause_str}" diff --git a/src/auth0/management/core/pydantic_utilities.py b/src/auth0/management/core/pydantic_utilities.py index 831aadc3..fea3a08d 100644 --- a/src/auth0/management/core/pydantic_utilities.py +++ b/src/auth0/management/core/pydantic_utilities.py @@ -26,6 +26,7 @@ import pydantic import typing_extensions +from pydantic.fields import FieldInfo as _FieldInfo _logger = logging.getLogger(__name__) @@ -35,8 +36,6 @@ IS_PYDANTIC_V2 = pydantic.VERSION.startswith("2.") if IS_PYDANTIC_V2: - import warnings - _datetime_adapter = pydantic.TypeAdapter(dt.datetime) # type: ignore[attr-defined] _date_adapter = pydantic.TypeAdapter(dt.date) # type: ignore[attr-defined] @@ -52,22 +51,80 @@ def parse_date(value: Any) -> dt.date: # type: ignore[misc] return value return _date_adapter.validate_python(value) - with warnings.catch_warnings(): - warnings.simplefilter("ignore", UserWarning) - from pydantic.v1.fields import ModelField as ModelField - from pydantic.v1.json import ENCODERS_BY_TYPE as encoders_by_type # type: ignore[attr-defined] - from pydantic.v1.typing import get_args as get_args - from pydantic.v1.typing import get_origin as get_origin - from pydantic.v1.typing import is_literal_type as is_literal_type - from pydantic.v1.typing import is_union as is_union + # Avoid importing from pydantic.v1 to maintain Python 3.14 compatibility. + from typing import get_args as get_args # type: ignore[assignment] + from typing import get_origin as get_origin # type: ignore[assignment] + + def is_literal_type(tp: Optional[Type[Any]]) -> bool: # type: ignore[misc] + return typing_extensions.get_origin(tp) is typing_extensions.Literal + + def is_union(tp: Optional[Type[Any]]) -> bool: # type: ignore[misc] + return tp is Union or typing_extensions.get_origin(tp) is Union # type: ignore[comparison-overlap] + + # Inline encoders_by_type to avoid importing from pydantic.v1.json + import re as _re + from collections import deque as _deque + from decimal import Decimal as _Decimal + from enum import Enum as _Enum + from ipaddress import ( + IPv4Address as _IPv4Address, + ) + from ipaddress import ( + IPv4Interface as _IPv4Interface, + ) + from ipaddress import ( + IPv4Network as _IPv4Network, + ) + from ipaddress import ( + IPv6Address as _IPv6Address, + ) + from ipaddress import ( + IPv6Interface as _IPv6Interface, + ) + from ipaddress import ( + IPv6Network as _IPv6Network, + ) + from pathlib import Path as _Path + from types import GeneratorType as _GeneratorType + from uuid import UUID as _UUID + + from pydantic.fields import FieldInfo as ModelField # type: ignore[no-redef, assignment] + + def _decimal_encoder(dec_value: Any) -> Any: + if dec_value.as_tuple().exponent >= 0: + return int(dec_value) + return float(dec_value) + + encoders_by_type: Dict[Type[Any], Callable[[Any], Any]] = { # type: ignore[no-redef] + bytes: lambda o: o.decode(), + dt.date: lambda o: o.isoformat(), + dt.datetime: lambda o: o.isoformat(), + dt.time: lambda o: o.isoformat(), + dt.timedelta: lambda td: td.total_seconds(), + _Decimal: _decimal_encoder, + _Enum: lambda o: o.value, + frozenset: list, + _deque: list, + _GeneratorType: list, + _IPv4Address: str, + _IPv4Interface: str, + _IPv4Network: str, + _IPv6Address: str, + _IPv6Interface: str, + _IPv6Network: str, + _Path: str, + _re.Pattern: lambda o: o.pattern, + set: list, + _UUID: str, + } else: from pydantic.datetime_parse import parse_date as parse_date # type: ignore[no-redef] from pydantic.datetime_parse import parse_datetime as parse_datetime # type: ignore[no-redef] - from pydantic.fields import ModelField as ModelField # type: ignore[attr-defined, no-redef] + from pydantic.fields import ModelField as ModelField # type: ignore[attr-defined, no-redef, assignment] from pydantic.json import ENCODERS_BY_TYPE as encoders_by_type # type: ignore[no-redef] from pydantic.typing import get_args as get_args # type: ignore[no-redef] from pydantic.typing import get_origin as get_origin # type: ignore[no-redef] - from pydantic.typing import is_literal_type as is_literal_type # type: ignore[no-redef] + from pydantic.typing import is_literal_type as is_literal_type # type: ignore[no-redef, assignment] from pydantic.typing import is_union as is_union # type: ignore[no-redef] from .datetime_utils import serialize_datetime @@ -554,7 +611,7 @@ def decorator(func: AnyCallable) -> AnyCallable: return decorator -PydanticField = Union[ModelField, pydantic.fields.FieldInfo] +PydanticField = Union[ModelField, _FieldInfo] def _get_model_fields(model: Type["Model"]) -> Mapping[str, PydanticField]: diff --git a/src/auth0/management/custom_domains/raw_client.py b/src/auth0/management/custom_domains/raw_client.py index 9254feee..7fc9fb40 100644 --- a/src/auth0/management/custom_domains/raw_client.py +++ b/src/auth0/management/custom_domains/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -28,6 +29,7 @@ from ..types.update_custom_domain_response_content import UpdateCustomDomainResponseContent from ..types.update_default_domain_response_content import UpdateDefaultDomainResponseContent from ..types.verify_custom_domain_response_content import VerifyCustomDomainResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -128,6 +130,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -270,6 +276,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_default( @@ -339,6 +349,10 @@ def get_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_default( @@ -407,6 +421,10 @@ def set_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -429,7 +447,7 @@ def get( Custom domain successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -501,6 +519,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -520,7 +542,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -574,6 +596,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -636,7 +662,7 @@ def update( Custom domain updated. """ _response = self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="PATCH", json={ "tls_policy": tls_policy, @@ -707,6 +733,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def test( @@ -729,7 +759,7 @@ def test( Custom domain test successfully completed. """ _response = self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}/test", + f"custom-domains/{encode_path_param(id)}/test", method="POST", request_options=request_options, ) @@ -801,6 +831,10 @@ def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def verify( @@ -830,7 +864,7 @@ def verify( Custom domain successfully verified. """ _response = self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}/verify", + f"custom-domains/{encode_path_param(id)}/verify", method="POST", request_options=request_options, ) @@ -902,6 +936,10 @@ def verify( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -1000,6 +1038,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1142,6 +1184,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_default( @@ -1211,6 +1257,10 @@ async def get_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_default( @@ -1279,6 +1329,10 @@ async def set_default( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1301,7 +1355,7 @@ async def get( Custom domain successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1373,6 +1427,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1394,7 +1452,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1448,6 +1506,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1510,7 +1572,7 @@ async def update( Custom domain updated. """ _response = await self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}", + f"custom-domains/{encode_path_param(id)}", method="PATCH", json={ "tls_policy": tls_policy, @@ -1581,6 +1643,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def test( @@ -1603,7 +1669,7 @@ async def test( Custom domain test successfully completed. """ _response = await self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}/test", + f"custom-domains/{encode_path_param(id)}/test", method="POST", request_options=request_options, ) @@ -1675,6 +1741,10 @@ async def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def verify( @@ -1704,7 +1774,7 @@ async def verify( Custom domain successfully verified. """ _response = await self._client_wrapper.httpx_client.request( - f"custom-domains/{jsonable_encoder(id)}/verify", + f"custom-domains/{encode_path_param(id)}/verify", method="POST", request_options=request_options, ) @@ -1776,4 +1846,8 @@ async def verify( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/device_credentials/raw_client.py b/src/auth0/management/device_credentials/raw_client.py index 56dbfca4..c2a21117 100644 --- a/src/auth0/management/device_credentials/raw_client.py +++ b/src/auth0/management/device_credentials/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -22,6 +23,7 @@ from ..types.list_device_credentials_offset_paginated_response_content import ( ListDeviceCredentialsOffsetPaginatedResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -168,6 +170,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create_public_key( @@ -293,6 +299,10 @@ def create_public_key( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -312,7 +322,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"device-credentials/{jsonable_encoder(id)}", + f"device-credentials/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -366,6 +376,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -513,6 +527,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create_public_key( @@ -638,6 +656,10 @@ async def create_public_key( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -659,7 +681,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"device-credentials/{jsonable_encoder(id)}", + f"device-credentials/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -713,4 +735,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/email_templates/raw_client.py b/src/auth0/management/email_templates/raw_client.py index 9509ffdc..f07b2b24 100644 --- a/src/auth0/management/email_templates/raw_client.py +++ b/src/auth0/management/email_templates/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -20,6 +21,7 @@ from ..types.get_email_template_response_content import GetEmailTemplateResponseContent from ..types.set_email_template_response_content import SetEmailTemplateResponseContent from ..types.update_email_template_response_content import UpdateEmailTemplateResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -170,6 +172,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -192,7 +198,7 @@ def get( Template successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="GET", request_options=request_options, ) @@ -253,6 +259,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -313,7 +323,7 @@ def set( Template successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="PUT", json={ "template": template, @@ -400,6 +410,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -460,7 +474,7 @@ def update( Template successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="PATCH", json={ "template": template, @@ -547,6 +561,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -695,6 +713,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -717,7 +739,7 @@ async def get( Template successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="GET", request_options=request_options, ) @@ -778,6 +800,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -838,7 +864,7 @@ async def set( Template successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="PUT", json={ "template": template, @@ -925,6 +951,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -985,7 +1015,7 @@ async def update( Template successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"email-templates/{jsonable_encoder(template_name)}", + f"email-templates/{encode_path_param(template_name)}", method="PATCH", json={ "template": template, @@ -1072,4 +1102,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/emails/provider/raw_client.py b/src/auth0/management/emails/provider/raw_client.py index ac074a0b..84c1ff24 100644 --- a/src/auth0/management/emails/provider/raw_client.py +++ b/src/auth0/management/emails/provider/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -23,6 +24,7 @@ ) from ...types.get_email_provider_response_content import GetEmailProviderResponseContent from ...types.update_email_provider_response_content import UpdateEmailProviderResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -135,6 +137,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -299,6 +305,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -380,6 +390,10 @@ def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -553,6 +567,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -663,6 +681,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -827,6 +849,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> AsyncHttpResponse[None]: @@ -908,6 +934,10 @@ async def delete(self, *, request_options: typing.Optional[RequestOptions] = Non _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1081,4 +1111,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/event_streams/deliveries/raw_client.py b/src/auth0/management/event_streams/deliveries/raw_client.py index f41dedec..b0efd6d6 100644 --- a/src/auth0/management/event_streams/deliveries/raw_client.py +++ b/src/auth0/management/event_streams/deliveries/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.event_stream_delivery import EventStreamDelivery from ...types.get_event_stream_delivery_history_response_content import GetEventStreamDeliveryHistoryResponseContent +from pydantic import ValidationError class RawDeliveriesClient: @@ -67,7 +69,7 @@ def list( Event stream deliveries successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/deliveries", + f"event-streams/{encode_path_param(id)}/deliveries", method="GET", params={ "statuses": statuses, @@ -147,6 +149,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_history( @@ -170,7 +176,7 @@ def get_history( Delivery history for event successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/deliveries/{jsonable_encoder(event_id)}", + f"event-streams/{encode_path_param(id)}/deliveries/{encode_path_param(event_id)}", method="GET", request_options=request_options, ) @@ -231,6 +237,10 @@ def get_history( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -283,7 +293,7 @@ async def list( Event stream deliveries successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/deliveries", + f"event-streams/{encode_path_param(id)}/deliveries", method="GET", params={ "statuses": statuses, @@ -363,6 +373,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_history( @@ -386,7 +400,7 @@ async def get_history( Delivery history for event successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/deliveries/{jsonable_encoder(event_id)}", + f"event-streams/{encode_path_param(id)}/deliveries/{encode_path_param(event_id)}", method="GET", request_options=request_options, ) @@ -447,4 +461,8 @@ async def get_history( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/event_streams/raw_client.py b/src/auth0/management/event_streams/raw_client.py index aa450f86..0f795b7b 100644 --- a/src/auth0/management/event_streams/raw_client.py +++ b/src/auth0/management/event_streams/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -29,6 +30,7 @@ from ..types.test_event_data_content import TestEventDataContent from ..types.update_event_stream_response_content import UpdateEventStreamResponseContent from .types.event_streams_create_request import EventStreamsCreateRequest +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -136,6 +138,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -234,6 +240,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -254,7 +264,7 @@ def get( Event stream successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -315,6 +325,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -332,7 +346,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -386,6 +400,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -423,7 +441,7 @@ def update( Event stream successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -498,6 +516,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def test( @@ -527,7 +549,7 @@ def test( Test event successfully submitted. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/test", + f"event-streams/{encode_path_param(id)}/test", method="POST", json={ "event_type": event_type, @@ -585,6 +607,10 @@ def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -693,6 +719,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -791,6 +821,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -811,7 +845,7 @@ async def get( Event stream successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -872,6 +906,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -891,7 +929,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -945,6 +983,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -982,7 +1024,7 @@ async def update( Event stream successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}", + f"event-streams/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1057,6 +1099,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def test( @@ -1086,7 +1132,7 @@ async def test( Test event successfully submitted. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/test", + f"event-streams/{encode_path_param(id)}/test", method="POST", json={ "event_type": event_type, @@ -1144,4 +1190,8 @@ async def test( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/event_streams/redeliveries/raw_client.py b/src/auth0/management/event_streams/redeliveries/raw_client.py index 719fe646..fd51b747 100644 --- a/src/auth0/management/event_streams/redeliveries/raw_client.py +++ b/src/auth0/management/event_streams/redeliveries/raw_client.py @@ -7,7 +7,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.conflict_error import ConflictError @@ -18,6 +19,7 @@ from ...types.create_event_stream_redelivery_response_content import CreateEventStreamRedeliveryResponseContent from ...types.event_stream_delivery_status_enum import EventStreamDeliveryStatusEnum from ...types.event_stream_event_type_enum import EventStreamEventTypeEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -64,7 +66,7 @@ def create( Redelivery request accepted. """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/redeliver", + f"event-streams/{encode_path_param(id)}/redeliver", method="POST", json={ "date_from": date_from, @@ -146,6 +148,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create_by_id( @@ -168,7 +174,7 @@ def create_by_id( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/redeliver/{jsonable_encoder(event_id)}", + f"event-streams/{encode_path_param(id)}/redeliver/{encode_path_param(event_id)}", method="POST", request_options=request_options, ) @@ -233,6 +239,10 @@ def create_by_id( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -277,7 +287,7 @@ async def create( Redelivery request accepted. """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/redeliver", + f"event-streams/{encode_path_param(id)}/redeliver", method="POST", json={ "date_from": date_from, @@ -359,6 +369,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create_by_id( @@ -381,7 +395,7 @@ async def create_by_id( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"event-streams/{jsonable_encoder(id)}/redeliver/{jsonable_encoder(event_id)}", + f"event-streams/{encode_path_param(id)}/redeliver/{encode_path_param(event_id)}", method="POST", request_options=request_options, ) @@ -446,4 +460,8 @@ async def create_by_id( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/flows/executions/raw_client.py b/src/auth0/management/flows/executions/raw_client.py index d13079c7..cf2ee99d 100644 --- a/src/auth0/management/flows/executions/raw_client.py +++ b/src/auth0/management/flows/executions/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ from ...types.get_flow_execution_request_parameters_hydrate_enum import GetFlowExecutionRequestParametersHydrateEnum from ...types.get_flow_execution_response_content import GetFlowExecutionResponseContent from ...types.list_flow_executions_paginated_response_content import ListFlowExecutionsPaginatedResponseContent +from pydantic import ValidationError class RawExecutionsClient: @@ -53,7 +55,7 @@ def list( Flow executions successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions", + f"flows/{encode_path_param(flow_id)}/executions", method="GET", params={ "from": from_, @@ -127,6 +129,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -163,7 +169,7 @@ def get( Flow execution successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions/{jsonable_encoder(execution_id)}", + f"flows/{encode_path_param(flow_id)}/executions/{encode_path_param(execution_id)}", method="GET", params={ "hydrate": hydrate, @@ -227,6 +233,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -249,7 +259,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions/{jsonable_encoder(execution_id)}", + f"flows/{encode_path_param(flow_id)}/executions/{encode_path_param(execution_id)}", method="DELETE", request_options=request_options, ) @@ -303,6 +313,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -339,7 +353,7 @@ async def list( Flow executions successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions", + f"flows/{encode_path_param(flow_id)}/executions", method="GET", params={ "from": from_, @@ -416,6 +430,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -452,7 +470,7 @@ async def get( Flow execution successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions/{jsonable_encoder(execution_id)}", + f"flows/{encode_path_param(flow_id)}/executions/{encode_path_param(execution_id)}", method="GET", params={ "hydrate": hydrate, @@ -516,6 +534,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -538,7 +560,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(flow_id)}/executions/{jsonable_encoder(execution_id)}", + f"flows/{encode_path_param(flow_id)}/executions/{encode_path_param(execution_id)}", method="DELETE", request_options=request_options, ) @@ -592,4 +614,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/flows/raw_client.py b/src/auth0/management/flows/raw_client.py index c884787e..43ac4738 100644 --- a/src/auth0/management/flows/raw_client.py +++ b/src/auth0/management/flows/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -24,6 +25,7 @@ from ..types.list_flows_offset_paginated_response_content import ListFlowsOffsetPaginatedResponseContent from ..types.list_flows_request_parameters_hydrate_enum import ListFlowsRequestParametersHydrateEnum from ..types.update_flow_response_content import UpdateFlowResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -152,6 +154,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -248,6 +254,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -277,7 +287,7 @@ def get( Flow successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="GET", params={ "hydrate": hydrate, @@ -352,6 +362,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -369,7 +383,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -434,6 +448,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -463,7 +481,7 @@ def update( Flow successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -534,6 +552,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -663,6 +685,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -759,6 +785,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -788,7 +818,7 @@ async def get( Flow successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="GET", params={ "hydrate": hydrate, @@ -863,6 +893,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -882,7 +916,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -947,6 +981,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -976,7 +1014,7 @@ async def update( Flow successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/{jsonable_encoder(id)}", + f"flows/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1047,4 +1085,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/flows/vault/connections/raw_client.py b/src/auth0/management/flows/vault/connections/raw_client.py index b786fb4a..334adfad 100644 --- a/src/auth0/management/flows/vault/connections/raw_client.py +++ b/src/auth0/management/flows/vault/connections/raw_client.py @@ -6,8 +6,9 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param from ....core.pagination import AsyncPager, SyncPager +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....core.serialization import convert_and_respect_annotation_metadata @@ -25,6 +26,7 @@ ) from ....types.update_flows_vault_connection_response_content import UpdateFlowsVaultConnectionResponseContent from ....types.update_flows_vault_connection_setup import UpdateFlowsVaultConnectionSetup +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -139,6 +141,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -229,6 +235,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -249,7 +259,7 @@ def get( Flow vault connection successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -321,6 +331,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -338,7 +352,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -392,6 +406,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -422,7 +440,7 @@ def update( Flow vault connection successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -504,6 +522,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -619,6 +641,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -709,6 +735,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -729,7 +759,7 @@ async def get( Flow vault connection successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -801,6 +831,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -820,7 +854,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -874,6 +908,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -904,7 +942,7 @@ async def update( Flow vault connection successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"flows/vault/connections/{jsonable_encoder(id)}", + f"flows/vault/connections/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -986,4 +1024,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/forms/raw_client.py b/src/auth0/management/forms/raw_client.py index cdedc5de..772b6fb1 100644 --- a/src/auth0/management/forms/raw_client.py +++ b/src/auth0/management/forms/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -36,6 +37,7 @@ from ..types.get_form_response_content import GetFormResponseContent from ..types.list_forms_offset_paginated_response_content import ListFormsOffsetPaginatedResponseContent from ..types.update_form_response_content import UpdateFormResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -158,6 +160,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -288,6 +294,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -317,7 +327,7 @@ def get( Form successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="GET", params={ "hydrate": hydrate, @@ -392,6 +402,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -409,7 +423,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -463,6 +477,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -510,7 +528,7 @@ def update( Form successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -586,6 +604,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -709,6 +731,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -839,6 +865,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -868,7 +898,7 @@ async def get( Form successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="GET", params={ "hydrate": hydrate, @@ -943,6 +973,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -962,7 +996,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1016,6 +1050,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1063,7 +1101,7 @@ async def update( Form successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"forms/{jsonable_encoder(id)}", + f"forms/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1139,4 +1177,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/groups/members/raw_client.py b/src/auth0/management/groups/members/raw_client.py index 94b5597b..5b75317a 100644 --- a/src/auth0/management/groups/members/raw_client.py +++ b/src/auth0/management/groups/members/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.get_group_members_response_content import GetGroupMembersResponseContent from ...types.group_member import GroupMember +from pydantic import ValidationError class RawMembersClient: @@ -60,7 +62,7 @@ def get( Group members successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}/members", + f"groups/{encode_path_param(id)}/members", method="GET", params={ "fields": fields, @@ -138,6 +140,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -184,7 +190,7 @@ async def get( Group members successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}/members", + f"groups/{encode_path_param(id)}/members", method="GET", params={ "fields": fields, @@ -265,4 +271,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/groups/raw_client.py b/src/auth0/management/groups/raw_client.py index 3952a289..968bcab8 100644 --- a/src/auth0/management/groups/raw_client.py +++ b/src/auth0/management/groups/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ from ..types.get_group_response_content import GetGroupResponseContent from ..types.group import Group from ..types.list_groups_paginated_response_content import ListGroupsPaginatedResponseContent +from pydantic import ValidationError class RawGroupsClient: @@ -154,6 +156,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -176,7 +182,7 @@ def get( Group successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}", + f"groups/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -248,6 +254,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -267,7 +277,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}", + f"groups/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -321,6 +331,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -461,6 +475,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -483,7 +501,7 @@ async def get( Group successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}", + f"groups/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -555,6 +573,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -576,7 +598,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"groups/{jsonable_encoder(id)}", + f"groups/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -630,4 +652,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/enrollments/raw_client.py b/src/auth0/management/guardian/enrollments/raw_client.py index da0305b4..48c492b5 100644 --- a/src/auth0/management/guardian/enrollments/raw_client.py +++ b/src/auth0/management/guardian/enrollments/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ...types.create_guardian_enrollment_ticket_response_content import CreateGuardianEnrollmentTicketResponseContent from ...types.get_guardian_enrollment_response_content import GetGuardianEnrollmentResponseContent from ...types.guardian_enrollment_factor_enum import GuardianEnrollmentFactorEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -143,6 +145,10 @@ def create_ticket( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -165,7 +171,7 @@ def get( Enrollment successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"guardian/enrollments/{jsonable_encoder(id)}", + f"guardian/enrollments/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -215,6 +221,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -234,7 +244,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"guardian/enrollments/{jsonable_encoder(id)}", + f"guardian/enrollments/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -277,6 +287,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -402,6 +416,10 @@ async def create_ticket( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -424,7 +442,7 @@ async def get( Enrollment successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"guardian/enrollments/{jsonable_encoder(id)}", + f"guardian/enrollments/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -474,6 +492,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -495,7 +517,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"guardian/enrollments/{jsonable_encoder(id)}", + f"guardian/enrollments/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -538,4 +560,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/factors/duo/settings/raw_client.py b/src/auth0/management/guardian/factors/duo/settings/raw_client.py index bb14a16b..3a27164d 100644 --- a/src/auth0/management/guardian/factors/duo/settings/raw_client.py +++ b/src/auth0/management/guardian/factors/duo/settings/raw_client.py @@ -6,6 +6,7 @@ from .....core.api_error import ApiError from .....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from .....core.http_response import AsyncHttpResponse, HttpResponse +from .....core.parse_error import ParsingError from .....core.pydantic_utilities import parse_obj_as from .....core.request_options import RequestOptions from .....errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from .....types.update_guardian_factor_duo_settings_response_content import ( UpdateGuardianFactorDuoSettingsResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -92,6 +94,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -181,6 +187,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -268,6 +278,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -342,6 +356,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -431,6 +449,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -518,4 +540,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/factors/phone/raw_client.py b/src/auth0/management/guardian/factors/phone/raw_client.py index 150eef98..deb721b0 100644 --- a/src/auth0/management/guardian/factors/phone/raw_client.py +++ b/src/auth0/management/guardian/factors/phone/raw_client.py @@ -6,6 +6,7 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -38,6 +39,7 @@ from ....types.set_guardian_factors_provider_phone_twilio_response_content import ( SetGuardianFactorsProviderPhoneTwilioResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -114,6 +116,10 @@ def get_message_types( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_message_types( @@ -207,6 +213,10 @@ def set_message_types( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_twilio_provider( @@ -276,6 +286,10 @@ def get_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_twilio_provider( @@ -373,6 +387,10 @@ def set_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_selected_provider( @@ -442,6 +460,10 @@ def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_provider( @@ -521,6 +543,10 @@ def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_templates( @@ -590,6 +616,10 @@ def get_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_templates( @@ -677,6 +707,10 @@ def set_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -751,6 +785,10 @@ async def get_message_types( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_message_types( @@ -844,6 +882,10 @@ async def set_message_types( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_twilio_provider( @@ -913,6 +955,10 @@ async def get_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_twilio_provider( @@ -1010,6 +1056,10 @@ async def set_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_selected_provider( @@ -1079,6 +1129,10 @@ async def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_provider( @@ -1158,6 +1212,10 @@ async def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_templates( @@ -1227,6 +1285,10 @@ async def get_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_templates( @@ -1314,4 +1376,8 @@ async def set_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/factors/push_notification/raw_client.py b/src/auth0/management/guardian/factors/push_notification/raw_client.py index ce2a84fc..dbf3f3e8 100644 --- a/src/auth0/management/guardian/factors/push_notification/raw_client.py +++ b/src/auth0/management/guardian/factors/push_notification/raw_client.py @@ -6,6 +6,7 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -46,6 +47,7 @@ from ....types.update_guardian_factors_provider_push_notification_sns_response_content import ( UpdateGuardianFactorsProviderPushNotificationSnsResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -122,6 +124,10 @@ def get_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_apns_provider( @@ -211,6 +217,10 @@ def set_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_apns_provider( @@ -300,6 +310,10 @@ def update_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_fcm_provider( @@ -378,6 +392,10 @@ def set_fcm_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_fcm_provider( @@ -456,6 +474,10 @@ def update_fcm_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_fcmv_1_provider( @@ -537,6 +559,10 @@ def set_fcmv_1_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_fcmv_1_provider( @@ -618,6 +644,10 @@ def update_fcmv_1_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_sns_provider( @@ -687,6 +717,10 @@ def get_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_sns_provider( @@ -784,6 +818,10 @@ def set_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_sns_provider( @@ -881,6 +919,10 @@ def update_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_selected_provider( @@ -950,6 +992,10 @@ def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_provider( @@ -1031,6 +1077,10 @@ def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -1105,6 +1155,10 @@ async def get_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_apns_provider( @@ -1194,6 +1248,10 @@ async def set_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_apns_provider( @@ -1283,6 +1341,10 @@ async def update_apns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_fcm_provider( @@ -1361,6 +1423,10 @@ async def set_fcm_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_fcm_provider( @@ -1439,6 +1505,10 @@ async def update_fcm_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_fcmv_1_provider( @@ -1520,6 +1590,10 @@ async def set_fcmv_1_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_fcmv_1_provider( @@ -1601,6 +1675,10 @@ async def update_fcmv_1_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_sns_provider( @@ -1670,6 +1748,10 @@ async def get_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_sns_provider( @@ -1767,6 +1849,10 @@ async def set_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_sns_provider( @@ -1864,6 +1950,10 @@ async def update_sns_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_selected_provider( @@ -1933,6 +2023,10 @@ async def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_provider( @@ -2014,4 +2108,8 @@ async def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/factors/raw_client.py b/src/auth0/management/guardian/factors/raw_client.py index 14705711..121b68a3 100644 --- a/src/auth0/management/guardian/factors/raw_client.py +++ b/src/auth0/management/guardian/factors/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...types.guardian_factor import GuardianFactor from ...types.guardian_factor_name_enum import GuardianFactorNameEnum from ...types.set_guardian_factor_response_content import SetGuardianFactorResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -91,6 +93,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -116,7 +122,7 @@ def set( Factor updated successfully. """ _response = self._client_wrapper.httpx_client.request( - f"guardian/factors/{jsonable_encoder(name)}", + f"guardian/factors/{encode_path_param(name)}", method="PUT", json={ "enabled": enabled, @@ -173,6 +179,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -247,6 +257,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -272,7 +286,7 @@ async def set( Factor updated successfully. """ _response = await self._client_wrapper.httpx_client.request( - f"guardian/factors/{jsonable_encoder(name)}", + f"guardian/factors/{encode_path_param(name)}", method="PUT", json={ "enabled": enabled, @@ -329,4 +343,8 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/factors/sms/raw_client.py b/src/auth0/management/guardian/factors/sms/raw_client.py index f6d0bccc..1741678f 100644 --- a/src/auth0/management/guardian/factors/sms/raw_client.py +++ b/src/auth0/management/guardian/factors/sms/raw_client.py @@ -6,6 +6,7 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -22,6 +23,7 @@ from ....types.set_guardian_factors_provider_sms_twilio_response_content import ( SetGuardianFactorsProviderSmsTwilioResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -100,6 +102,10 @@ def get_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_twilio_provider( @@ -199,6 +205,10 @@ def set_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_selected_provider( @@ -270,6 +280,10 @@ def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_provider( @@ -353,6 +367,10 @@ def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_templates( @@ -424,6 +442,10 @@ def get_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set_templates( @@ -513,6 +535,10 @@ def set_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -589,6 +615,10 @@ async def get_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_twilio_provider( @@ -688,6 +718,10 @@ async def set_twilio_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_selected_provider( @@ -759,6 +793,10 @@ async def get_selected_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_provider( @@ -842,6 +880,10 @@ async def set_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_templates( @@ -913,6 +955,10 @@ async def get_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set_templates( @@ -1002,4 +1048,8 @@ async def set_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/guardian/policies/raw_client.py b/src/auth0/management/guardian/policies/raw_client.py index 99c49cb9..1598a66e 100644 --- a/src/auth0/management/guardian/policies/raw_client.py +++ b/src/auth0/management/guardian/policies/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -14,6 +15,7 @@ from ...types.list_guardian_policies_response_content import ListGuardianPoliciesResponseContent from ...types.set_guardian_policies_request_content import SetGuardianPoliciesRequestContent from ...types.set_guardian_policies_response_content import SetGuardianPoliciesResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -98,6 +100,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -182,6 +188,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -264,6 +274,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -348,4 +362,8 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/hooks/raw_client.py b/src/auth0/management/hooks/raw_client.py index 16674541..9aefaf59 100644 --- a/src/auth0/management/hooks/raw_client.py +++ b/src/auth0/management/hooks/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -23,6 +24,7 @@ from ..types.hook_trigger_id_enum import HookTriggerIdEnum from ..types.list_hooks_offset_paginated_response_content import ListHooksOffsetPaginatedResponseContent from ..types.update_hook_response_content import UpdateHookResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -168,6 +170,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -291,6 +297,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -316,7 +326,7 @@ def get( Hook successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -391,6 +401,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -410,7 +424,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -464,6 +478,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -504,7 +522,7 @@ def update( Hook successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -597,6 +615,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -743,6 +765,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -866,6 +892,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -891,7 +921,7 @@ async def get( Hook successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -966,6 +996,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -987,7 +1021,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1041,6 +1075,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1081,7 +1119,7 @@ async def update( Hook successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}", + f"hooks/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1174,4 +1212,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/hooks/secrets/raw_client.py b/src/auth0/management/hooks/secrets/raw_client.py index 329add68..09d0073c 100644 --- a/src/auth0/management/hooks/secrets/raw_client.py +++ b/src/auth0/management/hooks/secrets/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -19,6 +20,7 @@ from ...types.delete_hook_secret_request_content import DeleteHookSecretRequestContent from ...types.get_hook_secret_response_content import GetHookSecretResponseContent from ...types.update_hook_secret_request_content import UpdateHookSecretRequestContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -48,7 +50,7 @@ def get( Hook secrets successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="GET", request_options=request_options, ) @@ -120,6 +122,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -147,7 +153,7 @@ def create( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="POST", json=request, headers={ @@ -217,6 +223,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -244,7 +254,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="DELETE", json=request, headers={ @@ -303,6 +313,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -330,7 +344,7 @@ def update( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="PATCH", json=request, headers={ @@ -411,6 +425,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -438,7 +456,7 @@ async def get( Hook secrets successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="GET", request_options=request_options, ) @@ -510,6 +528,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -537,7 +559,7 @@ async def create( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="POST", json=request, headers={ @@ -607,6 +629,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -634,7 +660,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="DELETE", json=request, headers={ @@ -693,6 +719,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -720,7 +750,7 @@ async def update( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"hooks/{jsonable_encoder(id)}/secrets", + f"hooks/{encode_path_param(id)}/secrets", method="PATCH", json=request, headers={ @@ -801,4 +831,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/jobs/errors/raw_client.py b/src/auth0/management/jobs/errors/raw_client.py index 0e6b4a1e..f6d51d7d 100644 --- a/src/auth0/management/jobs/errors/raw_client.py +++ b/src/auth0/management/jobs/errors/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from .types.errors_get_response import ErrorsGetResponse +from pydantic import ValidationError class RawErrorsClient: @@ -41,7 +43,7 @@ def get( Job successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"jobs/{jsonable_encoder(id)}/errors", + f"jobs/{encode_path_param(id)}/errors", method="GET", request_options=request_options, ) @@ -113,6 +115,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -140,7 +146,7 @@ async def get( Job successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"jobs/{jsonable_encoder(id)}/errors", + f"jobs/{encode_path_param(id)}/errors", method="GET", request_options=request_options, ) @@ -212,4 +218,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/jobs/raw_client.py b/src/auth0/management/jobs/raw_client.py index 31cd0e93..7e612169 100644 --- a/src/auth0/management/jobs/raw_client.py +++ b/src/auth0/management/jobs/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ..errors.too_many_requests_error import TooManyRequestsError from ..errors.unauthorized_error import UnauthorizedError from ..types.get_job_response_content import GetJobResponseContent +from pydantic import ValidationError class RawJobsClient: @@ -41,7 +43,7 @@ def get( Job retrieved successfully. """ _response = self._client_wrapper.httpx_client.request( - f"jobs/{jsonable_encoder(id)}", + f"jobs/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -113,6 +115,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -140,7 +146,7 @@ async def get( Job retrieved successfully. """ _response = await self._client_wrapper.httpx_client.request( - f"jobs/{jsonable_encoder(id)}", + f"jobs/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -212,4 +218,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/jobs/users_exports/raw_client.py b/src/auth0/management/jobs/users_exports/raw_client.py index 4a8dee63..0c184255 100644 --- a/src/auth0/management/jobs/users_exports/raw_client.py +++ b/src/auth0/management/jobs/users_exports/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -16,6 +17,7 @@ from ...types.create_export_users_fields import CreateExportUsersFields from ...types.create_export_users_response_content import CreateExportUsersResponseContent from ...types.job_file_format_enum import JobFileFormatEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -132,6 +134,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -246,4 +252,8 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/jobs/users_imports/raw_client.py b/src/auth0/management/jobs/users_imports/raw_client.py index ee1abd3c..db8a1a3e 100644 --- a/src/auth0/management/jobs/users_imports/raw_client.py +++ b/src/auth0/management/jobs/users_imports/raw_client.py @@ -7,6 +7,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.create_import_users_response_content import CreateImportUsersResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -158,6 +160,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -298,4 +304,8 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/jobs/verification_email/raw_client.py b/src/auth0/management/jobs/verification_email/raw_client.py index 2176079a..d19fbfa5 100644 --- a/src/auth0/management/jobs/verification_email/raw_client.py +++ b/src/auth0/management/jobs/verification_email/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.create_verification_email_response_content import CreateVerificationEmailResponseContent from ...types.identity import Identity +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -133,6 +135,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -249,4 +255,8 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/keys/custom_signing/raw_client.py b/src/auth0/management/keys/custom_signing/raw_client.py index 5fba4601..66a5554c 100644 --- a/src/auth0/management/keys/custom_signing/raw_client.py +++ b/src/auth0/management/keys/custom_signing/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -17,6 +18,7 @@ from ...types.custom_signing_key_jwk import CustomSigningKeyJwk from ...types.get_custom_signing_keys_response_content import GetCustomSigningKeysResponseContent from ...types.set_custom_signing_keys_response_content import SetCustomSigningKeysResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -104,6 +106,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -196,6 +202,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -255,6 +265,10 @@ def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -340,6 +354,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -432,6 +450,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete(self, *, request_options: typing.Optional[RequestOptions] = None) -> AsyncHttpResponse[None]: @@ -491,4 +513,8 @@ async def delete(self, *, request_options: typing.Optional[RequestOptions] = Non _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/keys/encryption/raw_client.py b/src/auth0/management/keys/encryption/raw_client.py index 786bd630..794d5325 100644 --- a/src/auth0/management/keys/encryption/raw_client.py +++ b/src/auth0/management/keys/encryption/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -27,6 +28,7 @@ from ...types.list_encryption_key_offset_paginated_response_content import ( ListEncryptionKeyOffsetPaginatedResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -143,6 +145,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -243,6 +249,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def rekey(self, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -302,6 +312,10 @@ def rekey(self, *, request_options: typing.Optional[RequestOptions] = None) -> H _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -324,7 +338,7 @@ def get( The key was successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="GET", request_options=request_options, ) @@ -396,6 +410,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def import_( @@ -421,7 +439,7 @@ def import_( The key was successfully imported. """ _response = self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="POST", json={ "wrapped_key": wrapped_key, @@ -500,6 +518,10 @@ def import_( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, kid: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -519,7 +541,7 @@ def delete(self, kid: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="DELETE", request_options=request_options, ) @@ -573,6 +595,10 @@ def delete(self, kid: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create_public_wrapping_key( @@ -595,7 +621,7 @@ def create_public_wrapping_key( The public wrapping key was successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}/wrapping-key", + f"keys/encryption/{encode_path_param(kid)}/wrapping-key", method="POST", request_options=request_options, ) @@ -667,6 +693,10 @@ def create_public_wrapping_key( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -784,6 +814,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -884,6 +918,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def rekey(self, *, request_options: typing.Optional[RequestOptions] = None) -> AsyncHttpResponse[None]: @@ -943,6 +981,10 @@ async def rekey(self, *, request_options: typing.Optional[RequestOptions] = None _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -965,7 +1007,7 @@ async def get( The key was successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="GET", request_options=request_options, ) @@ -1037,6 +1079,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def import_( @@ -1062,7 +1108,7 @@ async def import_( The key was successfully imported. """ _response = await self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="POST", json={ "wrapped_key": wrapped_key, @@ -1141,6 +1187,10 @@ async def import_( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1162,7 +1212,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}", + f"keys/encryption/{encode_path_param(kid)}", method="DELETE", request_options=request_options, ) @@ -1216,6 +1266,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create_public_wrapping_key( @@ -1238,7 +1292,7 @@ async def create_public_wrapping_key( The public wrapping key was successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"keys/encryption/{jsonable_encoder(kid)}/wrapping-key", + f"keys/encryption/{encode_path_param(kid)}/wrapping-key", method="POST", request_options=request_options, ) @@ -1310,4 +1364,8 @@ async def create_public_wrapping_key( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/keys/signing/raw_client.py b/src/auth0/management/keys/signing/raw_client.py index c5eb95a7..6a5ccaa5 100644 --- a/src/auth0/management/keys/signing/raw_client.py +++ b/src/auth0/management/keys/signing/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ from ...types.revoked_signing_keys_response_content import RevokedSigningKeysResponseContent from ...types.rotate_signing_keys_response_content import RotateSigningKeysResponseContent from ...types.signing_keys import SigningKeys +from pydantic import ValidationError class RawSigningClient: @@ -102,6 +104,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def rotate( @@ -171,6 +177,10 @@ def rotate( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -193,7 +203,7 @@ def get( The signing keys were retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"keys/signing/{jsonable_encoder(kid)}", + f"keys/signing/{encode_path_param(kid)}", method="GET", request_options=request_options, ) @@ -254,6 +264,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def revoke( @@ -276,7 +290,7 @@ def revoke( Signing key revoked successfully. """ _response = self._client_wrapper.httpx_client.request( - f"keys/signing/{jsonable_encoder(kid)}/revoke", + f"keys/signing/{encode_path_param(kid)}/revoke", method="PUT", request_options=request_options, ) @@ -337,6 +351,10 @@ def revoke( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -422,6 +440,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def rotate( @@ -491,6 +513,10 @@ async def rotate( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -513,7 +539,7 @@ async def get( The signing keys were retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"keys/signing/{jsonable_encoder(kid)}", + f"keys/signing/{encode_path_param(kid)}", method="GET", request_options=request_options, ) @@ -574,6 +600,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def revoke( @@ -596,7 +626,7 @@ async def revoke( Signing key revoked successfully. """ _response = await self._client_wrapper.httpx_client.request( - f"keys/signing/{jsonable_encoder(kid)}/revoke", + f"keys/signing/{encode_path_param(kid)}/revoke", method="PUT", request_options=request_options, ) @@ -657,4 +687,8 @@ async def revoke( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/log_streams/raw_client.py b/src/auth0/management/log_streams/raw_client.py index d7a5f41b..8a4667b3 100644 --- a/src/auth0/management/log_streams/raw_client.py +++ b/src/auth0/management/log_streams/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -25,6 +26,7 @@ from ..types.log_stream_sink_patch import LogStreamSinkPatch from ..types.log_stream_status_enum import LogStreamStatusEnum from ..types.update_log_stream_response_content import UpdateLogStreamResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -177,6 +179,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -402,6 +408,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -525,7 +535,7 @@ def get( Returning log stream. """ _response = self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -586,6 +596,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -605,7 +619,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -670,6 +684,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -750,7 +768,7 @@ def update( Log stream updated """ _response = self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -829,6 +847,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -979,6 +1001,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1204,6 +1230,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1327,7 +1357,7 @@ async def get( Returning log stream. """ _response = await self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1388,6 +1418,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1409,7 +1443,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1474,6 +1508,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1554,7 +1592,7 @@ async def update( Log stream updated """ _response = await self._client_wrapper.httpx_client.request( - f"log-streams/{jsonable_encoder(id)}", + f"log-streams/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1633,4 +1671,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/logs/raw_client.py b/src/auth0/management/logs/raw_client.py index 399c5cff..4cedb4f0 100644 --- a/src/auth0/management/logs/raw_client.py +++ b/src/auth0/management/logs/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ from ..types.get_log_response_content import GetLogResponseContent from ..types.list_log_offset_paginated_response_content import ListLogOffsetPaginatedResponseContent from ..types.log import Log +from pydantic import ValidationError class RawLogsClient: @@ -185,6 +187,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -207,7 +213,7 @@ def get( Log successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"logs/{jsonable_encoder(id)}", + f"logs/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -279,6 +285,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -450,6 +460,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -472,7 +486,7 @@ async def get( Log successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"logs/{jsonable_encoder(id)}", + f"logs/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -544,4 +558,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/network_acls/raw_client.py b/src/auth0/management/network_acls/raw_client.py index 97d52680..6ff37a6b 100644 --- a/src/auth0/management/network_acls/raw_client.py +++ b/src/auth0/management/network_acls/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -24,6 +25,7 @@ from ..types.network_acls_response_content import NetworkAclsResponseContent from ..types.set_network_acls_response_content import SetNetworkAclsResponseContent from ..types.update_network_acl_response_content import UpdateNetworkAclResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -140,6 +142,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -262,6 +268,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -284,7 +294,7 @@ def get( Network access control list successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -345,6 +355,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -384,7 +398,7 @@ def set( Network ACL properties successfully updated """ _response = self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="PUT", json={ "description": description, @@ -468,6 +482,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -487,7 +505,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -552,6 +570,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -591,7 +613,7 @@ def update( Network ACL properties successfully updated """ _response = self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="PATCH", json={ "description": description, @@ -675,6 +697,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -792,6 +818,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -914,6 +944,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -936,7 +970,7 @@ async def get( Network access control list successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -997,6 +1031,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -1036,7 +1074,7 @@ async def set( Network ACL properties successfully updated """ _response = await self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="PUT", json={ "description": description, @@ -1120,6 +1158,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1141,7 +1183,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1206,6 +1248,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1245,7 +1291,7 @@ async def update( Network ACL properties successfully updated """ _response = await self._client_wrapper.httpx_client.request( - f"network-acls/{jsonable_encoder(id)}", + f"network-acls/{encode_path_param(id)}", method="PATCH", json={ "description": description, @@ -1329,4 +1375,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/client_grants/raw_client.py b/src/auth0/management/organizations/client_grants/raw_client.py index 47ea8c3e..e85eb4f6 100644 --- a/src/auth0/management/organizations/client_grants/raw_client.py +++ b/src/auth0/management/organizations/client_grants/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -23,6 +24,7 @@ ListOrganizationClientGrantsOffsetPaginatedResponseContent, ) from ...types.organization_client_grant import OrganizationClientGrant +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -79,7 +81,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants", + f"organizations/{encode_path_param(id)}/client-grants", method="GET", params={ "audience": audience, @@ -160,6 +162,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -183,7 +189,7 @@ def create( Client Grant successfully associated with Organization. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants", + f"organizations/{encode_path_param(id)}/client-grants", method="POST", json={ "grant_id": grant_id, @@ -273,6 +279,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -295,7 +305,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants/{jsonable_encoder(grant_id)}", + f"organizations/{encode_path_param(id)}/client-grants/{encode_path_param(grant_id)}", method="DELETE", request_options=request_options, ) @@ -360,6 +370,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -414,7 +428,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants", + f"organizations/{encode_path_param(id)}/client-grants", method="GET", params={ "audience": audience, @@ -498,6 +512,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -521,7 +539,7 @@ async def create( Client Grant successfully associated with Organization. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants", + f"organizations/{encode_path_param(id)}/client-grants", method="POST", json={ "grant_id": grant_id, @@ -611,6 +629,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -633,7 +655,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/client-grants/{jsonable_encoder(grant_id)}", + f"organizations/{encode_path_param(id)}/client-grants/{encode_path_param(grant_id)}", method="DELETE", request_options=request_options, ) @@ -698,4 +720,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/connections/raw_client.py b/src/auth0/management/organizations/connections/raw_client.py index 0dc9d2b5..290f99a2 100644 --- a/src/auth0/management/organizations/connections/raw_client.py +++ b/src/auth0/management/organizations/connections/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -25,6 +26,7 @@ from ...types.organization_access_level_enum_with_null import OrganizationAccessLevelEnumWithNull from ...types.organization_all_connection_post import OrganizationAllConnectionPost from ...types.update_organization_all_connection_response_content import UpdateOrganizationAllConnectionResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -73,7 +75,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections", + f"organizations/{encode_path_param(id)}/connections", method="GET", params={ "page": page, @@ -150,6 +152,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -200,7 +206,7 @@ def create( Connection successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections", + f"organizations/{encode_path_param(id)}/connections", method="POST", json={ "organization_connection_name": organization_connection_name, @@ -285,6 +291,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -308,7 +318,7 @@ def get( Connection successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="GET", request_options=request_options, ) @@ -369,6 +379,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -391,7 +405,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="DELETE", request_options=request_options, ) @@ -434,6 +448,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -484,7 +502,7 @@ def update( Connection successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="PATCH", json={ "organization_connection_name": organization_connection_name, @@ -557,6 +575,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -603,7 +625,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections", + f"organizations/{encode_path_param(id)}/connections", method="GET", params={ "page": page, @@ -683,6 +705,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -733,7 +759,7 @@ async def create( Connection successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections", + f"organizations/{encode_path_param(id)}/connections", method="POST", json={ "organization_connection_name": organization_connection_name, @@ -818,6 +844,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -841,7 +871,7 @@ async def get( Connection successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="GET", request_options=request_options, ) @@ -902,6 +932,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -924,7 +958,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="DELETE", request_options=request_options, ) @@ -967,6 +1001,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1017,7 +1055,7 @@ async def update( Connection successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/connections/{encode_path_param(connection_id)}", method="PATCH", json={ "organization_connection_name": organization_connection_name, @@ -1090,4 +1128,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/discovery_domains/raw_client.py b/src/auth0/management/organizations/discovery_domains/raw_client.py index d3ed04b3..35d7feb7 100644 --- a/src/auth0/management/organizations/discovery_domains/raw_client.py +++ b/src/auth0/management/organizations/discovery_domains/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -31,6 +32,7 @@ from ...types.update_organization_discovery_domain_response_content import ( UpdateOrganizationDiscoveryDomainResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -72,7 +74,7 @@ def list( Organization discovery domains retrieved successfully. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains", + f"organizations/{encode_path_param(id)}/discovery-domains", method="GET", params={ "from": from_, @@ -157,6 +159,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -193,7 +199,7 @@ def create( Organization discovery domain successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains", + f"organizations/{encode_path_param(id)}/discovery-domains", method="POST", json={ "domain": domain, @@ -285,6 +291,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_by_name( @@ -311,7 +321,7 @@ def get_by_name( Organization discovery domain successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/name/{jsonable_encoder(discovery_domain)}", + f"organizations/{encode_path_param(id)}/discovery-domains/name/{encode_path_param(discovery_domain)}", method="GET", request_options=request_options, ) @@ -383,6 +393,10 @@ def get_by_name( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -409,7 +423,7 @@ def get( Organization discovery domain successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="GET", request_options=request_options, ) @@ -481,6 +495,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -505,7 +523,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="DELETE", request_options=request_options, ) @@ -559,6 +577,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -595,7 +617,7 @@ def update( Organization discovery domain successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="PATCH", json={ "status": status, @@ -642,6 +664,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -681,7 +707,7 @@ async def list( Organization discovery domains retrieved successfully. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains", + f"organizations/{encode_path_param(id)}/discovery-domains", method="GET", params={ "from": from_, @@ -769,6 +795,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -805,7 +835,7 @@ async def create( Organization discovery domain successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains", + f"organizations/{encode_path_param(id)}/discovery-domains", method="POST", json={ "domain": domain, @@ -897,6 +927,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_by_name( @@ -923,7 +957,7 @@ async def get_by_name( Organization discovery domain successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/name/{jsonable_encoder(discovery_domain)}", + f"organizations/{encode_path_param(id)}/discovery-domains/name/{encode_path_param(discovery_domain)}", method="GET", request_options=request_options, ) @@ -995,6 +1029,10 @@ async def get_by_name( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1021,7 +1059,7 @@ async def get( Organization discovery domain successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="GET", request_options=request_options, ) @@ -1093,6 +1131,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1117,7 +1159,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="DELETE", request_options=request_options, ) @@ -1171,6 +1213,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1207,7 +1253,7 @@ async def update( Organization discovery domain successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/discovery-domains/{jsonable_encoder(discovery_domain_id)}", + f"organizations/{encode_path_param(id)}/discovery-domains/{encode_path_param(discovery_domain_id)}", method="PATCH", json={ "status": status, @@ -1254,4 +1300,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/enabled_connections/raw_client.py b/src/auth0/management/organizations/enabled_connections/raw_client.py index 87406eda..ca087755 100644 --- a/src/auth0/management/organizations/enabled_connections/raw_client.py +++ b/src/auth0/management/organizations/enabled_connections/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ ) from ...types.organization_connection import OrganizationConnection from ...types.update_organization_connection_response_content import UpdateOrganizationConnectionResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -67,7 +69,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections", + f"organizations/{encode_path_param(id)}/enabled_connections", method="GET", params={ "page": page, @@ -142,6 +144,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def add( @@ -185,7 +191,7 @@ def add( Organization connection successfully added. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections", + f"organizations/{encode_path_param(id)}/enabled_connections", method="POST", json={ "connection_id": connection_id, @@ -256,6 +262,10 @@ def add( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -281,7 +291,7 @@ def get( Connection successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="GET", request_options=request_options, ) @@ -331,6 +341,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -357,7 +371,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="DELETE", request_options=request_options, ) @@ -411,6 +425,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -452,7 +470,7 @@ def update( Organization connection successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="PATCH", json={ "assign_membership_on_login": assign_membership_on_login, @@ -522,6 +540,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -566,7 +588,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections", + f"organizations/{encode_path_param(id)}/enabled_connections", method="GET", params={ "page": page, @@ -644,6 +666,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def add( @@ -687,7 +713,7 @@ async def add( Organization connection successfully added. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections", + f"organizations/{encode_path_param(id)}/enabled_connections", method="POST", json={ "connection_id": connection_id, @@ -758,6 +784,10 @@ async def add( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -783,7 +813,7 @@ async def get( Connection successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="GET", request_options=request_options, ) @@ -833,6 +863,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -859,7 +893,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="DELETE", request_options=request_options, ) @@ -913,6 +947,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -954,7 +992,7 @@ async def update( Organization connection successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/enabled_connections/{jsonable_encoder(connection_id)}", + f"organizations/{encode_path_param(id)}/enabled_connections/{encode_path_param(connection_id)}", method="PATCH", json={ "assign_membership_on_login": assign_membership_on_login, @@ -1024,4 +1062,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/invitations/raw_client.py b/src/auth0/management/organizations/invitations/raw_client.py index e8b7dd36..a4e7db7d 100644 --- a/src/auth0/management/organizations/invitations/raw_client.py +++ b/src/auth0/management/organizations/invitations/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -26,6 +27,7 @@ from ...types.organization_invitation_invitee import OrganizationInvitationInvitee from ...types.organization_invitation_inviter import OrganizationInvitationInviter from ...types.user_metadata import UserMetadata +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -84,7 +86,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations", + f"organizations/{encode_path_param(id)}/invitations", method="GET", params={ "page": page, @@ -176,6 +178,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -233,7 +239,7 @@ def create( Invitation successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations", + f"organizations/{encode_path_param(id)}/invitations", method="POST", json={ "inviter": convert_and_respect_annotation_metadata( @@ -324,6 +330,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -359,7 +369,7 @@ def get( Invitation successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations/{jsonable_encoder(invitation_id)}", + f"organizations/{encode_path_param(id)}/invitations/{encode_path_param(invitation_id)}", method="GET", params={ "fields": fields, @@ -435,6 +445,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -457,7 +471,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations/{jsonable_encoder(invitation_id)}", + f"organizations/{encode_path_param(id)}/invitations/{encode_path_param(invitation_id)}", method="DELETE", request_options=request_options, ) @@ -511,6 +525,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -567,7 +585,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations", + f"organizations/{encode_path_param(id)}/invitations", method="GET", params={ "page": page, @@ -662,6 +680,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -719,7 +741,7 @@ async def create( Invitation successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations", + f"organizations/{encode_path_param(id)}/invitations", method="POST", json={ "inviter": convert_and_respect_annotation_metadata( @@ -810,6 +832,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -845,7 +871,7 @@ async def get( Invitation successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations/{jsonable_encoder(invitation_id)}", + f"organizations/{encode_path_param(id)}/invitations/{encode_path_param(invitation_id)}", method="GET", params={ "fields": fields, @@ -921,6 +947,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -943,7 +973,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/invitations/{jsonable_encoder(invitation_id)}", + f"organizations/{encode_path_param(id)}/invitations/{encode_path_param(invitation_id)}", method="DELETE", request_options=request_options, ) @@ -997,4 +1027,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/members/raw_client.py b/src/auth0/management/organizations/members/raw_client.py index 41a5a8b4..7aefe7e2 100644 --- a/src/auth0/management/organizations/members/raw_client.py +++ b/src/auth0/management/organizations/members/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ ListOrganizationMembersPaginatedResponseContent, ) from ...types.organization_member import OrganizationMember +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -87,7 +89,7 @@ def list( Members successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="GET", params={ "from": from_, @@ -165,6 +167,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -191,7 +197,7 @@ def create( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="POST", json={ "members": members, @@ -252,6 +258,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -274,7 +284,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="DELETE", json={ "members": members, @@ -335,6 +345,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -402,7 +416,7 @@ async def list( Members successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="GET", params={ "from": from_, @@ -483,6 +497,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -509,7 +527,7 @@ async def create( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="POST", json={ "members": members, @@ -570,6 +588,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -592,7 +614,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members", + f"organizations/{encode_path_param(id)}/members", method="DELETE", json={ "members": members, @@ -653,4 +675,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/members/roles/raw_client.py b/src/auth0/management/organizations/members/roles/raw_client.py index 1b604041..79984ed8 100644 --- a/src/auth0/management/organizations/members/roles/raw_client.py +++ b/src/auth0/management/organizations/members/roles/raw_client.py @@ -6,8 +6,9 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param from ....core.pagination import AsyncPager, SyncPager +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -19,6 +20,7 @@ ListOrganizationMemberRolesOffsetPaginatedResponseContent, ) from ....types.role import Role +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -71,7 +73,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="GET", params={ "page": page, @@ -147,6 +149,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def assign( @@ -181,7 +187,7 @@ def assign( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="POST", json={ "roles": roles, @@ -253,6 +259,10 @@ def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -287,7 +297,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="DELETE", json={ "roles": roles, @@ -348,6 +358,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -398,7 +412,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="GET", params={ "page": page, @@ -477,6 +491,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def assign( @@ -511,7 +529,7 @@ async def assign( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="POST", json={ "roles": roles, @@ -583,6 +601,10 @@ async def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -617,7 +639,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}/members/{jsonable_encoder(user_id)}/roles", + f"organizations/{encode_path_param(id)}/members/{encode_path_param(user_id)}/roles", method="DELETE", json={ "roles": roles, @@ -678,4 +700,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/organizations/raw_client.py b/src/auth0/management/organizations/raw_client.py index 6173657e..05e17e05 100644 --- a/src/auth0/management/organizations/raw_client.py +++ b/src/auth0/management/organizations/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -28,6 +29,7 @@ from ..types.organization_metadata import OrganizationMetadata from ..types.update_organization_response_content import UpdateOrganizationResponseContent from ..types.update_token_quota import UpdateTokenQuota +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -161,6 +163,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -295,6 +301,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_by_name( @@ -317,7 +327,7 @@ def get_by_name( Organization successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/name/{jsonable_encoder(name)}", + f"organizations/name/{encode_path_param(name)}", method="GET", request_options=request_options, ) @@ -378,6 +388,10 @@ def get_by_name( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -400,7 +414,7 @@ def get( Organization successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -461,6 +475,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -482,7 +500,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -547,6 +565,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -589,7 +611,7 @@ def update( Organization successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="PATCH", json={ "display_name": display_name, @@ -665,6 +687,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -799,6 +825,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -933,6 +963,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_by_name( @@ -955,7 +989,7 @@ async def get_by_name( Organization successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/name/{jsonable_encoder(name)}", + f"organizations/name/{encode_path_param(name)}", method="GET", request_options=request_options, ) @@ -1016,6 +1050,10 @@ async def get_by_name( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1038,7 +1076,7 @@ async def get( Organization successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1099,6 +1137,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1122,7 +1164,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1187,6 +1229,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1229,7 +1275,7 @@ async def update( Organization successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"organizations/{jsonable_encoder(id)}", + f"organizations/{encode_path_param(id)}", method="PATCH", json={ "display_name": display_name, @@ -1305,4 +1351,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/prompts/custom_text/raw_client.py b/src/auth0/management/prompts/custom_text/raw_client.py index 6a48c61d..6bca6565 100644 --- a/src/auth0/management/prompts/custom_text/raw_client.py +++ b/src/auth0/management/prompts/custom_text/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -18,6 +19,7 @@ from ...types.prompt_group_name_enum import PromptGroupNameEnum from ...types.prompt_language_enum import PromptLanguageEnum from ...types.sets_custom_texts_by_language_request_content import SetsCustomTextsByLanguageRequestContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -54,7 +56,7 @@ def get( Prompt dictionaries successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/custom-text/{jsonable_encoder(language)}", + f"prompts/{encode_path_param(prompt)}/custom-text/{encode_path_param(language)}", method="GET", request_options=request_options, ) @@ -126,6 +128,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -157,7 +163,7 @@ def set( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/custom-text/{jsonable_encoder(language)}", + f"prompts/{encode_path_param(prompt)}/custom-text/{encode_path_param(language)}", method="PUT", json=request, headers={ @@ -216,6 +222,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -250,7 +260,7 @@ async def get( Prompt dictionaries successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/custom-text/{jsonable_encoder(language)}", + f"prompts/{encode_path_param(prompt)}/custom-text/{encode_path_param(language)}", method="GET", request_options=request_options, ) @@ -322,6 +332,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -353,7 +367,7 @@ async def set( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/custom-text/{jsonable_encoder(language)}", + f"prompts/{encode_path_param(prompt)}/custom-text/{encode_path_param(language)}", method="PUT", json=request, headers={ @@ -412,4 +426,8 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/prompts/partials/raw_client.py b/src/auth0/management/prompts/partials/raw_client.py index d9f38a23..0a015263 100644 --- a/src/auth0/management/prompts/partials/raw_client.py +++ b/src/auth0/management/prompts/partials/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ...types.get_partials_response_content import GetPartialsResponseContent from ...types.partial_groups_enum import PartialGroupsEnum from ...types.set_partials_request_content import SetPartialsRequestContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -46,7 +48,7 @@ def get( Prompt partials successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/partials", + f"prompts/{encode_path_param(prompt)}/partials", method="GET", request_options=request_options, ) @@ -118,6 +120,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -145,7 +151,7 @@ def set( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/partials", + f"prompts/{encode_path_param(prompt)}/partials", method="PUT", json=request, headers={ @@ -204,6 +210,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -231,7 +241,7 @@ async def get( Prompt partials successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/partials", + f"prompts/{encode_path_param(prompt)}/partials", method="GET", request_options=request_options, ) @@ -303,6 +313,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -330,7 +344,7 @@ async def set( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/partials", + f"prompts/{encode_path_param(prompt)}/partials", method="PUT", json=request, headers={ @@ -389,4 +403,8 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/prompts/raw_client.py b/src/auth0/management/prompts/raw_client.py index 782401d2..04963dbd 100644 --- a/src/auth0/management/prompts/raw_client.py +++ b/src/auth0/management/prompts/raw_client.py @@ -6,6 +6,7 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ..types.get_settings_response_content import GetSettingsResponseContent from ..types.universal_login_experience_enum import UniversalLoginExperienceEnum from ..types.update_settings_response_content import UpdateSettingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -91,6 +93,10 @@ def get_settings( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update_settings( @@ -193,6 +199,10 @@ def update_settings( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -267,6 +277,10 @@ async def get_settings( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update_settings( @@ -369,4 +383,8 @@ async def update_settings( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/prompts/rendering/raw_client.py b/src/auth0/management/prompts/rendering/raw_client.py index 7ccd5401..3b96c919 100644 --- a/src/auth0/management/prompts/rendering/raw_client.py +++ b/src/auth0/management/prompts/rendering/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -29,6 +30,7 @@ from ...types.prompt_group_name_enum import PromptGroupNameEnum from ...types.screen_group_name_enum import ScreenGroupNameEnum from ...types.update_acul_response_content import UpdateAculResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -186,6 +188,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def bulk_update( @@ -288,6 +294,10 @@ def bulk_update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -317,7 +327,7 @@ def get( ACUL settings successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/screen/{jsonable_encoder(screen)}/rendering", + f"prompts/{encode_path_param(prompt)}/screen/{encode_path_param(screen)}/rendering", method="GET", request_options=request_options, ) @@ -400,6 +410,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -451,7 +465,7 @@ def update( ACUL settings successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/screen/{jsonable_encoder(screen)}/rendering", + f"prompts/{encode_path_param(prompt)}/screen/{encode_path_param(screen)}/rendering", method="PATCH", json={ "rendering_mode": rendering_mode, @@ -543,6 +557,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -701,6 +719,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def bulk_update( @@ -803,6 +825,10 @@ async def bulk_update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -832,7 +858,7 @@ async def get( ACUL settings successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/screen/{jsonable_encoder(screen)}/rendering", + f"prompts/{encode_path_param(prompt)}/screen/{encode_path_param(screen)}/rendering", method="GET", request_options=request_options, ) @@ -915,6 +941,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -966,7 +996,7 @@ async def update( ACUL settings successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"prompts/{jsonable_encoder(prompt)}/screen/{jsonable_encoder(screen)}/rendering", + f"prompts/{encode_path_param(prompt)}/screen/{encode_path_param(screen)}/rendering", method="PATCH", json={ "rendering_mode": rendering_mode, @@ -1058,4 +1088,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/refresh_tokens/raw_client.py b/src/auth0/management/refresh_tokens/raw_client.py index e4aa4dce..ec53d1ab 100644 --- a/src/auth0/management/refresh_tokens/raw_client.py +++ b/src/auth0/management/refresh_tokens/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -20,6 +21,7 @@ from ..types.refresh_token_metadata import RefreshTokenMetadata from ..types.refresh_token_response_content import RefreshTokenResponseContent from ..types.update_refresh_token_response_content import UpdateRefreshTokenResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -164,6 +166,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -186,7 +192,7 @@ def get( The refresh token was retrieved """ _response = self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -247,6 +253,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -266,7 +276,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -320,6 +330,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -349,7 +363,7 @@ def update( Refresh token successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="PATCH", json={ "refresh_token_metadata": refresh_token_metadata, @@ -428,6 +442,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -573,6 +591,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -595,7 +617,7 @@ async def get( The refresh token was retrieved """ _response = await self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -656,6 +678,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -677,7 +703,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -731,6 +757,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -760,7 +790,7 @@ async def update( Refresh token successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"refresh-tokens/{jsonable_encoder(id)}", + f"refresh-tokens/{encode_path_param(id)}", method="PATCH", json={ "refresh_token_metadata": refresh_token_metadata, @@ -839,4 +869,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/resource_servers/raw_client.py b/src/auth0/management/resource_servers/raw_client.py index 48dbc05a..eb45e014 100644 --- a/src/auth0/management/resource_servers/raw_client.py +++ b/src/auth0/management/resource_servers/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -31,6 +32,7 @@ from ..types.resource_server_token_encryption import ResourceServerTokenEncryption from ..types.signing_algorithm_enum import SigningAlgorithmEnum from ..types.update_resource_server_response_content import UpdateResourceServerResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -159,6 +161,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -345,6 +351,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -374,7 +384,7 @@ def get( Resource server successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="GET", params={ "include_fields": include_fields, @@ -449,6 +459,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -468,7 +482,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -522,6 +536,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -600,7 +618,7 @@ def update( Resource server successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -707,6 +725,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -836,6 +858,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1022,6 +1048,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1051,7 +1081,7 @@ async def get( Resource server successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="GET", params={ "include_fields": include_fields, @@ -1126,6 +1156,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1147,7 +1181,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1201,6 +1235,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1279,7 +1317,7 @@ async def update( Resource server successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"resource-servers/{jsonable_encoder(id)}", + f"resource-servers/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1386,4 +1424,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/risk_assessments/settings/new_device/raw_client.py b/src/auth0/management/risk_assessments/settings/new_device/raw_client.py index 6d62a11d..c223baa6 100644 --- a/src/auth0/management/risk_assessments/settings/new_device/raw_client.py +++ b/src/auth0/management/risk_assessments/settings/new_device/raw_client.py @@ -6,6 +6,7 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -19,6 +20,7 @@ from ....types.update_risk_assessments_settings_new_device_response_content import ( UpdateRiskAssessmentsSettingsNewDeviceResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -106,6 +108,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -207,6 +213,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -292,6 +302,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -393,4 +407,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/risk_assessments/settings/raw_client.py b/src/auth0/management/risk_assessments/settings/raw_client.py index 3f44bf62..7dff208d 100644 --- a/src/auth0/management/risk_assessments/settings/raw_client.py +++ b/src/auth0/management/risk_assessments/settings/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.get_risk_assessments_settings_response_content import GetRiskAssessmentsSettingsResponseContent from ...types.update_risk_assessments_settings_response_content import UpdateRiskAssessmentsSettingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -102,6 +104,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -203,6 +209,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -288,6 +298,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -389,4 +403,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/roles/permissions/raw_client.py b/src/auth0/management/roles/permissions/raw_client.py index 52a94d72..f798eaa8 100644 --- a/src/auth0/management/roles/permissions/raw_client.py +++ b/src/auth0/management/roles/permissions/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -21,6 +22,7 @@ ) from ...types.permission_request_payload import PermissionRequestPayload from ...types.permissions_response_payload import PermissionsResponsePayload +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -67,7 +69,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="GET", params={ "per_page": per_page, @@ -153,6 +155,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def add( @@ -181,7 +187,7 @@ def add( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="POST", json={ "permissions": convert_and_respect_annotation_metadata( @@ -244,6 +250,10 @@ def add( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -272,7 +282,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="DELETE", json={ "permissions": convert_and_respect_annotation_metadata( @@ -335,6 +345,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -379,7 +393,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="GET", params={ "per_page": per_page, @@ -468,6 +482,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def add( @@ -496,7 +514,7 @@ async def add( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="POST", json={ "permissions": convert_and_respect_annotation_metadata( @@ -559,6 +577,10 @@ async def add( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -587,7 +609,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/permissions", + f"roles/{encode_path_param(id)}/permissions", method="DELETE", json={ "permissions": convert_and_respect_annotation_metadata( @@ -650,4 +672,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/roles/raw_client.py b/src/auth0/management/roles/raw_client.py index 59d5f9ac..d27902d7 100644 --- a/src/auth0/management/roles/raw_client.py +++ b/src/auth0/management/roles/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ from ..types.list_roles_offset_paginated_response_content import ListRolesOffsetPaginatedResponseContent from ..types.role import Role from ..types.update_role_response_content import UpdateRoleResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -145,6 +147,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -256,6 +262,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -278,7 +288,7 @@ def get( Role successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -350,6 +360,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -369,7 +383,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -434,6 +448,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -467,7 +485,7 @@ def update( Role successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -536,6 +554,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -661,6 +683,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -772,6 +798,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -794,7 +824,7 @@ async def get( Role successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -866,6 +896,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -887,7 +921,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -952,6 +986,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -985,7 +1023,7 @@ async def update( Role successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}", + f"roles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1054,4 +1092,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/roles/users/raw_client.py b/src/auth0/management/roles/users/raw_client.py index e2b45a80..5740807f 100644 --- a/src/auth0/management/roles/users/raw_client.py +++ b/src/auth0/management/roles/users/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.list_role_users_paginated_response_content import ListRoleUsersPaginatedResponseContent from ...types.role_user import RoleUser +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -75,7 +77,7 @@ def list( Role users successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/users", + f"roles/{encode_path_param(id)}/users", method="GET", params={ "from": from_, @@ -160,6 +162,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def assign( @@ -186,7 +192,7 @@ def assign( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/users", + f"roles/{encode_path_param(id)}/users", method="POST", json={ "users": users, @@ -258,6 +264,10 @@ def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -314,7 +324,7 @@ async def list( Role users successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/users", + f"roles/{encode_path_param(id)}/users", method="GET", params={ "from": from_, @@ -402,6 +412,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def assign( @@ -428,7 +442,7 @@ async def assign( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"roles/{jsonable_encoder(id)}/users", + f"roles/{encode_path_param(id)}/users", method="POST", json={ "users": users, @@ -500,4 +514,8 @@ async def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/rules/raw_client.py b/src/auth0/management/rules/raw_client.py index 39f66c49..c39ed6f3 100644 --- a/src/auth0/management/rules/raw_client.py +++ b/src/auth0/management/rules/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ from ..types.list_rules_offset_paginated_response_content import ListRulesOffsetPaginatedResponseContent from ..types.rule import Rule from ..types.update_rule_response_content import UpdateRuleResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -166,6 +168,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -287,6 +293,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -320,7 +330,7 @@ def get( Rule successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -396,6 +406,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -415,7 +429,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -469,6 +483,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -510,7 +528,7 @@ def update( Rule successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="PATCH", json={ "script": script, @@ -603,6 +621,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -749,6 +771,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -870,6 +896,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -903,7 +933,7 @@ async def get( Rule successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -979,6 +1009,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1000,7 +1034,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1054,6 +1088,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1095,7 +1133,7 @@ async def update( Rule successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"rules/{jsonable_encoder(id)}", + f"rules/{encode_path_param(id)}", method="PATCH", json={ "script": script, @@ -1188,4 +1226,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/rules_configs/raw_client.py b/src/auth0/management/rules_configs/raw_client.py index 508344aa..809935b0 100644 --- a/src/auth0/management/rules_configs/raw_client.py +++ b/src/auth0/management/rules_configs/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.forbidden_error import ForbiddenError @@ -14,6 +15,7 @@ from ..errors.unauthorized_error import UnauthorizedError from ..types.rules_config import RulesConfig from ..types.set_rules_config_response_content import SetRulesConfigResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -92,6 +94,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -117,7 +123,7 @@ def set( Rules config variable successfully set. """ _response = self._client_wrapper.httpx_client.request( - f"rules-configs/{jsonable_encoder(key)}", + f"rules-configs/{encode_path_param(key)}", method="PUT", json={ "value": value, @@ -174,6 +180,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, key: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -193,7 +203,7 @@ def delete(self, key: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"rules-configs/{jsonable_encoder(key)}", + f"rules-configs/{encode_path_param(key)}", method="DELETE", request_options=request_options, ) @@ -236,6 +246,10 @@ def delete(self, key: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -312,6 +326,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -337,7 +355,7 @@ async def set( Rules config variable successfully set. """ _response = await self._client_wrapper.httpx_client.request( - f"rules-configs/{jsonable_encoder(key)}", + f"rules-configs/{encode_path_param(key)}", method="PUT", json={ "value": value, @@ -394,6 +412,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -415,7 +437,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"rules-configs/{jsonable_encoder(key)}", + f"rules-configs/{encode_path_param(key)}", method="DELETE", request_options=request_options, ) @@ -458,4 +480,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/self_service_profiles/custom_text/raw_client.py b/src/auth0/management/self_service_profiles/custom_text/raw_client.py index 15ae6c50..cc6881f0 100644 --- a/src/auth0/management/self_service_profiles/custom_text/raw_client.py +++ b/src/auth0/management/self_service_profiles/custom_text/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.forbidden_error import ForbiddenError @@ -22,6 +23,7 @@ from ...types.set_self_service_profile_custom_text_response_content import ( SetSelfServiceProfileCustomTextResponseContent, ) +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -62,7 +64,7 @@ def list( Retrieved custom text. """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/custom-text/{jsonable_encoder(language)}/{jsonable_encoder(page)}", + f"self-service-profiles/{encode_path_param(id)}/custom-text/{encode_path_param(language)}/{encode_path_param(page)}", method="GET", request_options=request_options, ) @@ -123,6 +125,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -159,7 +165,7 @@ def set( Updated custom text. """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/custom-text/{jsonable_encoder(language)}/{jsonable_encoder(page)}", + f"self-service-profiles/{encode_path_param(id)}/custom-text/{encode_path_param(language)}/{encode_path_param(page)}", method="PUT", json=request, headers={ @@ -225,6 +231,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -263,7 +273,7 @@ async def list( Retrieved custom text. """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/custom-text/{jsonable_encoder(language)}/{jsonable_encoder(page)}", + f"self-service-profiles/{encode_path_param(id)}/custom-text/{encode_path_param(language)}/{encode_path_param(page)}", method="GET", request_options=request_options, ) @@ -324,6 +334,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -360,7 +374,7 @@ async def set( Updated custom text. """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/custom-text/{jsonable_encoder(language)}/{jsonable_encoder(page)}", + f"self-service-profiles/{encode_path_param(id)}/custom-text/{encode_path_param(language)}/{encode_path_param(page)}", method="PUT", json=request, headers={ @@ -426,4 +440,8 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/self_service_profiles/raw_client.py b/src/auth0/management/self_service_profiles/raw_client.py index e84fdf70..88f88dfb 100644 --- a/src/auth0/management/self_service_profiles/raw_client.py +++ b/src/auth0/management/self_service_profiles/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -31,6 +32,7 @@ from ..types.self_service_profile_user_attribute import SelfServiceProfileUserAttribute from ..types.self_service_profile_user_attributes import SelfServiceProfileUserAttributes from ..types.update_self_service_profile_response_content import UpdateSelfServiceProfileResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -147,6 +149,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -292,6 +298,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -314,7 +324,7 @@ def get( Record for existing self-service profile. """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -397,6 +407,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -416,7 +430,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -481,6 +495,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -527,7 +545,7 @@ def update( Self-service profile successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -628,6 +646,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -745,6 +767,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -890,6 +916,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -912,7 +942,7 @@ async def get( Record for existing self-service profile. """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -995,6 +1025,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1016,7 +1050,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1081,6 +1115,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1127,7 +1165,7 @@ async def update( Self-service profile successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}", + f"self-service-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1228,4 +1266,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/self_service_profiles/sso_ticket/raw_client.py b/src/auth0/management/self_service_profiles/sso_ticket/raw_client.py index 3c47d6ae..b6e01ffe 100644 --- a/src/auth0/management/self_service_profiles/sso_ticket/raw_client.py +++ b/src/auth0/management/self_service_profiles/sso_ticket/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -23,6 +24,7 @@ ) from ...types.self_service_profile_sso_ticket_enabled_organization import SelfServiceProfileSsoTicketEnabledOrganization from ...types.self_service_profile_sso_ticket_provisioning_config import SelfServiceProfileSsoTicketProvisioningConfig +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -84,7 +86,7 @@ def create( SSO Access Ticket successfully created. """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/sso-ticket", + f"self-service-profiles/{encode_path_param(id)}/sso-ticket", method="POST", json={ "connection_id": connection_id, @@ -173,6 +175,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def revoke( @@ -198,7 +204,7 @@ def revoke( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(profile_id)}/sso-ticket/{jsonable_encoder(id)}/revoke", + f"self-service-profiles/{encode_path_param(profile_id)}/sso-ticket/{encode_path_param(id)}/revoke", method="POST", request_options=request_options, ) @@ -241,6 +247,10 @@ def revoke( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -300,7 +310,7 @@ async def create( SSO Access Ticket successfully created. """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(id)}/sso-ticket", + f"self-service-profiles/{encode_path_param(id)}/sso-ticket", method="POST", json={ "connection_id": connection_id, @@ -389,6 +399,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def revoke( @@ -414,7 +428,7 @@ async def revoke( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"self-service-profiles/{jsonable_encoder(profile_id)}/sso-ticket/{jsonable_encoder(id)}/revoke", + f"self-service-profiles/{encode_path_param(profile_id)}/sso-ticket/{encode_path_param(id)}/revoke", method="POST", request_options=request_options, ) @@ -457,4 +471,8 @@ async def revoke( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/sessions/raw_client.py b/src/auth0/management/sessions/raw_client.py index 9e395f54..cac497bb 100644 --- a/src/auth0/management/sessions/raw_client.py +++ b/src/auth0/management/sessions/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ..types.get_session_response_content import GetSessionResponseContent from ..types.session_metadata import SessionMetadata from ..types.update_session_response_content import UpdateSessionResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -46,7 +48,7 @@ def get( The session was retrieved """ _response = self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -107,6 +109,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -126,7 +132,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -180,6 +186,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -209,7 +219,7 @@ def update( Session successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="PATCH", json={ "session_metadata": session_metadata, @@ -288,6 +298,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def revoke(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -307,7 +321,7 @@ def revoke(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}/revoke", + f"sessions/{encode_path_param(id)}/revoke", method="POST", request_options=request_options, ) @@ -372,6 +386,10 @@ def revoke(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -399,7 +417,7 @@ async def get( The session was retrieved """ _response = await self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -460,6 +478,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -481,7 +503,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -535,6 +557,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -564,7 +590,7 @@ async def update( Session successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}", + f"sessions/{encode_path_param(id)}", method="PATCH", json={ "session_metadata": session_metadata, @@ -643,6 +669,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def revoke( @@ -664,7 +694,7 @@ async def revoke( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"sessions/{jsonable_encoder(id)}/revoke", + f"sessions/{encode_path_param(id)}/revoke", method="POST", request_options=request_options, ) @@ -729,4 +759,8 @@ async def revoke( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/stats/raw_client.py b/src/auth0/management/stats/raw_client.py index bfa31b21..4b321e8e 100644 --- a/src/auth0/management/stats/raw_client.py +++ b/src/auth0/management/stats/raw_client.py @@ -6,6 +6,7 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -14,6 +15,7 @@ from ..errors.unauthorized_error import UnauthorizedError from ..types.daily_stats import DailyStats from ..types.get_active_users_count_stats_response_content import GetActiveUsersCountStatsResponseContent +from pydantic import ValidationError class RawStatsClient: @@ -87,6 +89,10 @@ def get_active_users_count( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_daily( @@ -181,6 +187,10 @@ def get_daily( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -255,6 +265,10 @@ async def get_active_users_count( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_daily( @@ -349,4 +363,8 @@ async def get_daily( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/supplemental_signals/raw_client.py b/src/auth0/management/supplemental_signals/raw_client.py index 431f9d66..e345437a 100644 --- a/src/auth0/management/supplemental_signals/raw_client.py +++ b/src/auth0/management/supplemental_signals/raw_client.py @@ -6,6 +6,7 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.forbidden_error import ForbiddenError @@ -14,6 +15,7 @@ from ..errors.unauthorized_error import UnauthorizedError from ..types.get_supplemental_signals_response_content import GetSupplementalSignalsResponseContent from ..types.patch_supplemental_signals_response_content import PatchSupplementalSignalsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -101,6 +103,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def patch( @@ -191,6 +197,10 @@ def patch( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -276,6 +286,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def patch( @@ -366,4 +380,8 @@ async def patch( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/tenants/settings/raw_client.py b/src/auth0/management/tenants/settings/raw_client.py index 4402571a..65f7820e 100644 --- a/src/auth0/management/tenants/settings/raw_client.py +++ b/src/auth0/management/tenants/settings/raw_client.py @@ -6,6 +6,7 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -27,6 +28,7 @@ from ...types.tenant_settings_sessions import TenantSettingsSessions from ...types.tenant_settings_supported_locales_enum import TenantSettingsSupportedLocalesEnum from ...types.update_tenant_settings_response_content import UpdateTenantSettingsResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -128,6 +130,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -398,6 +404,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -497,6 +507,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -767,4 +781,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/tickets/raw_client.py b/src/auth0/management/tickets/raw_client.py index e94ea6b8..66876512 100644 --- a/src/auth0/management/tickets/raw_client.py +++ b/src/auth0/management/tickets/raw_client.py @@ -6,6 +6,7 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -18,6 +19,7 @@ from ..types.change_password_ticket_response_content import ChangePasswordTicketResponseContent from ..types.identity import Identity from ..types.verify_email_ticket_response_content import VerifyEmailTicketResponseContent +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -160,6 +162,10 @@ def verify_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def change_password( @@ -312,6 +318,10 @@ def change_password( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -452,6 +462,10 @@ async def verify_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def change_password( @@ -604,4 +618,8 @@ async def change_password( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/token_exchange_profiles/raw_client.py b/src/auth0/management/token_exchange_profiles/raw_client.py index 871d0b11..b270dcdb 100644 --- a/src/auth0/management/token_exchange_profiles/raw_client.py +++ b/src/auth0/management/token_exchange_profiles/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -21,6 +22,7 @@ from ..types.list_token_exchange_profile_response_content import ListTokenExchangeProfileResponseContent from ..types.token_exchange_profile_response_content import TokenExchangeProfileResponseContent from ..types.token_exchange_profile_type_enum import TokenExchangeProfileTypeEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -140,6 +142,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -260,6 +266,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -284,7 +294,7 @@ def get( Token Exchange Profile successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -356,6 +366,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -377,7 +391,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -420,6 +434,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -454,7 +472,7 @@ def update( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -527,6 +545,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -647,6 +669,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -767,6 +793,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -791,7 +821,7 @@ async def get( Token Exchange Profile successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -863,6 +893,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -886,7 +920,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -929,6 +963,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -963,7 +1001,7 @@ async def update( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"token-exchange-profiles/{jsonable_encoder(id)}", + f"token-exchange-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1036,4 +1074,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/types/acul_client_metadata.py b/src/auth0/management/types/acul_client_metadata.py index 4892f020..de52247e 100644 --- a/src/auth0/management/types/acul_client_metadata.py +++ b/src/auth0/management/types/acul_client_metadata.py @@ -3,3 +3,6 @@ import typing AculClientMetadata = typing.Dict[str, typing.Any] +""" +Client metadata key/value pairs +""" diff --git a/src/auth0/management/types/acul_configs.py b/src/auth0/management/types/acul_configs.py index 73406e3a..98cfcb43 100644 --- a/src/auth0/management/types/acul_configs.py +++ b/src/auth0/management/types/acul_configs.py @@ -5,3 +5,6 @@ from .acul_configs_item import AculConfigsItem AculConfigs = typing.List[AculConfigsItem] +""" +Array of screen configurations to update +""" diff --git a/src/auth0/management/types/acul_context_configuration.py b/src/auth0/management/types/acul_context_configuration.py index b17ce58e..b641dbad 100644 --- a/src/auth0/management/types/acul_context_configuration.py +++ b/src/auth0/management/types/acul_context_configuration.py @@ -5,3 +5,6 @@ from .acul_context_configuration_item import AculContextConfigurationItem AculContextConfiguration = typing.Optional[typing.List[AculContextConfigurationItem]] +""" +Context values to make available +""" diff --git a/src/auth0/management/types/acul_domain_metadata.py b/src/auth0/management/types/acul_domain_metadata.py index 67b99faf..33f73676 100644 --- a/src/auth0/management/types/acul_domain_metadata.py +++ b/src/auth0/management/types/acul_domain_metadata.py @@ -3,3 +3,6 @@ import typing AculDomainMetadata = typing.Dict[str, typing.Any] +""" +Domain metadata key/value pairs +""" diff --git a/src/auth0/management/types/acul_head_tag_attributes.py b/src/auth0/management/types/acul_head_tag_attributes.py index 8b6540b9..a76c9592 100644 --- a/src/auth0/management/types/acul_head_tag_attributes.py +++ b/src/auth0/management/types/acul_head_tag_attributes.py @@ -3,3 +3,6 @@ import typing AculHeadTagAttributes = typing.Dict[str, typing.Any] +""" +Attributes of the HTML tag. See MDN documentation for valid attributes. +""" diff --git a/src/auth0/management/types/acul_head_tag_content.py b/src/auth0/management/types/acul_head_tag_content.py index 1f08c4a3..29551726 100644 --- a/src/auth0/management/types/acul_head_tag_content.py +++ b/src/auth0/management/types/acul_head_tag_content.py @@ -1,3 +1,7 @@ # This file was auto-generated by Fern from our API Definition. AculHeadTagContent = str +""" +Text or markup between the element’s opening and closing tags. +You can use context variables to display dynamic values. +""" diff --git a/src/auth0/management/types/acul_organization_metadata.py b/src/auth0/management/types/acul_organization_metadata.py index 7494dd54..77f69ffc 100644 --- a/src/auth0/management/types/acul_organization_metadata.py +++ b/src/auth0/management/types/acul_organization_metadata.py @@ -3,3 +3,6 @@ import typing AculOrganizationMetadata = typing.Dict[str, typing.Any] +""" +Organization metadata key/value pairs +""" diff --git a/src/auth0/management/types/anomaly_ip_format.py b/src/auth0/management/types/anomaly_ip_format.py index f6eafee8..64cb85b0 100644 --- a/src/auth0/management/types/anomaly_ip_format.py +++ b/src/auth0/management/types/anomaly_ip_format.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. AnomalyIpFormat = str +""" +IP address to check. +""" diff --git a/src/auth0/management/types/app_metadata.py b/src/auth0/management/types/app_metadata.py index ea77dbac..c3e94c67 100644 --- a/src/auth0/management/types/app_metadata.py +++ b/src/auth0/management/types/app_metadata.py @@ -3,3 +3,6 @@ import typing AppMetadata = typing.Dict[str, typing.Any] +""" +Data related to the user that does affect the application's core functionality. +""" diff --git a/src/auth0/management/types/bot_detection_allowlist.py b/src/auth0/management/types/bot_detection_allowlist.py index 8a8b88bd..4ec39ec5 100644 --- a/src/auth0/management/types/bot_detection_allowlist.py +++ b/src/auth0/management/types/bot_detection_allowlist.py @@ -5,3 +5,6 @@ from .bot_detection_ip_address_or_cidr_block import BotDetectionIpAddressOrCidrBlock BotDetectionAllowlist = typing.List[BotDetectionIpAddressOrCidrBlock] +""" +List of IP addresses or CIDR blocks to allowlist +""" diff --git a/src/auth0/management/types/bot_detection_cidr_block.py b/src/auth0/management/types/bot_detection_cidr_block.py index bdfec003..cf356475 100644 --- a/src/auth0/management/types/bot_detection_cidr_block.py +++ b/src/auth0/management/types/bot_detection_cidr_block.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionCidrBlock = str +""" +CIDR block +""" diff --git a/src/auth0/management/types/bot_detection_i_pv_4.py b/src/auth0/management/types/bot_detection_i_pv_4.py index 1f3228c5..1958425e 100644 --- a/src/auth0/management/types/bot_detection_i_pv_4.py +++ b/src/auth0/management/types/bot_detection_i_pv_4.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionIPv4 = str +""" +IPv4 address +""" diff --git a/src/auth0/management/types/bot_detection_i_pv_6.py b/src/auth0/management/types/bot_detection_i_pv_6.py index 6b91530e..1e408780 100644 --- a/src/auth0/management/types/bot_detection_i_pv_6.py +++ b/src/auth0/management/types/bot_detection_i_pv_6.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionIPv6 = str +""" +IPv6 address +""" diff --git a/src/auth0/management/types/bot_detection_i_pv_6_cidr_block.py b/src/auth0/management/types/bot_detection_i_pv_6_cidr_block.py index dd285954..43654a5d 100644 --- a/src/auth0/management/types/bot_detection_i_pv_6_cidr_block.py +++ b/src/auth0/management/types/bot_detection_i_pv_6_cidr_block.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionIPv6CidrBlock = str +""" +IPv6 CIDR block +""" diff --git a/src/auth0/management/types/bot_detection_ip_address_or_cidr_block.py b/src/auth0/management/types/bot_detection_ip_address_or_cidr_block.py index ea59dd1f..16a54ac2 100644 --- a/src/auth0/management/types/bot_detection_ip_address_or_cidr_block.py +++ b/src/auth0/management/types/bot_detection_ip_address_or_cidr_block.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionIpAddressOrCidrBlock = str +""" +IP address (IPv4 or IPv6) or CIDR block +""" diff --git a/src/auth0/management/types/bot_detection_monitoring_mode_enabled.py b/src/auth0/management/types/bot_detection_monitoring_mode_enabled.py index 78fc45ff..335a6785 100644 --- a/src/auth0/management/types/bot_detection_monitoring_mode_enabled.py +++ b/src/auth0/management/types/bot_detection_monitoring_mode_enabled.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. BotDetectionMonitoringModeEnabled = bool +""" +Whether monitoring mode is enabled (logs but does not block) +""" diff --git a/src/auth0/management/types/client_addon_box.py b/src/auth0/management/types/client_addon_box.py index ff1fb19c..02d2147e 100644 --- a/src/auth0/management/types/client_addon_box.py +++ b/src/auth0/management/types/client_addon_box.py @@ -3,3 +3,6 @@ import typing ClientAddonBox = typing.Dict[str, typing.Any] +""" +Box SSO indicator (no configuration settings needed for Box SSO). +""" diff --git a/src/auth0/management/types/client_addon_cloud_bees.py b/src/auth0/management/types/client_addon_cloud_bees.py index 53906117..0c666f5e 100644 --- a/src/auth0/management/types/client_addon_cloud_bees.py +++ b/src/auth0/management/types/client_addon_cloud_bees.py @@ -3,3 +3,6 @@ import typing ClientAddonCloudBees = typing.Dict[str, typing.Any] +""" +CloudBees SSO indicator (no configuration settings needed for CloudBees SSO). +""" diff --git a/src/auth0/management/types/client_addon_concur.py b/src/auth0/management/types/client_addon_concur.py index 97a44fc2..0b0359b3 100644 --- a/src/auth0/management/types/client_addon_concur.py +++ b/src/auth0/management/types/client_addon_concur.py @@ -3,3 +3,6 @@ import typing ClientAddonConcur = typing.Dict[str, typing.Any] +""" +Concur SSO indicator (no configuration settings needed for Concur SSO). +""" diff --git a/src/auth0/management/types/client_addon_dropbox.py b/src/auth0/management/types/client_addon_dropbox.py index fae54921..457f0a43 100644 --- a/src/auth0/management/types/client_addon_dropbox.py +++ b/src/auth0/management/types/client_addon_dropbox.py @@ -3,3 +3,6 @@ import typing ClientAddonDropbox = typing.Dict[str, typing.Any] +""" +Dropbox SSO indicator (no configuration settings needed for Dropbox SSO). +""" diff --git a/src/auth0/management/types/client_addon_ws_fed.py b/src/auth0/management/types/client_addon_ws_fed.py index 34fdb142..ca0cb3cd 100644 --- a/src/auth0/management/types/client_addon_ws_fed.py +++ b/src/auth0/management/types/client_addon_ws_fed.py @@ -3,3 +3,6 @@ import typing ClientAddonWsFed = typing.Dict[str, typing.Any] +""" +WS-Fed (WIF) addon indicator. Actual configuration is stored in `callback` and `client_aliases` properties on the client. +""" diff --git a/src/auth0/management/types/client_async_approval_notifications_channels_api_patch_configuration.py b/src/auth0/management/types/client_async_approval_notifications_channels_api_patch_configuration.py index a607dc63..b7e62188 100644 --- a/src/auth0/management/types/client_async_approval_notifications_channels_api_patch_configuration.py +++ b/src/auth0/management/types/client_async_approval_notifications_channels_api_patch_configuration.py @@ -7,3 +7,6 @@ ClientAsyncApprovalNotificationsChannelsApiPatchConfiguration = typing.Optional[ typing.List[AsyncApprovalNotificationsChannelsEnum] ] +""" +Array of notification channels for contacting the user when their approval is required. Valid values are `guardian-push`, `email`. +""" diff --git a/src/auth0/management/types/client_async_approval_notifications_channels_api_post_configuration.py b/src/auth0/management/types/client_async_approval_notifications_channels_api_post_configuration.py index deb4e42b..6b723600 100644 --- a/src/auth0/management/types/client_async_approval_notifications_channels_api_post_configuration.py +++ b/src/auth0/management/types/client_async_approval_notifications_channels_api_post_configuration.py @@ -5,3 +5,6 @@ from .async_approval_notifications_channels_enum import AsyncApprovalNotificationsChannelsEnum ClientAsyncApprovalNotificationsChannelsApiPostConfiguration = typing.List[AsyncApprovalNotificationsChannelsEnum] +""" +Array of notification channels for contacting the user when their approval is required. Valid values are `guardian-push`, `email`. +""" diff --git a/src/auth0/management/types/client_authentication_method_private_key_jwt_credentials.py b/src/auth0/management/types/client_authentication_method_private_key_jwt_credentials.py index 2b572656..4e2656fa 100644 --- a/src/auth0/management/types/client_authentication_method_private_key_jwt_credentials.py +++ b/src/auth0/management/types/client_authentication_method_private_key_jwt_credentials.py @@ -5,3 +5,6 @@ from .credential_id import CredentialId ClientAuthenticationMethodPrivateKeyJwtCredentials = typing.List[CredentialId] +""" +A list of unique and previously created credential IDs enabled on the client for Private Key JWT authentication. +""" diff --git a/src/auth0/management/types/client_authentication_method_self_signed_tls_client_auth_credentials.py b/src/auth0/management/types/client_authentication_method_self_signed_tls_client_auth_credentials.py index 0faff7a3..fde1d1a0 100644 --- a/src/auth0/management/types/client_authentication_method_self_signed_tls_client_auth_credentials.py +++ b/src/auth0/management/types/client_authentication_method_self_signed_tls_client_auth_credentials.py @@ -5,3 +5,6 @@ from .credential_id import CredentialId ClientAuthenticationMethodSelfSignedTlsClientAuthCredentials = typing.List[CredentialId] +""" +A list of unique and previously created credential IDs enabled on the client for mTLS authentication utilizing self-signed certificate. +""" diff --git a/src/auth0/management/types/client_authentication_method_tls_client_auth_credentials.py b/src/auth0/management/types/client_authentication_method_tls_client_auth_credentials.py index 4bc947fa..0660ee06 100644 --- a/src/auth0/management/types/client_authentication_method_tls_client_auth_credentials.py +++ b/src/auth0/management/types/client_authentication_method_tls_client_auth_credentials.py @@ -5,3 +5,6 @@ from .credential_id import CredentialId ClientAuthenticationMethodTlsClientAuthCredentials = typing.List[CredentialId] +""" +A list of unique and previously created credential IDs enabled on the client for CA-based mTLS authentication. +""" diff --git a/src/auth0/management/types/client_create_authentication_method_private_key_jwt_credentials.py b/src/auth0/management/types/client_create_authentication_method_private_key_jwt_credentials.py index ca0e5c55..fa941cc9 100644 --- a/src/auth0/management/types/client_create_authentication_method_private_key_jwt_credentials.py +++ b/src/auth0/management/types/client_create_authentication_method_private_key_jwt_credentials.py @@ -5,3 +5,6 @@ from .public_key_credential import PublicKeyCredential ClientCreateAuthenticationMethodPrivateKeyJwtCredentials = typing.List[PublicKeyCredential] +""" +Fully defined credentials that will be enabled on the client for Private Key JWT authentication. +""" diff --git a/src/auth0/management/types/client_create_authentication_method_tls_client_auth_credentials.py b/src/auth0/management/types/client_create_authentication_method_tls_client_auth_credentials.py index d0afded0..08088543 100644 --- a/src/auth0/management/types/client_create_authentication_method_tls_client_auth_credentials.py +++ b/src/auth0/management/types/client_create_authentication_method_tls_client_auth_credentials.py @@ -5,3 +5,6 @@ from .certificate_subject_dn_credential import CertificateSubjectDnCredential ClientCreateAuthenticationMethodTlsClientAuthCredentials = typing.List[CertificateSubjectDnCredential] +""" +Fully defined credentials that will be enabled on the client for CA-based mTLS authentication. +""" diff --git a/src/auth0/management/types/client_grant_allow_any_organization_enum.py b/src/auth0/management/types/client_grant_allow_any_organization_enum.py index 19c94966..91e85d0f 100644 --- a/src/auth0/management/types/client_grant_allow_any_organization_enum.py +++ b/src/auth0/management/types/client_grant_allow_any_organization_enum.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ClientGrantAllowAnyOrganizationEnum = bool +""" +Optional filter on allow_any_organization. +""" diff --git a/src/auth0/management/types/client_jwt_configuration_scopes.py b/src/auth0/management/types/client_jwt_configuration_scopes.py index da847f10..9db6a520 100644 --- a/src/auth0/management/types/client_jwt_configuration_scopes.py +++ b/src/auth0/management/types/client_jwt_configuration_scopes.py @@ -3,3 +3,6 @@ import typing ClientJwtConfigurationScopes = typing.Dict[str, typing.Any] +""" +Configuration related to id token claims for the client. +""" diff --git a/src/auth0/management/types/client_metadata.py b/src/auth0/management/types/client_metadata.py index 4b8e00e9..b835a838 100644 --- a/src/auth0/management/types/client_metadata.py +++ b/src/auth0/management/types/client_metadata.py @@ -3,3 +3,6 @@ import typing ClientMetadata = typing.Dict[str, typing.Any] +""" +Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/\()<>@ [Tab] [Space] +""" diff --git a/src/auth0/management/types/client_signing_keys.py b/src/auth0/management/types/client_signing_keys.py index dc700b22..45190143 100644 --- a/src/auth0/management/types/client_signing_keys.py +++ b/src/auth0/management/types/client_signing_keys.py @@ -5,3 +5,6 @@ from .client_signing_key import ClientSigningKey ClientSigningKeys = typing.Optional[typing.List[ClientSigningKey]] +""" +Signing certificates associated with this client. +""" diff --git a/src/auth0/management/types/connection_access_token_urlo_auth_1.py b/src/auth0/management/types/connection_access_token_urlo_auth_1.py index 3674283c..c74a6b9e 100644 --- a/src/auth0/management/types/connection_access_token_urlo_auth_1.py +++ b/src/auth0/management/types/connection_access_token_urlo_auth_1.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionAccessTokenUrloAuth1 = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL of the OAuth 1.0a access-token endpoint. This endpoint is used to exchange the temporary request token obtained from the request-token endpoint for an access token during the OAuth 1.0a authentication flow. +""" diff --git a/src/auth0/management/types/connection_acr_values_supported.py b/src/auth0/management/types/connection_acr_values_supported.py index 1b99a26f..1e524bc7 100644 --- a/src/auth0/management/types/connection_acr_values_supported.py +++ b/src/auth0/management/types/connection_acr_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionAcrValuesSupported = typing.List[str] +""" +A list of the Authentication Context Class References that this OP supports +""" diff --git a/src/auth0/management/types/connection_admin_access_token_expires_in_google_apps.py b/src/auth0/management/types/connection_admin_access_token_expires_in_google_apps.py index f0da6a97..b4dbdeb0 100644 --- a/src/auth0/management/types/connection_admin_access_token_expires_in_google_apps.py +++ b/src/auth0/management/types/connection_admin_access_token_expires_in_google_apps.py @@ -3,3 +3,6 @@ import datetime as dt ConnectionAdminAccessTokenExpiresInGoogleApps = dt.datetime +""" +Expiration timestamp for the `admin_access_token` in ISO 8601 format. Auth0 uses this value to determine when to refresh the token. +""" diff --git a/src/auth0/management/types/connection_admin_access_token_google_apps.py b/src/auth0/management/types/connection_admin_access_token_google_apps.py index b87e1d1b..4c64cb6d 100644 --- a/src/auth0/management/types/connection_admin_access_token_google_apps.py +++ b/src/auth0/management/types/connection_admin_access_token_google_apps.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAdminAccessTokenGoogleApps = str +""" +Google Workspace admin access token used to retrieve extended user attributes (such as group memberships, admin status, and suspension state) from the [Google Directory API](https://developers.google.com/admin-sdk/directory). This token is automatically managed by Auth0. +""" diff --git a/src/auth0/management/types/connection_admin_refresh_token_google_apps.py b/src/auth0/management/types/connection_admin_refresh_token_google_apps.py index 8b51aabf..303f130c 100644 --- a/src/auth0/management/types/connection_admin_refresh_token_google_apps.py +++ b/src/auth0/management/types/connection_admin_refresh_token_google_apps.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAdminRefreshTokenGoogleApps = str +""" +Google Workspace admin refresh token used to obtain new access tokens for the [Google Directory API](https://developers.google.com/admin-sdk/directory). This token is granted when a Google Workspace admin authorizes Auth0 to access directory data. +""" diff --git a/src/auth0/management/types/connection_agent_ipad.py b/src/auth0/management/types/connection_agent_ipad.py index 648ee723..f448d354 100644 --- a/src/auth0/management/types/connection_agent_ipad.py +++ b/src/auth0/management/types/connection_agent_ipad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAgentIpad = str +""" +IP address of the AD connector agent used to validate that authentication requests originate from the corporate network for Kerberos authentication (managed by the AD Connector agent). +""" diff --git a/src/auth0/management/types/connection_agent_mode_ad.py b/src/auth0/management/types/connection_agent_mode_ad.py index 0f97c1f4..c1dded05 100644 --- a/src/auth0/management/types/connection_agent_mode_ad.py +++ b/src/auth0/management/types/connection_agent_mode_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAgentModeAd = bool +""" +When enabled, allows direct username/password authentication through the AD connector agent instead of WS-Federation protocol (managed by the AD Connector agent). +""" diff --git a/src/auth0/management/types/connection_agent_version_ad.py b/src/auth0/management/types/connection_agent_version_ad.py index d9aed3ac..f920c003 100644 --- a/src/auth0/management/types/connection_agent_version_ad.py +++ b/src/auth0/management/types/connection_agent_version_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAgentVersionAd = str +""" +Version identifier of the installed AD connector agent software (managed by the AD Connector agent). +""" diff --git a/src/auth0/management/types/connection_allowed_audiences_google_o_auth_2.py b/src/auth0/management/types/connection_allowed_audiences_google_o_auth_2.py index 775dc347..5aaa12f7 100644 --- a/src/auth0/management/types/connection_allowed_audiences_google_o_auth_2.py +++ b/src/auth0/management/types/connection_allowed_audiences_google_o_auth_2.py @@ -3,3 +3,6 @@ import typing ConnectionAllowedAudiencesGoogleOAuth2 = typing.List[str] +""" +List of allowed audiences in the ID token for Google Native Social Login +""" diff --git a/src/auth0/management/types/connection_api_enable_groups_google_apps.py b/src/auth0/management/types/connection_api_enable_groups_google_apps.py index 5f7ebf47..359ddc45 100644 --- a/src/auth0/management/types/connection_api_enable_groups_google_apps.py +++ b/src/auth0/management/types/connection_api_enable_groups_google_apps.py @@ -3,3 +3,6 @@ from .connection_api_enable_groups import ConnectionApiEnableGroups ConnectionApiEnableGroupsGoogleApps = ConnectionApiEnableGroups +""" +Enables integration with the Google Workspace Admin SDK Directory API for groups. When true, Auth0 can synchronize groups & group memberships and supports inbound directory provisioning for groups. Defaults to false. +""" diff --git a/src/auth0/management/types/connection_api_enable_users_google_apps.py b/src/auth0/management/types/connection_api_enable_users_google_apps.py index 3f3c719a..d40aa6d8 100644 --- a/src/auth0/management/types/connection_api_enable_users_google_apps.py +++ b/src/auth0/management/types/connection_api_enable_users_google_apps.py @@ -3,3 +3,6 @@ from .connection_api_enable_users import ConnectionApiEnableUsers ConnectionApiEnableUsersGoogleApps = ConnectionApiEnableUsers +""" +Enables integration with the Google Workspace Admin SDK Directory API. When true, Auth0 can retrieve extended user attributes (admin status, suspension status, group memberships) and supports inbound directory provisioning (SCIM). Defaults to true. +""" diff --git a/src/auth0/management/types/connection_app_domain_azure_ad.py b/src/auth0/management/types/connection_app_domain_azure_ad.py index cd58ddac..1f0c4d32 100644 --- a/src/auth0/management/types/connection_app_domain_azure_ad.py +++ b/src/auth0/management/types/connection_app_domain_azure_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAppDomainAzureAd = str +""" +The Azure AD application domain (e.g., 'contoso.onmicrosoft.com'). Used primarily with WS-Federation protocol and Azure AD v1 endpoints. +""" diff --git a/src/auth0/management/types/connection_attribute_map_attributes.py b/src/auth0/management/types/connection_attribute_map_attributes.py index c08b9a41..cc28eabd 100644 --- a/src/auth0/management/types/connection_attribute_map_attributes.py +++ b/src/auth0/management/types/connection_attribute_map_attributes.py @@ -3,3 +3,6 @@ import typing ConnectionAttributeMapAttributes = typing.Dict[str, typing.Any] +""" +Object containing mapping details for incoming claims +""" diff --git a/src/auth0/management/types/connection_attribute_map_userinfo_scope.py b/src/auth0/management/types/connection_attribute_map_userinfo_scope.py index 5b2f5bd9..e2da5cd7 100644 --- a/src/auth0/management/types/connection_attribute_map_userinfo_scope.py +++ b/src/auth0/management/types/connection_attribute_map_userinfo_scope.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAttributeMapUserinfoScope = str +""" +Scopes to send to the IdP's Userinfo endpoint +""" diff --git a/src/auth0/management/types/connection_auth_params_additional_properties_o_auth_2.py b/src/auth0/management/types/connection_auth_params_additional_properties_o_auth_2.py index fcead152..86140a89 100644 --- a/src/auth0/management/types/connection_auth_params_additional_properties_o_auth_2.py +++ b/src/auth0/management/types/connection_auth_params_additional_properties_o_auth_2.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAuthParamsAdditionalPropertiesOAuth2 = str +""" +Additional properties for OAuth2 connection authentication parameters +""" diff --git a/src/auth0/management/types/connection_auth_params_email.py b/src/auth0/management/types/connection_auth_params_email.py index 25329fb6..1efa2c0b 100644 --- a/src/auth0/management/types/connection_auth_params_email.py +++ b/src/auth0/management/types/connection_auth_params_email.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionAuthParamsEmail = str +""" +Authentication Parameters (must be valid JSON string) +""" diff --git a/src/auth0/management/types/connection_auth_params_map.py b/src/auth0/management/types/connection_auth_params_map.py index ce7ea31d..1ef9868e 100644 --- a/src/auth0/management/types/connection_auth_params_map.py +++ b/src/auth0/management/types/connection_auth_params_map.py @@ -3,3 +3,6 @@ import typing ConnectionAuthParamsMap = typing.Dict[str, str] +""" +Maps parameter names from Auth0's /authorize endpoint to the identity provider's authorization endpoint parameters. For example, mapping 'audience' to 'resource' transforms the parameter name during authorization requests. Applied after authParams merging. See https://auth0.com/docs/authenticate/identity-providers/social-identity-providers/oauth2#pass-dynamic-parameters +""" diff --git a/src/auth0/management/types/connection_auth_params_o_auth_2.py b/src/auth0/management/types/connection_auth_params_o_auth_2.py index c6a31cb5..32e3622d 100644 --- a/src/auth0/management/types/connection_auth_params_o_auth_2.py +++ b/src/auth0/management/types/connection_auth_params_o_auth_2.py @@ -5,3 +5,6 @@ from .connection_auth_params_additional_properties_o_auth_2 import ConnectionAuthParamsAdditionalPropertiesOAuth2 ConnectionAuthParamsOAuth2 = typing.Dict[str, ConnectionAuthParamsAdditionalPropertiesOAuth2] +""" +Additional static parameters included in every authorization request to the identity provider. These parameters are merged with runtime parameters before the authorization redirect. Keys and values are passed as-is to the identity provider's authorization endpoint. See https://auth0.com/docs/authenticate/identity-providers/social-identity-providers/oauth2#pass-static-parameters +""" diff --git a/src/auth0/management/types/connection_base_url_exact.py b/src/auth0/management/types/connection_base_url_exact.py index 0bbc43a9..d73b9d98 100644 --- a/src/auth0/management/types/connection_base_url_exact.py +++ b/src/auth0/management/types/connection_base_url_exact.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback import ConnectionHttpsUrlWithHttpFallback ConnectionBaseUrlExact = ConnectionHttpsUrlWithHttpFallback +""" +Base URL override for the Exact Online API endpoint used for OAuth2 authorization and API requests. Defaults to https://start.exactonline.nl. +""" diff --git a/src/auth0/management/types/connection_brute_force_protection.py b/src/auth0/management/types/connection_brute_force_protection.py index 1a6fff2d..5880adc8 100644 --- a/src/auth0/management/types/connection_brute_force_protection.py +++ b/src/auth0/management/types/connection_brute_force_protection.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionBruteForceProtection = bool +""" +Enables Auth0's brute force protection to prevent credential stuffing attacks. When enabled, blocks suspicious login attempts from specific IP addresses after repeated failures. +""" diff --git a/src/auth0/management/types/connection_certs_ad.py b/src/auth0/management/types/connection_certs_ad.py index fe8e682b..4ae9f309 100644 --- a/src/auth0/management/types/connection_certs_ad.py +++ b/src/auth0/management/types/connection_certs_ad.py @@ -3,3 +3,6 @@ import typing ConnectionCertsAd = typing.List[str] +""" +Array of X.509 certificates in PEM format used for validating SAML signatures from the AD identity provider (managed by the AD Connector agent). +""" diff --git a/src/auth0/management/types/connection_claim_types_supported.py b/src/auth0/management/types/connection_claim_types_supported.py index cab5c24b..ab610d79 100644 --- a/src/auth0/management/types/connection_claim_types_supported.py +++ b/src/auth0/management/types/connection_claim_types_supported.py @@ -3,3 +3,6 @@ import typing ConnectionClaimTypesSupported = typing.List[str] +""" +JSON array containing a list of the Claim Types that the OpenID Provider supports. These Claim Types are described in Section 5.6 of OpenID Connect Core 1.0 [OpenID.Core]. If omitted, the implementation supports only normal Claims. +""" diff --git a/src/auth0/management/types/connection_claims_locales_supported.py b/src/auth0/management/types/connection_claims_locales_supported.py index 7a86041a..b7c1217e 100644 --- a/src/auth0/management/types/connection_claims_locales_supported.py +++ b/src/auth0/management/types/connection_claims_locales_supported.py @@ -3,3 +3,6 @@ import typing ConnectionClaimsLocalesSupported = typing.List[str] +""" +Languages and scripts supported for values in Claims being returned, represented as a JSON array of BCP47 [RFC5646] language tag values. Not all languages and scripts are necessarily supported for all Claim values. +""" diff --git a/src/auth0/management/types/connection_claims_parameter_supported.py b/src/auth0/management/types/connection_claims_parameter_supported.py index 56304e20..64331235 100644 --- a/src/auth0/management/types/connection_claims_parameter_supported.py +++ b/src/auth0/management/types/connection_claims_parameter_supported.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClaimsParameterSupported = bool +""" +Boolean value specifying whether the OP supports use of the claims parameter, with true indicating support. If omitted, the default value is false. +""" diff --git a/src/auth0/management/types/connection_claims_supported.py b/src/auth0/management/types/connection_claims_supported.py index 4f8663c8..6448f565 100644 --- a/src/auth0/management/types/connection_claims_supported.py +++ b/src/auth0/management/types/connection_claims_supported.py @@ -3,3 +3,6 @@ import typing ConnectionClaimsSupported = typing.List[str] +""" +JSON array containing a list of the Claim Names of the Claims that the OpenID Provider MAY be able to supply values for. Note that for privacy or other reasons, this might not be an exhaustive list. +""" diff --git a/src/auth0/management/types/connection_client_id.py b/src/auth0/management/types/connection_client_id.py index b7955f06..245a03c6 100644 --- a/src/auth0/management/types/connection_client_id.py +++ b/src/auth0/management/types/connection_client_id.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientId = str +""" +OAuth 2.0 client identifier issued by the identity provider during application registration. This value identifies your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_client_id_amazon.py b/src/auth0/management/types/connection_client_id_amazon.py index 001b8331..e6b19a44 100644 --- a/src/auth0/management/types/connection_client_id_amazon.py +++ b/src/auth0/management/types/connection_client_id_amazon.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdAmazon = ConnectionClientId +""" +OAuth 2.0 client identifier obtained from Amazon Developer Console during Login with Amazon application registration. When not provided, Auth0 development keys are used for testing purposes. +""" diff --git a/src/auth0/management/types/connection_client_id_bitbucket.py b/src/auth0/management/types/connection_client_id_bitbucket.py index 5b488809..d99e3faa 100644 --- a/src/auth0/management/types/connection_client_id_bitbucket.py +++ b/src/auth0/management/types/connection_client_id_bitbucket.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdBitbucket = str +""" +OAuth 2.0 client identifier issued by the identity provider during application registration. This value identifies your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_client_id_exact.py b/src/auth0/management/types/connection_client_id_exact.py index 1d53dc14..b43253fb 100644 --- a/src/auth0/management/types/connection_client_id_exact.py +++ b/src/auth0/management/types/connection_client_id_exact.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdExact = ConnectionClientId +""" +OAuth2.0 client identifier for the Exact Online connection, obtained when registering your application in the Exact App Center. +""" diff --git a/src/auth0/management/types/connection_client_id_facebook.py b/src/auth0/management/types/connection_client_id_facebook.py index 69657042..822addc2 100644 --- a/src/auth0/management/types/connection_client_id_facebook.py +++ b/src/auth0/management/types/connection_client_id_facebook.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdFacebook = ConnectionClientId +""" +Your Facebook App ID. You can find this in your [Facebook Developers Console](https://developers.facebook.com/apps) under the App Settings section. +""" diff --git a/src/auth0/management/types/connection_client_id_google_apps.py b/src/auth0/management/types/connection_client_id_google_apps.py index e5099d26..917e57d0 100644 --- a/src/auth0/management/types/connection_client_id_google_apps.py +++ b/src/auth0/management/types/connection_client_id_google_apps.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdGoogleApps = ConnectionClientId +""" +Your Google OAuth 2.0 client ID. You can find this in your [Google Cloud Console](https://console.cloud.google.com/apis/credentials) under the OAuth 2.0 Client IDs section. +""" diff --git a/src/auth0/management/types/connection_client_id_google_o_auth_2.py b/src/auth0/management/types/connection_client_id_google_o_auth_2.py index f1b75891..4445fdf1 100644 --- a/src/auth0/management/types/connection_client_id_google_o_auth_2.py +++ b/src/auth0/management/types/connection_client_id_google_o_auth_2.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdGoogleOAuth2 = str +""" +Your Google OAuth 2.0 client ID. You can find this in your [Google Cloud Console](https://console.cloud.google.com/apis/credentials) under the OAuth 2.0 Client IDs section. +""" diff --git a/src/auth0/management/types/connection_client_id_line.py b/src/auth0/management/types/connection_client_id_line.py index 93af3bc0..8e7ba14c 100644 --- a/src/auth0/management/types/connection_client_id_line.py +++ b/src/auth0/management/types/connection_client_id_line.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdLine = str +""" +LINE Channel ID issued by LINE during application registration. This value identifies your Auth0 connection to LINE. +""" diff --git a/src/auth0/management/types/connection_client_id_linkedin.py b/src/auth0/management/types/connection_client_id_linkedin.py index 8f6dec2b..ff19e87a 100644 --- a/src/auth0/management/types/connection_client_id_linkedin.py +++ b/src/auth0/management/types/connection_client_id_linkedin.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdLinkedin = str +""" +LinkedIn application client identifier +""" diff --git a/src/auth0/management/types/connection_client_id_o_auth_1.py b/src/auth0/management/types/connection_client_id_o_auth_1.py index 353dd0e4..00142510 100644 --- a/src/auth0/management/types/connection_client_id_o_auth_1.py +++ b/src/auth0/management/types/connection_client_id_o_auth_1.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdOAuth1 = ConnectionClientId +""" +OAuth 1.0a client ID (consumer key) that identifies the client to the provider and is used to sign OAuth 1.0a requests. +""" diff --git a/src/auth0/management/types/connection_client_id_paypal.py b/src/auth0/management/types/connection_client_id_paypal.py index 6e717c82..d9645b54 100644 --- a/src/auth0/management/types/connection_client_id_paypal.py +++ b/src/auth0/management/types/connection_client_id_paypal.py @@ -3,3 +3,6 @@ from .connection_client_id import ConnectionClientId ConnectionClientIdPaypal = ConnectionClientId +""" +OAuth 2.0 client identifier issued by PayPal during application registration. This value identifies your Auth0 connection to PayPal. Leave empty to use Auth0 Dev Keys. +""" diff --git a/src/auth0/management/types/connection_client_id_salesforce.py b/src/auth0/management/types/connection_client_id_salesforce.py index 853058c1..b872370d 100644 --- a/src/auth0/management/types/connection_client_id_salesforce.py +++ b/src/auth0/management/types/connection_client_id_salesforce.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdSalesforce = str +""" +The OAuth 2.0 client identifier +""" diff --git a/src/auth0/management/types/connection_client_id_windows_live.py b/src/auth0/management/types/connection_client_id_windows_live.py index f6b4a273..06f400df 100644 --- a/src/auth0/management/types/connection_client_id_windows_live.py +++ b/src/auth0/management/types/connection_client_id_windows_live.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientIdWindowsLive = str +""" +OAuth 2.0 client identifier issued by the identity provider during application registration. This value identifies your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_client_protocol_saml.py b/src/auth0/management/types/connection_client_protocol_saml.py index 39275990..57550171 100644 --- a/src/auth0/management/types/connection_client_protocol_saml.py +++ b/src/auth0/management/types/connection_client_protocol_saml.py @@ -5,3 +5,6 @@ ) ConnectionClientProtocolSaml = ConnectionOptionsIdpInitiatedClientProtocolEnumSaml +""" +The response protocol used to communicate with the default application. +""" diff --git a/src/auth0/management/types/connection_client_secret.py b/src/auth0/management/types/connection_client_secret.py index 027856a4..93c39bca 100644 --- a/src/auth0/management/types/connection_client_secret.py +++ b/src/auth0/management/types/connection_client_secret.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecret = str +""" +OAuth 2.0 client secret issued by the identity provider during application registration. Used to authenticate your Auth0 connection when exchanging authorization codes for tokens. May be null for public clients. +""" diff --git a/src/auth0/management/types/connection_client_secret_amazon.py b/src/auth0/management/types/connection_client_secret_amazon.py index ee960d5d..cf84791e 100644 --- a/src/auth0/management/types/connection_client_secret_amazon.py +++ b/src/auth0/management/types/connection_client_secret_amazon.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretAmazon = ConnectionClientSecret +""" +OAuth 2.0 client secret obtained from Amazon Developer Console during Login with Amazon application registration. Used to authenticate your application when exchanging authorization codes for tokens. +""" diff --git a/src/auth0/management/types/connection_client_secret_azure_ad.py b/src/auth0/management/types/connection_client_secret_azure_ad.py index eea0d483..a097495b 100644 --- a/src/auth0/management/types/connection_client_secret_azure_ad.py +++ b/src/auth0/management/types/connection_client_secret_azure_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecretAzureAd = str +""" +The client secret (application password) from your Azure AD app registration. Used to authenticate your application when exchanging authorization codes for tokens. +""" diff --git a/src/auth0/management/types/connection_client_secret_exact.py b/src/auth0/management/types/connection_client_secret_exact.py index ce958668..47eb9f61 100644 --- a/src/auth0/management/types/connection_client_secret_exact.py +++ b/src/auth0/management/types/connection_client_secret_exact.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretExact = ConnectionClientSecret +""" +OAuth2.0 client secret for the Exact Online connection, obtained when registering your application in the Exact App Center. +""" diff --git a/src/auth0/management/types/connection_client_secret_facebook.py b/src/auth0/management/types/connection_client_secret_facebook.py index 06be20fb..d17c610f 100644 --- a/src/auth0/management/types/connection_client_secret_facebook.py +++ b/src/auth0/management/types/connection_client_secret_facebook.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretFacebook = ConnectionClientSecret +""" +Your Facebook App Secret. You can find this in your [Facebook Developers Console](https://developers.facebook.com/apps) under the App Settings section. +""" diff --git a/src/auth0/management/types/connection_client_secret_google_apps.py b/src/auth0/management/types/connection_client_secret_google_apps.py index 0440a1e7..30f70f32 100644 --- a/src/auth0/management/types/connection_client_secret_google_apps.py +++ b/src/auth0/management/types/connection_client_secret_google_apps.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretGoogleApps = ConnectionClientSecret +""" +Your Google OAuth 2.0 client secret. You can find this in your [Google Cloud Console](https://console.cloud.google.com/apis/credentials) under the OAuth 2.0 Client IDs section. +""" diff --git a/src/auth0/management/types/connection_client_secret_google_o_auth_2.py b/src/auth0/management/types/connection_client_secret_google_o_auth_2.py index 29ec9f38..72feab21 100644 --- a/src/auth0/management/types/connection_client_secret_google_o_auth_2.py +++ b/src/auth0/management/types/connection_client_secret_google_o_auth_2.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecretGoogleOAuth2 = str +""" +Your Google OAuth 2.0 client secret. You can find this in your [Google Cloud Console](https://console.cloud.google.com/apis/credentials) under the OAuth 2.0 Client IDs section. +""" diff --git a/src/auth0/management/types/connection_client_secret_line.py b/src/auth0/management/types/connection_client_secret_line.py index 15759291..974851d1 100644 --- a/src/auth0/management/types/connection_client_secret_line.py +++ b/src/auth0/management/types/connection_client_secret_line.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecretLine = str +""" +LINE Channel Secret issued by provider during application registration. This value is used to authenticate your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_client_secret_linkedin.py b/src/auth0/management/types/connection_client_secret_linkedin.py index 9ac9d0fe..b9d7a65f 100644 --- a/src/auth0/management/types/connection_client_secret_linkedin.py +++ b/src/auth0/management/types/connection_client_secret_linkedin.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecretLinkedin = str +""" +OAuth 2.0 client secret issued by the identity provider during application registration. This value is used to authenticate your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_client_secret_o_auth_1.py b/src/auth0/management/types/connection_client_secret_o_auth_1.py index cf71a738..ffd3091d 100644 --- a/src/auth0/management/types/connection_client_secret_o_auth_1.py +++ b/src/auth0/management/types/connection_client_secret_o_auth_1.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretOAuth1 = ConnectionClientSecret +""" +OAuth 1.0a client secret paired with the consumer key to sign request-token and access-token requests for this connection. Treat as a sensitive credential and supply the exact secret issued by the upstream provider. +""" diff --git a/src/auth0/management/types/connection_client_secret_paypal.py b/src/auth0/management/types/connection_client_secret_paypal.py index 577b8782..639ffc89 100644 --- a/src/auth0/management/types/connection_client_secret_paypal.py +++ b/src/auth0/management/types/connection_client_secret_paypal.py @@ -3,3 +3,6 @@ from .connection_client_secret import ConnectionClientSecret ConnectionClientSecretPaypal = ConnectionClientSecret +""" +OAuth 2.0 client secret issued by PayPal during application registration. Leave empty to use Auth0 Dev Keys. +""" diff --git a/src/auth0/management/types/connection_client_secret_salesforce.py b/src/auth0/management/types/connection_client_secret_salesforce.py index 53107f13..6f9a6bed 100644 --- a/src/auth0/management/types/connection_client_secret_salesforce.py +++ b/src/auth0/management/types/connection_client_secret_salesforce.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionClientSecretSalesforce = str +""" +The OAuth 2.0 client secret +""" diff --git a/src/auth0/management/types/connection_community_base_url_salesforce.py b/src/auth0/management/types/connection_community_base_url_salesforce.py index 26417875..78fc1c46 100644 --- a/src/auth0/management/types/connection_community_base_url_salesforce.py +++ b/src/auth0/management/types/connection_community_base_url_salesforce.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback import ConnectionHttpsUrlWithHttpFallback ConnectionCommunityBaseUrlSalesforce = ConnectionHttpsUrlWithHttpFallback +""" +The base URL of your Salesforce Community (Experience Cloud) site. When specified, authentication flows will use this Community URL instead of the standard Salesforce login page, enabling users to authenticate through your branded Community portal. +""" diff --git a/src/auth0/management/types/connection_configuration.py b/src/auth0/management/types/connection_configuration.py index 54d6428a..d0fd391d 100644 --- a/src/auth0/management/types/connection_configuration.py +++ b/src/auth0/management/types/connection_configuration.py @@ -3,3 +3,6 @@ import typing ConnectionConfiguration = typing.Dict[str, str] +""" +A hash of configuration key/value pairs. +""" diff --git a/src/auth0/management/types/connection_custom_headers_o_auth_2.py b/src/auth0/management/types/connection_custom_headers_o_auth_2.py index 691f7d1c..c08f3ddc 100644 --- a/src/auth0/management/types/connection_custom_headers_o_auth_2.py +++ b/src/auth0/management/types/connection_custom_headers_o_auth_2.py @@ -3,3 +3,6 @@ import typing ConnectionCustomHeadersOAuth2 = typing.Dict[str, str] +""" +Custom HTTP headers sent with token exchange requests to the identity provider's token endpoint. Provided as key-value pairs (e.g., {'X-Custom-Header': 'value'}). Auth0's User-Agent header is always included by default. +""" diff --git a/src/auth0/management/types/connection_debug_saml.py b/src/auth0/management/types/connection_debug_saml.py index d0c9f736..96ab1d9c 100644 --- a/src/auth0/management/types/connection_debug_saml.py +++ b/src/auth0/management/types/connection_debug_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDebugSaml = bool +""" +When true, enables detailed SAML debugging by issuing 'w' (warning) events in tenant logs containing SAML request/response details. WARNING: Potentially exposes sensitive user information (PII, credentials) and should only be enabled temporarily for debugging purposes. +""" diff --git a/src/auth0/management/types/connection_destination_url_saml.py b/src/auth0/management/types/connection_destination_url_saml.py index d2563d46..ed690b58 100644 --- a/src/auth0/management/types/connection_destination_url_saml.py +++ b/src/auth0/management/types/connection_destination_url_saml.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionDestinationUrlSaml = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL where Auth0 will send SAML authentication requests (the Identity Provider's SSO URL). Must be a valid HTTPS URL. +""" diff --git a/src/auth0/management/types/connection_digest_algorithm_saml.py b/src/auth0/management/types/connection_digest_algorithm_saml.py index a55c6d30..5c4aaf69 100644 --- a/src/auth0/management/types/connection_digest_algorithm_saml.py +++ b/src/auth0/management/types/connection_digest_algorithm_saml.py @@ -3,3 +3,6 @@ from .connection_digest_algorithm_enum_saml import ConnectionDigestAlgorithmEnumSaml ConnectionDigestAlgorithmSaml = ConnectionDigestAlgorithmEnumSaml +""" +Algorithm used for computing digest values when signing SAML requests and logout requests. Defaults to 'sha256'. +""" diff --git a/src/auth0/management/types/connection_disable_self_service_change_password.py b/src/auth0/management/types/connection_disable_self_service_change_password.py index 383fe079..4cf21a09 100644 --- a/src/auth0/management/types/connection_disable_self_service_change_password.py +++ b/src/auth0/management/types/connection_disable_self_service_change_password.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDisableSelfServiceChangePassword = bool +""" +Indicates whether to disable self-service change password. Set to true to stop the "Forgot Password" being displayed on login pages +""" diff --git a/src/auth0/management/types/connection_disable_signup.py b/src/auth0/management/types/connection_disable_signup.py index b35db190..7f835a3c 100644 --- a/src/auth0/management/types/connection_disable_signup.py +++ b/src/auth0/management/types/connection_disable_signup.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDisableSignup = bool +""" +When true, prevents new user registration through this connection. Existing users can still authenticate. Useful for invite-only applications or during user migration. +""" diff --git a/src/auth0/management/types/connection_disable_signup_sms.py b/src/auth0/management/types/connection_disable_signup_sms.py index 2476d031..fe05a133 100644 --- a/src/auth0/management/types/connection_disable_signup_sms.py +++ b/src/auth0/management/types/connection_disable_signup_sms.py @@ -3,3 +3,6 @@ from .connection_disable_signup import ConnectionDisableSignup ConnectionDisableSignupSms = ConnectionDisableSignup +""" +Controls whether new user signups are allowed via SMS authentication +""" diff --git a/src/auth0/management/types/connection_discovery_url.py b/src/auth0/management/types/connection_discovery_url.py index 1d9f41cb..663aeac3 100644 --- a/src/auth0/management/types/connection_discovery_url.py +++ b/src/auth0/management/types/connection_discovery_url.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionDiscoveryUrl = ConnectionHttpsUrlWithHttpFallback255 +""" +URL of the identity provider's OIDC Discovery endpoint (/.well-known/openid-configuration). When provided and oidc_metadata is empty, Auth0 automatically retrieves the provider's configuration including endpoints and supported features. +""" diff --git a/src/auth0/management/types/connection_display_name.py b/src/auth0/management/types/connection_display_name.py index a3506f08..b49c2da2 100644 --- a/src/auth0/management/types/connection_display_name.py +++ b/src/auth0/management/types/connection_display_name.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDisplayName = str +""" +Connection name used in the new universal login experience +""" diff --git a/src/auth0/management/types/connection_display_values_supported.py b/src/auth0/management/types/connection_display_values_supported.py index eba56ed2..b907712c 100644 --- a/src/auth0/management/types/connection_display_values_supported.py +++ b/src/auth0/management/types/connection_display_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionDisplayValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWS signing algorithms (alg values) supported by the Token Endpoint for the signature on the JWT [JWT] used to authenticate the Client at the Token Endpoint for the private_key_jwt and client_secret_jwt authentication methods. Servers SHOULD support RS256. The value none MUST NOT be used. +""" diff --git a/src/auth0/management/types/connection_domain_aliases.py b/src/auth0/management/types/connection_domain_aliases.py index 93aff9a5..b5814f87 100644 --- a/src/auth0/management/types/connection_domain_aliases.py +++ b/src/auth0/management/types/connection_domain_aliases.py @@ -5,3 +5,6 @@ from .connection_domain_aliases_items_one import ConnectionDomainAliasesItemsOne ConnectionDomainAliases = typing.List[ConnectionDomainAliasesItemsOne] +""" +Email domains associated with this connection for Home Realm Discovery (HRD). When a user's email matches one of these domains, they are automatically routed to this connection during authentication. +""" diff --git a/src/auth0/management/types/connection_domain_aliases_ad.py b/src/auth0/management/types/connection_domain_aliases_ad.py index 5d217867..4824a9bc 100644 --- a/src/auth0/management/types/connection_domain_aliases_ad.py +++ b/src/auth0/management/types/connection_domain_aliases_ad.py @@ -3,3 +3,6 @@ import typing ConnectionDomainAliasesAd = typing.List[str] +""" +List of domain names that can be used with identifier-first authentication flow to route users to this AD connection; each domain must be a valid DNS name up to 256 characters +""" diff --git a/src/auth0/management/types/connection_domain_aliases_azure_ad.py b/src/auth0/management/types/connection_domain_aliases_azure_ad.py index ba492cdb..a11f23a6 100644 --- a/src/auth0/management/types/connection_domain_aliases_azure_ad.py +++ b/src/auth0/management/types/connection_domain_aliases_azure_ad.py @@ -3,3 +3,6 @@ import typing ConnectionDomainAliasesAzureAd = typing.List[str] +""" +Alternative domain names associated with this Azure AD tenant. Allows users from multiple verified domains to authenticate through this connection. Can be an array of domain strings. +""" diff --git a/src/auth0/management/types/connection_domain_aliases_saml.py b/src/auth0/management/types/connection_domain_aliases_saml.py index 634a6eb7..e01d3664 100644 --- a/src/auth0/management/types/connection_domain_aliases_saml.py +++ b/src/auth0/management/types/connection_domain_aliases_saml.py @@ -5,3 +5,6 @@ from .connection_domain_aliases_items_one import ConnectionDomainAliasesItemsOne ConnectionDomainAliasesSaml = typing.List[ConnectionDomainAliasesItemsOne] +""" +Domain aliases for the connection +""" diff --git a/src/auth0/management/types/connection_domain_google_apps.py b/src/auth0/management/types/connection_domain_google_apps.py index 8f882d22..cdb61fdf 100644 --- a/src/auth0/management/types/connection_domain_google_apps.py +++ b/src/auth0/management/types/connection_domain_google_apps.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDomainGoogleApps = str +""" +Primary Google Workspace domain name that users must belong to. +""" diff --git a/src/auth0/management/types/connection_domain_okta.py b/src/auth0/management/types/connection_domain_okta.py index 9140d748..c711a6fd 100644 --- a/src/auth0/management/types/connection_domain_okta.py +++ b/src/auth0/management/types/connection_domain_okta.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionDomainOkta = str +""" +Domain of the Okta organization (e.g., dev-123456.okta.com). Should be just the domain of the okta server with no scheme or trailing backslash. Discovery runs only when connection.options.oidc_metadata is empty and a domain is provided +""" diff --git a/src/auth0/management/types/connection_dpop_signing_alg_values_supported.py b/src/auth0/management/types/connection_dpop_signing_alg_values_supported.py index 46dc21ee..4d692e81 100644 --- a/src/auth0/management/types/connection_dpop_signing_alg_values_supported.py +++ b/src/auth0/management/types/connection_dpop_signing_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionDpopSigningAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWS signing algorithms (alg values) supported for DPoP proof JWT signing. +""" diff --git a/src/auth0/management/types/connection_email_body_email.py b/src/auth0/management/types/connection_email_body_email.py index 09efd532..390bd55f 100644 --- a/src/auth0/management/types/connection_email_body_email.py +++ b/src/auth0/management/types/connection_email_body_email.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEmailBodyEmail = str +""" +Email body content +""" diff --git a/src/auth0/management/types/connection_email_from_email.py b/src/auth0/management/types/connection_email_from_email.py index 74cfccb4..b6a0fb4f 100644 --- a/src/auth0/management/types/connection_email_from_email.py +++ b/src/auth0/management/types/connection_email_from_email.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEmailFromEmail = str +""" +From email address +""" diff --git a/src/auth0/management/types/connection_email_subject_email.py b/src/auth0/management/types/connection_email_subject_email.py index fc1649e2..0ea2dd03 100644 --- a/src/auth0/management/types/connection_email_subject_email.py +++ b/src/auth0/management/types/connection_email_subject_email.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEmailSubjectEmail = str +""" +Email subject line +""" diff --git a/src/auth0/management/types/connection_enable_script_context.py b/src/auth0/management/types/connection_enable_script_context.py index 4574bf90..231cb519 100644 --- a/src/auth0/management/types/connection_enable_script_context.py +++ b/src/auth0/management/types/connection_enable_script_context.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEnableScriptContext = bool +""" +Set to true to inject context into custom DB scripts (warning: cannot be disabled once enabled) +""" diff --git a/src/auth0/management/types/connection_enabled_clients.py b/src/auth0/management/types/connection_enabled_clients.py index 204ee79c..41b539bd 100644 --- a/src/auth0/management/types/connection_enabled_clients.py +++ b/src/auth0/management/types/connection_enabled_clients.py @@ -3,3 +3,6 @@ import typing ConnectionEnabledClients = typing.List[str] +""" +DEPRECATED property. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients. +""" diff --git a/src/auth0/management/types/connection_enabled_database_customization.py b/src/auth0/management/types/connection_enabled_database_customization.py index c32b3792..7808c3f9 100644 --- a/src/auth0/management/types/connection_enabled_database_customization.py +++ b/src/auth0/management/types/connection_enabled_database_customization.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEnabledDatabaseCustomization = bool +""" +Set to true to use a legacy user store +""" diff --git a/src/auth0/management/types/connection_end_session_endpoint.py b/src/auth0/management/types/connection_end_session_endpoint.py index 34326356..11472924 100644 --- a/src/auth0/management/types/connection_end_session_endpoint.py +++ b/src/auth0/management/types/connection_end_session_endpoint.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEndSessionEndpoint = str +""" +URL of the identity provider's logout/end session endpoint. When configured as a static URL, users are redirected here after logging out from Auth0. Must use HTTPS scheme. +""" diff --git a/src/auth0/management/types/connection_entity_id_saml.py b/src/auth0/management/types/connection_entity_id_saml.py index a0cdd3a7..df83050e 100644 --- a/src/auth0/management/types/connection_entity_id_saml.py +++ b/src/auth0/management/types/connection_entity_id_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionEntityIdSaml = str +""" +The entity identifier (Issuer) for the SAML Service Provider. When not provided, defaults to 'urn:auth0:{tenant}:{connection}'. This value is included in SAML AuthnRequest messages sent to the identity provider. +""" diff --git a/src/auth0/management/types/connection_ext_admin.py b/src/auth0/management/types/connection_ext_admin.py index 801168ff..0b3027dd 100644 --- a/src/auth0/management/types/connection_ext_admin.py +++ b/src/auth0/management/types/connection_ext_admin.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionExtAdmin = bool +""" +Indicates to store whether the user is a domain administrator. +""" diff --git a/src/auth0/management/types/connection_ext_agreed_terms.py b/src/auth0/management/types/connection_ext_agreed_terms.py index 27411941..4aced18e 100644 --- a/src/auth0/management/types/connection_ext_agreed_terms.py +++ b/src/auth0/management/types/connection_ext_agreed_terms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionExtAgreedTerms = bool +""" +Indicates to store whether the user has agreed to the terms of service. +""" diff --git a/src/auth0/management/types/connection_ext_agreed_terms_google_apps.py b/src/auth0/management/types/connection_ext_agreed_terms_google_apps.py index 1e81d22d..1d438da4 100644 --- a/src/auth0/management/types/connection_ext_agreed_terms_google_apps.py +++ b/src/auth0/management/types/connection_ext_agreed_terms_google_apps.py @@ -3,3 +3,6 @@ from .connection_ext_agreed_terms import ConnectionExtAgreedTerms ConnectionExtAgreedTermsGoogleApps = ConnectionExtAgreedTerms +""" +Fetches the `agreedToTerms` flag from the Google Directory profile. +""" diff --git a/src/auth0/management/types/connection_ext_assigned_plans.py b/src/auth0/management/types/connection_ext_assigned_plans.py index 918a6929..8dd56880 100644 --- a/src/auth0/management/types/connection_ext_assigned_plans.py +++ b/src/auth0/management/types/connection_ext_assigned_plans.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionExtAssignedPlans = bool +""" +Indicates whether to store a list of the Office 365 assigned plans for the user. +""" diff --git a/src/auth0/management/types/connection_ext_groups_azure_ad.py b/src/auth0/management/types/connection_ext_groups_azure_ad.py index d80a78f0..4fea2c25 100644 --- a/src/auth0/management/types/connection_ext_groups_azure_ad.py +++ b/src/auth0/management/types/connection_ext_groups_azure_ad.py @@ -3,3 +3,6 @@ from .connection_ext_groups import ConnectionExtGroups ConnectionExtGroupsAzureAd = ConnectionExtGroups +""" +When enabled (true), retrieves and stores Azure AD security group memberships for the user. Requires Microsoft Graph API permissions (Directory.Read.All). Allows configuring max_groups_to_retrieve. +""" diff --git a/src/auth0/management/types/connection_ext_groups_google_apps.py b/src/auth0/management/types/connection_ext_groups_google_apps.py index 5fee5f11..817f89b2 100644 --- a/src/auth0/management/types/connection_ext_groups_google_apps.py +++ b/src/auth0/management/types/connection_ext_groups_google_apps.py @@ -3,3 +3,6 @@ from .connection_ext_groups import ConnectionExtGroups ConnectionExtGroupsGoogleApps = ConnectionExtGroups +""" +Enables enrichment with Google group memberships (required for `ext_groups_extended`). +""" diff --git a/src/auth0/management/types/connection_ext_is_admin_google_apps.py b/src/auth0/management/types/connection_ext_is_admin_google_apps.py index 2a5ee565..787a9401 100644 --- a/src/auth0/management/types/connection_ext_is_admin_google_apps.py +++ b/src/auth0/management/types/connection_ext_is_admin_google_apps.py @@ -3,3 +3,6 @@ from .connection_ext_admin import ConnectionExtAdmin ConnectionExtIsAdminGoogleApps = ConnectionExtAdmin +""" +Fetches the Google Directory admin flag for the signing-in user. +""" diff --git a/src/auth0/management/types/connection_ext_is_suspended.py b/src/auth0/management/types/connection_ext_is_suspended.py index 99c259b2..0c976711 100644 --- a/src/auth0/management/types/connection_ext_is_suspended.py +++ b/src/auth0/management/types/connection_ext_is_suspended.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionExtIsSuspended = bool +""" +Indicates to store whether a user's account is suspended. +""" diff --git a/src/auth0/management/types/connection_ext_is_suspended_google_apps.py b/src/auth0/management/types/connection_ext_is_suspended_google_apps.py index d0851de4..f9d5ded5 100644 --- a/src/auth0/management/types/connection_ext_is_suspended_google_apps.py +++ b/src/auth0/management/types/connection_ext_is_suspended_google_apps.py @@ -3,3 +3,6 @@ from .connection_ext_is_suspended import ConnectionExtIsSuspended ConnectionExtIsSuspendedGoogleApps = ConnectionExtIsSuspended +""" +Fetches the Google Directory suspended flag for the signing-in user. +""" diff --git a/src/auth0/management/types/connection_ext_profile.py b/src/auth0/management/types/connection_ext_profile.py index 973c380e..5cb4f7e2 100644 --- a/src/auth0/management/types/connection_ext_profile.py +++ b/src/auth0/management/types/connection_ext_profile.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionExtProfile = bool +""" +When enabled (true), retrieves extended profile attributes from Azure AD via Microsoft Graph API (job title, department, office location, etc.). Requires Graph API permissions. Only available with Azure AD v1 or when explicitly enabled for v2. +""" diff --git a/src/auth0/management/types/connection_fields_map.py b/src/auth0/management/types/connection_fields_map.py index e360dfeb..b29e4dfc 100644 --- a/src/auth0/management/types/connection_fields_map.py +++ b/src/auth0/management/types/connection_fields_map.py @@ -3,3 +3,6 @@ import typing ConnectionFieldsMap = typing.Dict[str, str] +""" +Mapping of user profile fields returned from the OAuth2 provider to Auth0 user attributes +""" diff --git a/src/auth0/management/types/connection_fields_map_saml.py b/src/auth0/management/types/connection_fields_map_saml.py index 9f04bc74..df7c0f3a 100644 --- a/src/auth0/management/types/connection_fields_map_saml.py +++ b/src/auth0/management/types/connection_fields_map_saml.py @@ -5,3 +5,6 @@ from .connection_fields_map_saml_value import ConnectionFieldsMapSamlValue ConnectionFieldsMapSaml = typing.Dict[str, ConnectionFieldsMapSamlValue] +""" +Maps SAML assertion attributes from the identity provider to Auth0 user profile attributes. Format: { 'auth0_field': 'saml_attribute' } or { 'auth0_field': ['saml_attr1', 'saml_attr2'] } for fallback options. Merged with default mappings for email, name, given_name, family_name, and groups. +""" diff --git a/src/auth0/management/types/connection_forward_req_info_sms.py b/src/auth0/management/types/connection_forward_req_info_sms.py index d1378aa5..a4807e25 100644 --- a/src/auth0/management/types/connection_forward_req_info_sms.py +++ b/src/auth0/management/types/connection_forward_req_info_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionForwardReqInfoSms = bool +""" +When set to true, the gateway receives HTTP request details including IP address and User Agent from the client. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_amazon.py b/src/auth0/management/types/connection_freeform_scopes_amazon.py index ce80224e..5b899e71 100644 --- a/src/auth0/management/types/connection_freeform_scopes_amazon.py +++ b/src/auth0/management/types/connection_freeform_scopes_amazon.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesAmazon = ConnectionScopeArray +""" +Additional OAuth scopes to request from Amazon beyond the standard profile and postal_code scopes. These scopes must be valid Amazon Login scopes. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_google_o_auth_2.py b/src/auth0/management/types/connection_freeform_scopes_google_o_auth_2.py index 6eca5432..5ec27608 100644 --- a/src/auth0/management/types/connection_freeform_scopes_google_o_auth_2.py +++ b/src/auth0/management/types/connection_freeform_scopes_google_o_auth_2.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesGoogleOAuth2 = ConnectionScopeArray +""" +Array of custom OAuth 2.0 scopes to request from Google during authentication. Use this to request scopes not covered by the predefined scope options. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_linkedin.py b/src/auth0/management/types/connection_freeform_scopes_linkedin.py index 18af33e7..225069f7 100644 --- a/src/auth0/management/types/connection_freeform_scopes_linkedin.py +++ b/src/auth0/management/types/connection_freeform_scopes_linkedin.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesLinkedin = ConnectionScopeArray +""" +Array of custom OAuth 2.0 scopes to request from Linkedin during authentication. Use this to request scopes not covered by the predefined scope options. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_paypal.py b/src/auth0/management/types/connection_freeform_scopes_paypal.py index a63cbbd1..00836238 100644 --- a/src/auth0/management/types/connection_freeform_scopes_paypal.py +++ b/src/auth0/management/types/connection_freeform_scopes_paypal.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesPaypal = ConnectionScopeArray +""" +Additional OAuth scopes to request from PayPal beyond the standard attribute scopes. Enter valid PayPal scopes from their documentation. Invalid scopes may cause authentication errors. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_salesforce.py b/src/auth0/management/types/connection_freeform_scopes_salesforce.py index b71312cc..6fd41708 100644 --- a/src/auth0/management/types/connection_freeform_scopes_salesforce.py +++ b/src/auth0/management/types/connection_freeform_scopes_salesforce.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesSalesforce = ConnectionScopeArray +""" +Additional OAuth scopes to request from Salesforce beyond the standard profile permissions. Enter valid scopes from the Salesforce documentation. Invalid scopes may cause authentication errors. +""" diff --git a/src/auth0/management/types/connection_freeform_scopes_windows_live.py b/src/auth0/management/types/connection_freeform_scopes_windows_live.py index 86edb3c7..fa1709cf 100644 --- a/src/auth0/management/types/connection_freeform_scopes_windows_live.py +++ b/src/auth0/management/types/connection_freeform_scopes_windows_live.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionFreeformScopesWindowsLive = ConnectionScopeArray +""" +Custom OAuth scopes not predefined in the standard scope list. +""" diff --git a/src/auth0/management/types/connection_from_sms.py b/src/auth0/management/types/connection_from_sms.py index 871314cc..1d39be2c 100644 --- a/src/auth0/management/types/connection_from_sms.py +++ b/src/auth0/management/types/connection_from_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionFromSms = str +""" +The sender phone number or alphanumeric sender ID for outgoing SMS messages +""" diff --git a/src/auth0/management/types/connection_gateway_authentication_audience_sms.py b/src/auth0/management/types/connection_gateway_authentication_audience_sms.py index 4a1e039f..2abdecb5 100644 --- a/src/auth0/management/types/connection_gateway_authentication_audience_sms.py +++ b/src/auth0/management/types/connection_gateway_authentication_audience_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionGatewayAuthenticationAudienceSms = str +""" +`aud` claim value in the JWT sent to the SMS gateway. Identifies the gateway service (e.g., 'urn:MySmsGateway'). +""" diff --git a/src/auth0/management/types/connection_gateway_authentication_method_sms.py b/src/auth0/management/types/connection_gateway_authentication_method_sms.py index 902bdf50..56bf1d1e 100644 --- a/src/auth0/management/types/connection_gateway_authentication_method_sms.py +++ b/src/auth0/management/types/connection_gateway_authentication_method_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionGatewayAuthenticationMethodSms = str +""" +The Authorization header type when calling the SMS gateway. Set to 'bearer' for JWT token authentication. +""" diff --git a/src/auth0/management/types/connection_gateway_authentication_subject_sms.py b/src/auth0/management/types/connection_gateway_authentication_subject_sms.py index d99a26ed..552aafbc 100644 --- a/src/auth0/management/types/connection_gateway_authentication_subject_sms.py +++ b/src/auth0/management/types/connection_gateway_authentication_subject_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionGatewayAuthenticationSubjectSms = str +""" +`sub` claim value in the JWT sent to the SMS gateway. Identifies the requester (e.g., 'urn:Auth0'). +""" diff --git a/src/auth0/management/types/connection_gateway_url_sms.py b/src/auth0/management/types/connection_gateway_url_sms.py index f044a23d..6e667b0d 100644 --- a/src/auth0/management/types/connection_gateway_url_sms.py +++ b/src/auth0/management/types/connection_gateway_url_sms.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionGatewayUrlSms = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL of your SMS gateway. Auth0 must be able to reach this URL for it to use your gateway to send messages on your behalf. +""" diff --git a/src/auth0/management/types/connection_global_token_revocation_jwt_iss_saml.py b/src/auth0/management/types/connection_global_token_revocation_jwt_iss_saml.py index ad0087c9..b50c32db 100644 --- a/src/auth0/management/types/connection_global_token_revocation_jwt_iss_saml.py +++ b/src/auth0/management/types/connection_global_token_revocation_jwt_iss_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionGlobalTokenRevocationJwtIssSaml = str +""" +Expected 'iss' (Issuer) claim value for JWT tokens in Global Token Revocation requests from the identity provider. When configured, Auth0 validates the JWT issuer matches this value before processing token revocation. Must be used together with global_token_revocation_jwt_sub. +""" diff --git a/src/auth0/management/types/connection_global_token_revocation_jwt_sub_saml.py b/src/auth0/management/types/connection_global_token_revocation_jwt_sub_saml.py index 1262fb43..331316ed 100644 --- a/src/auth0/management/types/connection_global_token_revocation_jwt_sub_saml.py +++ b/src/auth0/management/types/connection_global_token_revocation_jwt_sub_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionGlobalTokenRevocationJwtSubSaml = str +""" +Expected 'sub' (Subject) claim value for JWT tokens in Global Token Revocation requests from the identity provider. When configured, Auth0 validates the JWT subject matches this value before processing token revocation. Must be used together with global_token_revocation_jwt_iss. +""" diff --git a/src/auth0/management/types/connection_grant_types_supported.py b/src/auth0/management/types/connection_grant_types_supported.py index 00f7153e..4ca871a2 100644 --- a/src/auth0/management/types/connection_grant_types_supported.py +++ b/src/auth0/management/types/connection_grant_types_supported.py @@ -3,3 +3,6 @@ import typing ConnectionGrantTypesSupported = typing.List[str] +""" +A list of the OAuth 2.0 Grant Type values that this OP supports. Dynamic OpenID Providers MUST support the authorization_code and implicit Grant Type values and MAY support other Grant Types. If omitted, the default value is ["authorization_code", "implicit"]. +""" diff --git a/src/auth0/management/types/connection_handle_login_from_social_google_apps.py b/src/auth0/management/types/connection_handle_login_from_social_google_apps.py index 0cfb0b23..75dd7a85 100644 --- a/src/auth0/management/types/connection_handle_login_from_social_google_apps.py +++ b/src/auth0/management/types/connection_handle_login_from_social_google_apps.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionHandleLoginFromSocialGoogleApps = bool +""" +When enabled, users who sign in with their Google account through a social login will be automatically routed to this Google Workspace connection if their email domain matches the configured tenant_domain or domain_aliases. This ensures enterprise users authenticate through their organization's Google Workspace identity provider rather than through a generic Google social login, enabling access to directory-based attributes and enforcing organizational security policies. Defaults to true for new connections. +""" diff --git a/src/auth0/management/types/connection_icon_url.py b/src/auth0/management/types/connection_icon_url.py index 09bb0152..0c7136ef 100644 --- a/src/auth0/management/types/connection_icon_url.py +++ b/src/auth0/management/types/connection_icon_url.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionIconUrl = str +""" +https url of the icon to be shown +""" diff --git a/src/auth0/management/types/connection_icon_url_adfs.py b/src/auth0/management/types/connection_icon_url_adfs.py index d4d083f6..df0cd09f 100644 --- a/src/auth0/management/types/connection_icon_url_adfs.py +++ b/src/auth0/management/types/connection_icon_url_adfs.py @@ -3,3 +3,6 @@ from .connection_icon_url import ConnectionIconUrl ConnectionIconUrlAdfs = ConnectionIconUrl +""" +URL for the connection icon displayed in Auth0 login pages. Accepts HTTPS URLs. Used for visual branding in authentication flows. +""" diff --git a/src/auth0/management/types/connection_icon_url_azure_ad.py b/src/auth0/management/types/connection_icon_url_azure_ad.py index 965cdf17..a7e10315 100644 --- a/src/auth0/management/types/connection_icon_url_azure_ad.py +++ b/src/auth0/management/types/connection_icon_url_azure_ad.py @@ -3,3 +3,6 @@ from .connection_icon_url import ConnectionIconUrl ConnectionIconUrlAzureAd = ConnectionIconUrl +""" +URL for the connection icon displayed in Auth0 login pages. Accepts HTTPS URLs. Used for visual branding in authentication flows. +""" diff --git a/src/auth0/management/types/connection_icon_url_google_apps.py b/src/auth0/management/types/connection_icon_url_google_apps.py index 9e039ee4..53594af6 100644 --- a/src/auth0/management/types/connection_icon_url_google_apps.py +++ b/src/auth0/management/types/connection_icon_url_google_apps.py @@ -3,3 +3,6 @@ from .connection_icon_url import ConnectionIconUrl ConnectionIconUrlGoogleApps = ConnectionIconUrl +""" +URL for the connection icon displayed in Auth0 login pages. Accepts HTTPS URLs. Used for visual branding in authentication flows. +""" diff --git a/src/auth0/management/types/connection_icon_url_google_o_auth_2.py b/src/auth0/management/types/connection_icon_url_google_o_auth_2.py index 5b69ee39..741fb1a3 100644 --- a/src/auth0/management/types/connection_icon_url_google_o_auth_2.py +++ b/src/auth0/management/types/connection_icon_url_google_o_auth_2.py @@ -3,3 +3,6 @@ from .connection_icon_url import ConnectionIconUrl ConnectionIconUrlGoogleOAuth2 = ConnectionIconUrl +""" +URL for the connection icon displayed in Auth0 login pages. Accepts HTTPS URLs. Used for visual branding in authentication flows. +""" diff --git a/src/auth0/management/types/connection_icon_url_saml.py b/src/auth0/management/types/connection_icon_url_saml.py index 83887fd7..e9995514 100644 --- a/src/auth0/management/types/connection_icon_url_saml.py +++ b/src/auth0/management/types/connection_icon_url_saml.py @@ -3,3 +3,6 @@ from .connection_icon_url import ConnectionIconUrl ConnectionIconUrlSaml = ConnectionIconUrl +""" +URL for the connection icon displayed in Auth0 login pages. Accepts HTTPS URLs. Used for visual branding in authentication flows. +""" diff --git a/src/auth0/management/types/connection_id.py b/src/auth0/management/types/connection_id.py index 1426ca22..362aa05a 100644 --- a/src/auth0/management/types/connection_id.py +++ b/src/auth0/management/types/connection_id.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionId = str +""" +The connection's identifier +""" diff --git a/src/auth0/management/types/connection_id_token_encryption_alg_values_supported.py b/src/auth0/management/types/connection_id_token_encryption_alg_values_supported.py index 9ea5833c..deca2ed5 100644 --- a/src/auth0/management/types/connection_id_token_encryption_alg_values_supported.py +++ b/src/auth0/management/types/connection_id_token_encryption_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionIdTokenEncryptionAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE encryption algorithms (alg values) supported by the OP for the ID Token to encode the Claims in a JWT +""" diff --git a/src/auth0/management/types/connection_id_token_encryption_enc_values_supported.py b/src/auth0/management/types/connection_id_token_encryption_enc_values_supported.py index 179633ce..658a9b4c 100644 --- a/src/auth0/management/types/connection_id_token_encryption_enc_values_supported.py +++ b/src/auth0/management/types/connection_id_token_encryption_enc_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionIdTokenEncryptionEncValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE encryption algorithms (enc values) supported by the OP for the ID Token to encode the Claims in a JWT [JWT]. +""" diff --git a/src/auth0/management/types/connection_id_token_signed_response_algs.py b/src/auth0/management/types/connection_id_token_signed_response_algs.py index 3f0380b4..35a97e01 100644 --- a/src/auth0/management/types/connection_id_token_signed_response_algs.py +++ b/src/auth0/management/types/connection_id_token_signed_response_algs.py @@ -5,3 +5,6 @@ from .connection_id_token_signed_response_alg_enum import ConnectionIdTokenSignedResponseAlgEnum ConnectionIdTokenSignedResponseAlgs = typing.Optional[typing.List[ConnectionIdTokenSignedResponseAlgEnum]] +""" +List of algorithms allowed to verify the ID tokens. +""" diff --git a/src/auth0/management/types/connection_id_token_signing_alg_values_supported.py b/src/auth0/management/types/connection_id_token_signing_alg_values_supported.py index e9b546c7..d152a077 100644 --- a/src/auth0/management/types/connection_id_token_signing_alg_values_supported.py +++ b/src/auth0/management/types/connection_id_token_signing_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionIdTokenSigningAlgValuesSupported = typing.List[str] +""" +A list of the JWS signing algorithms (alg values) supported by the OP for the ID Token to encode the Claims in a JWT. The algorithm RS256 MUST be included. The value none MAY be supported, but MUST NOT be used unless the Response Type used returns no ID Token from the Authorization Endpoint (such as when using the Authorization Code Flow). https://datatracker.ietf.org/doc/html/rfc7518 +""" diff --git a/src/auth0/management/types/connection_identifier_precedence.py b/src/auth0/management/types/connection_identifier_precedence.py index f6ef507f..0ccc59b8 100644 --- a/src/auth0/management/types/connection_identifier_precedence.py +++ b/src/auth0/management/types/connection_identifier_precedence.py @@ -5,3 +5,6 @@ from .connection_identifier_precedence_enum import ConnectionIdentifierPrecedenceEnum ConnectionIdentifierPrecedence = typing.List[ConnectionIdentifierPrecedenceEnum] +""" +Order of precedence for attribute types. If the property is not specified, the default precedence of attributes will be used. +""" diff --git a/src/auth0/management/types/connection_identity_api_azure_ad.py b/src/auth0/management/types/connection_identity_api_azure_ad.py index 204965ce..297d17f3 100644 --- a/src/auth0/management/types/connection_identity_api_azure_ad.py +++ b/src/auth0/management/types/connection_identity_api_azure_ad.py @@ -3,3 +3,6 @@ from .connection_identity_api_enum_azure_ad import ConnectionIdentityApiEnumAzureAd ConnectionIdentityApiAzureAd = ConnectionIdentityApiEnumAzureAd +""" +The Azure AD endpoint version for authentication. 'microsoft-identity-platform-v2.0' (recommended, default) supports modern OAuth 2.0 features. 'azure-active-directory-v1.0' is the legacy endpoint with protocol limitations. Selection affects available features. +""" diff --git a/src/auth0/management/types/connection_import_mode.py b/src/auth0/management/types/connection_import_mode.py index a36797e7..6358a101 100644 --- a/src/auth0/management/types/connection_import_mode.py +++ b/src/auth0/management/types/connection_import_mode.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionImportMode = bool +""" +Enables lazy migration mode for importing users from an external database. When a user authenticates, their credentials are validated against the legacy store, then the user is created in Auth0 for future logins. +""" diff --git a/src/auth0/management/types/connection_ips_ad.py b/src/auth0/management/types/connection_ips_ad.py index b7839384..afdb0628 100644 --- a/src/auth0/management/types/connection_ips_ad.py +++ b/src/auth0/management/types/connection_ips_ad.py @@ -3,3 +3,6 @@ import typing ConnectionIpsAd = typing.List[str] +""" +Array of IP address ranges in CIDR notation used to determine if authentication requests originate from the corporate network for Kerberos or certificate authentication. +""" diff --git a/src/auth0/management/types/connection_is_domain_connection.py b/src/auth0/management/types/connection_is_domain_connection.py index 80f5203e..767b5083 100644 --- a/src/auth0/management/types/connection_is_domain_connection.py +++ b/src/auth0/management/types/connection_is_domain_connection.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionIsDomainConnection = bool +""" +true promotes to a domain-level connection so that third-party applications can use it. false does not promote the connection, so only first-party applications with the connection enabled can use it. (Defaults to false.) +""" diff --git a/src/auth0/management/types/connection_max_groups_to_retrieve.py b/src/auth0/management/types/connection_max_groups_to_retrieve.py index b6235da0..1a9e2393 100644 --- a/src/auth0/management/types/connection_max_groups_to_retrieve.py +++ b/src/auth0/management/types/connection_max_groups_to_retrieve.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionMaxGroupsToRetrieve = str +""" +Maximum number of Azure AD groups to retrieve per user during authentication. Helps prevent performance issues for users in many groups. Only applies when ext_groups is enabled. Leave empty to use platform default. +""" diff --git a/src/auth0/management/types/connection_messaging_service_sid_sms.py b/src/auth0/management/types/connection_messaging_service_sid_sms.py index 53004128..f5605642 100644 --- a/src/auth0/management/types/connection_messaging_service_sid_sms.py +++ b/src/auth0/management/types/connection_messaging_service_sid_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionMessagingServiceSidSms = str +""" +Twilio Messaging Service SID +""" diff --git a/src/auth0/management/types/connection_metadata_url_saml.py b/src/auth0/management/types/connection_metadata_url_saml.py index 1a9d8575..624f72c6 100644 --- a/src/auth0/management/types/connection_metadata_url_saml.py +++ b/src/auth0/management/types/connection_metadata_url_saml.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_2048 import ConnectionHttpsUrlWithHttpFallback2048 ConnectionMetadataUrlSaml = ConnectionHttpsUrlWithHttpFallback2048 +""" +HTTPS URL to the identity provider's SAML metadata document. When provided, Auth0 automatically fetches and parses the metadata to extract signInEndpoint, signOutEndpoint, signingCert, signSAMLRequest, and protocolBinding. Use metadataUrl OR metadataXml, not both. +""" diff --git a/src/auth0/management/types/connection_metadata_xml.py b/src/auth0/management/types/connection_metadata_xml.py index 885c40ff..0bac299f 100644 --- a/src/auth0/management/types/connection_metadata_xml.py +++ b/src/auth0/management/types/connection_metadata_xml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionMetadataXml = str +""" +Standard IdP metadata XML payload used across SAML-compatible strategies. +""" diff --git a/src/auth0/management/types/connection_metadata_xml_adfs.py b/src/auth0/management/types/connection_metadata_xml_adfs.py index f753c212..22124665 100644 --- a/src/auth0/management/types/connection_metadata_xml_adfs.py +++ b/src/auth0/management/types/connection_metadata_xml_adfs.py @@ -3,3 +3,6 @@ from .connection_metadata_xml import ConnectionMetadataXml ConnectionMetadataXmlAdfs = ConnectionMetadataXml +""" +Inline XML alternative to 'adfs_server'. Cannot be set together with 'adfs_server'. +""" diff --git a/src/auth0/management/types/connection_metadata_xml_saml.py b/src/auth0/management/types/connection_metadata_xml_saml.py index 49d4fb80..3b005c33 100644 --- a/src/auth0/management/types/connection_metadata_xml_saml.py +++ b/src/auth0/management/types/connection_metadata_xml_saml.py @@ -3,3 +3,6 @@ from .connection_metadata_xml import ConnectionMetadataXml ConnectionMetadataXmlSaml = ConnectionMetadataXml +""" +SAML metadata XML document from the identity provider. When provided, automatically parsed to extract signInEndpoint, signOutEndpoint, signingCert, signSAMLRequest, and protocolBinding. Deleted after parsing to avoid persisting large documents. Not persisted to database - deleted after parsing metadata. Use metadataUrl OR metadataXml, not both. +""" diff --git a/src/auth0/management/types/connection_name.py b/src/auth0/management/types/connection_name.py index dae8edd9..5b9654ac 100644 --- a/src/auth0/management/types/connection_name.py +++ b/src/auth0/management/types/connection_name.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionName = str +""" +The name of the connection. Must start and end with an alphanumeric character and can only contain alphanumeric characters and '-'. Max length 128 +""" diff --git a/src/auth0/management/types/connection_name_prefix_template.py b/src/auth0/management/types/connection_name_prefix_template.py index a1b1350b..2e0c18f7 100644 --- a/src/auth0/management/types/connection_name_prefix_template.py +++ b/src/auth0/management/types/connection_name_prefix_template.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionNamePrefixTemplate = str +""" +Connection name prefix template. +""" diff --git a/src/auth0/management/types/connection_non_persistent_attrs.py b/src/auth0/management/types/connection_non_persistent_attrs.py index afada121..afefbff3 100644 --- a/src/auth0/management/types/connection_non_persistent_attrs.py +++ b/src/auth0/management/types/connection_non_persistent_attrs.py @@ -3,3 +3,6 @@ import typing ConnectionNonPersistentAttrs = typing.List[str] +""" +An array of user fields that should not be stored in the Auth0 database (https://auth0.com/docs/security/data-security/denylist) +""" diff --git a/src/auth0/management/types/connection_options.py b/src/auth0/management/types/connection_options.py index c3f270a3..06e7ec97 100644 --- a/src/auth0/management/types/connection_options.py +++ b/src/auth0/management/types/connection_options.py @@ -3,3 +3,6 @@ import typing ConnectionOptions = typing.Dict[str, typing.Any] +""" +In order to return options in the response, the `read:connections_options` scope must be present +""" diff --git a/src/auth0/management/types/connection_options_client_id_github.py b/src/auth0/management/types/connection_options_client_id_github.py index d58079b5..1e3da124 100644 --- a/src/auth0/management/types/connection_options_client_id_github.py +++ b/src/auth0/management/types/connection_options_client_id_github.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionOptionsClientIdGithub = str +""" +OAuth 2.0 client identifier issued by the identity provider during application registration. This value identifies your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_options_client_id_twitter.py b/src/auth0/management/types/connection_options_client_id_twitter.py index 0ac8c3a7..963aaf29 100644 --- a/src/auth0/management/types/connection_options_client_id_twitter.py +++ b/src/auth0/management/types/connection_options_client_id_twitter.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionOptionsClientIdTwitter = str +""" +OAuth 2.0 client identifier issued by the identity provider during application registration. This value identifies your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_options_client_secret_github.py b/src/auth0/management/types/connection_options_client_secret_github.py index ea4c387e..c28b7229 100644 --- a/src/auth0/management/types/connection_options_client_secret_github.py +++ b/src/auth0/management/types/connection_options_client_secret_github.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionOptionsClientSecretGithub = str +""" +OAuth 2.0 client secret issued by the identity provider during application registration. This value is used to authenticate your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_options_client_secret_twitter.py b/src/auth0/management/types/connection_options_client_secret_twitter.py index ae24e854..3ab8fc98 100644 --- a/src/auth0/management/types/connection_options_client_secret_twitter.py +++ b/src/auth0/management/types/connection_options_client_secret_twitter.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionOptionsClientSecretTwitter = str +""" +OAuth 2.0 client secret issued by the identity provider during application registration. This value is used to authenticate your Auth0 connection to the identity provider. +""" diff --git a/src/auth0/management/types/connection_options_custom.py b/src/auth0/management/types/connection_options_custom.py index e1f59db5..93d6da04 100644 --- a/src/auth0/management/types/connection_options_custom.py +++ b/src/auth0/management/types/connection_options_custom.py @@ -3,3 +3,6 @@ import typing ConnectionOptionsCustom = typing.Dict[str, typing.Any] +""" +Options for 'custom' connections +""" diff --git a/src/auth0/management/types/connection_options_deflate_saml.py b/src/auth0/management/types/connection_options_deflate_saml.py index 34dbfd8b..4f5bae7d 100644 --- a/src/auth0/management/types/connection_options_deflate_saml.py +++ b/src/auth0/management/types/connection_options_deflate_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionOptionsDeflateSaml = bool +""" +When true, enables DEFLATE compression for SAML requests sent via HTTP-Redirect binding. +""" diff --git a/src/auth0/management/types/connection_options_freeform_scopes_github.py b/src/auth0/management/types/connection_options_freeform_scopes_github.py index 941e339d..3e4b6d61 100644 --- a/src/auth0/management/types/connection_options_freeform_scopes_github.py +++ b/src/auth0/management/types/connection_options_freeform_scopes_github.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionOptionsFreeformScopesGithub = ConnectionScopeArray +""" +Array of custom OAuth 2.0 scopes to request from GitHub during authentication. Use this to request scopes not covered by the predefined scope options. +""" diff --git a/src/auth0/management/types/connection_options_ip.py b/src/auth0/management/types/connection_options_ip.py index b88f67fc..8e85077a 100644 --- a/src/auth0/management/types/connection_options_ip.py +++ b/src/auth0/management/types/connection_options_ip.py @@ -3,3 +3,6 @@ import typing ConnectionOptionsIp = typing.Dict[str, typing.Any] +""" +Options for the 'ip' connection +""" diff --git a/src/auth0/management/types/connection_options_scope_github.py b/src/auth0/management/types/connection_options_scope_github.py index 1b1113e8..b12d615d 100644 --- a/src/auth0/management/types/connection_options_scope_github.py +++ b/src/auth0/management/types/connection_options_scope_github.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionOptionsScopeGithub = ConnectionScopeArray +""" +Scope options for GitHub connections. +""" diff --git a/src/auth0/management/types/connection_options_scope_twitter.py b/src/auth0/management/types/connection_options_scope_twitter.py index 492005d5..38eb6237 100644 --- a/src/auth0/management/types/connection_options_scope_twitter.py +++ b/src/auth0/management/types/connection_options_scope_twitter.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionOptionsScopeTwitter = ConnectionScopeArray +""" +Array of OAuth 2.0 scopes to request from Twitter during authentication. Use this to request scopes not covered by the predefined scope options. +""" diff --git a/src/auth0/management/types/connection_ping_federate_base_url.py b/src/auth0/management/types/connection_ping_federate_base_url.py index fd8e8313..e1b39e84 100644 --- a/src/auth0/management/types/connection_ping_federate_base_url.py +++ b/src/auth0/management/types/connection_ping_federate_base_url.py @@ -3,3 +3,6 @@ from .connection_ping_federate_base_url_ping_federate import ConnectionPingFederateBaseUrlPingFederate ConnectionPingFederateBaseUrl = ConnectionPingFederateBaseUrlPingFederate +""" +URL provided by PingFederate which returns information used for creating the connection +""" diff --git a/src/auth0/management/types/connection_ping_federate_base_url_ping_federate.py b/src/auth0/management/types/connection_ping_federate_base_url_ping_federate.py index 6ba12cad..4c8634a1 100644 --- a/src/auth0/management/types/connection_ping_federate_base_url_ping_federate.py +++ b/src/auth0/management/types/connection_ping_federate_base_url_ping_federate.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback import ConnectionHttpsUrlWithHttpFallback ConnectionPingFederateBaseUrlPingFederate = ConnectionHttpsUrlWithHttpFallback +""" +PingFederate base URL constrained to HTTP/HTTPS with length bounds +""" diff --git a/src/auth0/management/types/connection_profile_bitbucket.py b/src/auth0/management/types/connection_profile_bitbucket.py index da3f5dbd..994d9235 100644 --- a/src/auth0/management/types/connection_profile_bitbucket.py +++ b/src/auth0/management/types/connection_profile_bitbucket.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionProfileBitbucket = bool +""" +`profile` is a boolean that controls whether basic profile information (name, picture, email) is requested from Bitbucket during authentication. When `true`, the connection requests access to the user's basic profile data. +""" diff --git a/src/auth0/management/types/connection_profile_enabled_features.py b/src/auth0/management/types/connection_profile_enabled_features.py index d9f13300..a361b9e1 100644 --- a/src/auth0/management/types/connection_profile_enabled_features.py +++ b/src/auth0/management/types/connection_profile_enabled_features.py @@ -5,3 +5,6 @@ from .enabled_features_enum import EnabledFeaturesEnum ConnectionProfileEnabledFeatures = typing.List[EnabledFeaturesEnum] +""" +Enabled features for the connection profile. +""" diff --git a/src/auth0/management/types/connection_profile_id.py b/src/auth0/management/types/connection_profile_id.py index 13a89794..8e7f787b 100644 --- a/src/auth0/management/types/connection_profile_id.py +++ b/src/auth0/management/types/connection_profile_id.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionProfileId = str +""" +Connection Profile identifier. +""" diff --git a/src/auth0/management/types/connection_profile_name.py b/src/auth0/management/types/connection_profile_name.py index 3f1ca1f2..0dbe134a 100644 --- a/src/auth0/management/types/connection_profile_name.py +++ b/src/auth0/management/types/connection_profile_name.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionProfileName = str +""" +The name of the connection profile. +""" diff --git a/src/auth0/management/types/connection_profile_strategy_overrides_enabled_features.py b/src/auth0/management/types/connection_profile_strategy_overrides_enabled_features.py index b2b686bc..b249cc37 100644 --- a/src/auth0/management/types/connection_profile_strategy_overrides_enabled_features.py +++ b/src/auth0/management/types/connection_profile_strategy_overrides_enabled_features.py @@ -5,3 +5,6 @@ from .enabled_features_enum import EnabledFeaturesEnum ConnectionProfileStrategyOverridesEnabledFeatures = typing.List[EnabledFeaturesEnum] +""" +Enabled features for a connections profile strategy override. +""" diff --git a/src/auth0/management/types/connection_protocol_binding_saml.py b/src/auth0/management/types/connection_protocol_binding_saml.py index f1bdd70c..54043bef 100644 --- a/src/auth0/management/types/connection_protocol_binding_saml.py +++ b/src/auth0/management/types/connection_protocol_binding_saml.py @@ -3,3 +3,6 @@ from .connection_protocol_binding_enum_saml import ConnectionProtocolBindingEnumSaml ConnectionProtocolBindingSaml = ConnectionProtocolBindingEnumSaml +""" +SAML protocol binding mechanism for sending authentication requests to the identity provider. +""" diff --git a/src/auth0/management/types/connection_provider_sms.py b/src/auth0/management/types/connection_provider_sms.py index e9cdf96c..1b39cbf4 100644 --- a/src/auth0/management/types/connection_provider_sms.py +++ b/src/auth0/management/types/connection_provider_sms.py @@ -3,3 +3,6 @@ from .connection_provider_enum_sms import ConnectionProviderEnumSms ConnectionProviderSms = ConnectionProviderEnumSms +""" +SMS provider. Set to 'sms_gateway' to use a custom SMS gateway instead of Twilio. +""" diff --git a/src/auth0/management/types/connection_provisioning_ticket_url.py b/src/auth0/management/types/connection_provisioning_ticket_url.py index 611b975a..243cd9c8 100644 --- a/src/auth0/management/types/connection_provisioning_ticket_url.py +++ b/src/auth0/management/types/connection_provisioning_ticket_url.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionProvisioningTicketUrl = str +""" +A ticket URL used for provisioning the connection +""" diff --git a/src/auth0/management/types/connection_realm_fallback.py b/src/auth0/management/types/connection_realm_fallback.py index 7b2966a9..73fc059a 100644 --- a/src/auth0/management/types/connection_realm_fallback.py +++ b/src/auth0/management/types/connection_realm_fallback.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRealmFallback = bool +""" +Indicates whether to use realm fallback. +""" diff --git a/src/auth0/management/types/connection_realms.py b/src/auth0/management/types/connection_realms.py index d48ce122..d79f0e8a 100644 --- a/src/auth0/management/types/connection_realms.py +++ b/src/auth0/management/types/connection_realms.py @@ -3,3 +3,6 @@ import typing ConnectionRealms = typing.List[str] +""" +Defines the realms for which the connection will be used (ie: email domains). If the array is empty or the property is not specified, the connection name will be added as realm. +""" diff --git a/src/auth0/management/types/connection_recipient_url_saml.py b/src/auth0/management/types/connection_recipient_url_saml.py index 047b8889..5b57fa6f 100644 --- a/src/auth0/management/types/connection_recipient_url_saml.py +++ b/src/auth0/management/types/connection_recipient_url_saml.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionRecipientUrlSaml = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL where Auth0 will send SAML authentication requests (the Identity Provider's SSO URL). Must be a valid HTTPS URL. +""" diff --git a/src/auth0/management/types/connection_request_object_encryption_alg_values_supported.py b/src/auth0/management/types/connection_request_object_encryption_alg_values_supported.py index 8c2177b2..0bac3c33 100644 --- a/src/auth0/management/types/connection_request_object_encryption_alg_values_supported.py +++ b/src/auth0/management/types/connection_request_object_encryption_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionRequestObjectEncryptionAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE encryption algorithms (alg values) supported by the OP for Request Objects. These algorithms are used both when the Request Object is passed by value and when it is passed by reference. +""" diff --git a/src/auth0/management/types/connection_request_object_encryption_enc_values_supported.py b/src/auth0/management/types/connection_request_object_encryption_enc_values_supported.py index 1d779374..c7f65bee 100644 --- a/src/auth0/management/types/connection_request_object_encryption_enc_values_supported.py +++ b/src/auth0/management/types/connection_request_object_encryption_enc_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionRequestObjectEncryptionEncValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE encryption algorithms (enc values) supported by the OP for Request Objects. These algorithms are used both when the Request Object is passed by value and when it is passed by reference. +""" diff --git a/src/auth0/management/types/connection_request_object_signing_alg_values_supported.py b/src/auth0/management/types/connection_request_object_signing_alg_values_supported.py index a0d0760b..e16b3775 100644 --- a/src/auth0/management/types/connection_request_object_signing_alg_values_supported.py +++ b/src/auth0/management/types/connection_request_object_signing_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionRequestObjectSigningAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWS signing algorithms (alg values) supported by the OP for Request Objects, which are described in Section 6.1 of OpenID Connect Core 1.0 [OpenID.Core]. These algorithms are used both when the Request Object is passed by value (using the request parameter) and when it is passed by reference (using the request_uri parameter). Servers SHOULD support none and RS256. +""" diff --git a/src/auth0/management/types/connection_request_parameter_supported.py b/src/auth0/management/types/connection_request_parameter_supported.py index 753dd7a7..a309da56 100644 --- a/src/auth0/management/types/connection_request_parameter_supported.py +++ b/src/auth0/management/types/connection_request_parameter_supported.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRequestParameterSupported = bool +""" +Boolean value specifying whether the OP supports use of the request parameter, with true indicating support. If omitted, the default value is false. +""" diff --git a/src/auth0/management/types/connection_request_template_saml.py b/src/auth0/management/types/connection_request_template_saml.py index c3f2b17c..57ac2814 100644 --- a/src/auth0/management/types/connection_request_template_saml.py +++ b/src/auth0/management/types/connection_request_template_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRequestTemplateSaml = str +""" +Custom XML template for SAML authentication requests. Supports variable substitution using @@variableName@@ syntax. When not provided, uses default SAML AuthnRequest template. See https://auth0.com/docs/authenticate/protocols/saml/saml-sso-integrations/configure-auth0-saml-service-provider#customize-the-request-template +""" diff --git a/src/auth0/management/types/connection_request_token_urlo_auth_1.py b/src/auth0/management/types/connection_request_token_urlo_auth_1.py index 309b6009..7d4e389c 100644 --- a/src/auth0/management/types/connection_request_token_urlo_auth_1.py +++ b/src/auth0/management/types/connection_request_token_urlo_auth_1.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionRequestTokenUrloAuth1 = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL of the OAuth 1.0a request-token endpoint. This endpoint is used to obtain a temporary request token during the OAuth 1.0a authentication flow. +""" diff --git a/src/auth0/management/types/connection_request_uri_parameter_supported.py b/src/auth0/management/types/connection_request_uri_parameter_supported.py index cfd52768..be441c4b 100644 --- a/src/auth0/management/types/connection_request_uri_parameter_supported.py +++ b/src/auth0/management/types/connection_request_uri_parameter_supported.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRequestUriParameterSupported = bool +""" +Boolean value specifying whether the OP supports use of the request_uri parameter, with true indicating support. If omitted, the default value is false. +""" diff --git a/src/auth0/management/types/connection_require_request_uri_registration.py b/src/auth0/management/types/connection_require_request_uri_registration.py index 531bc146..6b1fedf6 100644 --- a/src/auth0/management/types/connection_require_request_uri_registration.py +++ b/src/auth0/management/types/connection_require_request_uri_registration.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRequireRequestUriRegistration = bool +""" +Boolean value specifying whether the OP requires use of the request_uri parameter. If omitted, the default value is false. +""" diff --git a/src/auth0/management/types/connection_requires_username.py b/src/auth0/management/types/connection_requires_username.py index a16af9bd..f6ff429d 100644 --- a/src/auth0/management/types/connection_requires_username.py +++ b/src/auth0/management/types/connection_requires_username.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionRequiresUsername = bool +""" +Indicates whether the user is required to provide a username in addition to an email address. +""" diff --git a/src/auth0/management/types/connection_response_modes_supported.py b/src/auth0/management/types/connection_response_modes_supported.py index dde277b9..619ba9e2 100644 --- a/src/auth0/management/types/connection_response_modes_supported.py +++ b/src/auth0/management/types/connection_response_modes_supported.py @@ -3,3 +3,6 @@ import typing ConnectionResponseModesSupported = typing.List[str] +""" +A list of the OAuth 2.0 response_mode values that this OP supports. If omitted, the default for Dynamic OpenID Providers is ["query", "fragment"] +""" diff --git a/src/auth0/management/types/connection_response_types_supported.py b/src/auth0/management/types/connection_response_types_supported.py index e9d40d46..6b80e2be 100644 --- a/src/auth0/management/types/connection_response_types_supported.py +++ b/src/auth0/management/types/connection_response_types_supported.py @@ -3,3 +3,6 @@ import typing ConnectionResponseTypesSupported = typing.List[str] +""" +A list of the OAuth 2.0 response_type values that this OP supports. Dynamic OpenID Providers MUST support the code, id_token, and the token id_token Response Type values +""" diff --git a/src/auth0/management/types/connection_scope_amazon.py b/src/auth0/management/types/connection_scope_amazon.py index db2909ee..ed9a356d 100644 --- a/src/auth0/management/types/connection_scope_amazon.py +++ b/src/auth0/management/types/connection_scope_amazon.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopeAmazon = ConnectionScopeArray +""" +OAuth 2.0 scopes that will be requested from Amazon during authorization. This is automatically populated based on the profile and postal_code settings, plus any freeform_scopes. +""" diff --git a/src/auth0/management/types/connection_scope_array.py b/src/auth0/management/types/connection_scope_array.py index 93a278e3..26491d5d 100644 --- a/src/auth0/management/types/connection_scope_array.py +++ b/src/auth0/management/types/connection_scope_array.py @@ -5,3 +5,6 @@ from .connection_scope_item import ConnectionScopeItem ConnectionScopeArray = typing.List[ConnectionScopeItem] +""" +Array of custom OAuth 2.0 scopes to request during authentication. +""" diff --git a/src/auth0/management/types/connection_scope_array_facebook.py b/src/auth0/management/types/connection_scope_array_facebook.py index 13bbefeb..9b3fd17a 100644 --- a/src/auth0/management/types/connection_scope_array_facebook.py +++ b/src/auth0/management/types/connection_scope_array_facebook.py @@ -5,3 +5,6 @@ from .connection_scope_item import ConnectionScopeItem ConnectionScopeArrayFacebook = typing.List[ConnectionScopeItem] +""" +Array of custom OAuth 2.0 scopes to request during authentication. +""" diff --git a/src/auth0/management/types/connection_scope_array_windows_live.py b/src/auth0/management/types/connection_scope_array_windows_live.py index 26ab4d0c..08443d31 100644 --- a/src/auth0/management/types/connection_scope_array_windows_live.py +++ b/src/auth0/management/types/connection_scope_array_windows_live.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopeArrayWindowsLive = ConnectionScopeArray +""" +Array of custom OAuth 2.0 scopes to request during authentication. +""" diff --git a/src/auth0/management/types/connection_scope_azure_ad.py b/src/auth0/management/types/connection_scope_azure_ad.py index d8ec5f00..3d94b4e6 100644 --- a/src/auth0/management/types/connection_scope_azure_ad.py +++ b/src/auth0/management/types/connection_scope_azure_ad.py @@ -3,3 +3,6 @@ import typing ConnectionScopeAzureAd = typing.List[str] +""" +OAuth 2.0 scopes to request from Azure AD during authentication. Each scope represents a permission (e.g., 'User.Read', 'Group.Read.All'). Only applies with Microsoft Identity Platform v2.0. See Microsoft Graph permissions reference for available scopes. +""" diff --git a/src/auth0/management/types/connection_scope_facebook.py b/src/auth0/management/types/connection_scope_facebook.py index 04ba1e1f..50322a9e 100644 --- a/src/auth0/management/types/connection_scope_facebook.py +++ b/src/auth0/management/types/connection_scope_facebook.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionScopeFacebook = str +""" +Computed comma-separated OAuth scope string sent to Facebook. +""" diff --git a/src/auth0/management/types/connection_scope_google_apps.py b/src/auth0/management/types/connection_scope_google_apps.py index 79b536ac..eb11672b 100644 --- a/src/auth0/management/types/connection_scope_google_apps.py +++ b/src/auth0/management/types/connection_scope_google_apps.py @@ -5,3 +5,6 @@ from .connection_scope_item_google_apps import ConnectionScopeItemGoogleApps ConnectionScopeGoogleApps = typing.List[ConnectionScopeItemGoogleApps] +""" +Additional OAuth scopes requested beyond the default `email profile` scopes; ignored unless `allow_setting_login_scopes` is true. +""" diff --git a/src/auth0/management/types/connection_scope_google_o_auth_2.py b/src/auth0/management/types/connection_scope_google_o_auth_2.py index 977e5ef9..0480c43e 100644 --- a/src/auth0/management/types/connection_scope_google_o_auth_2.py +++ b/src/auth0/management/types/connection_scope_google_o_auth_2.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopeGoogleOAuth2 = ConnectionScopeArray +""" +Array of OAuth 2.0 scopes requested during Google authentication. +""" diff --git a/src/auth0/management/types/connection_scope_item.py b/src/auth0/management/types/connection_scope_item.py index bd24ba0e..d902618e 100644 --- a/src/auth0/management/types/connection_scope_item.py +++ b/src/auth0/management/types/connection_scope_item.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionScopeItem = str +""" +A single OAuth 2.0 scope string +""" diff --git a/src/auth0/management/types/connection_scope_item_google_apps.py b/src/auth0/management/types/connection_scope_item_google_apps.py index ed34c841..1fe4972d 100644 --- a/src/auth0/management/types/connection_scope_item_google_apps.py +++ b/src/auth0/management/types/connection_scope_item_google_apps.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionScopeItemGoogleApps = str +""" +An OAuth scope string. +""" diff --git a/src/auth0/management/types/connection_scope_linkedin.py b/src/auth0/management/types/connection_scope_linkedin.py index be220efb..07b7f469 100644 --- a/src/auth0/management/types/connection_scope_linkedin.py +++ b/src/auth0/management/types/connection_scope_linkedin.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopeLinkedin = ConnectionScopeArray +""" +Scopes to request from LinkedIn during OAuth. Use standard scopes such as r_liteprofile and r_emailaddress; legacy or partner scopes (e.g., r_basicprofile, r_fullprofile, rw_company_admin) may require LinkedIn approval and may not be available to new apps. +""" diff --git a/src/auth0/management/types/connection_scope_oidc.py b/src/auth0/management/types/connection_scope_oidc.py index 283ef1a9..9331e788 100644 --- a/src/auth0/management/types/connection_scope_oidc.py +++ b/src/auth0/management/types/connection_scope_oidc.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionScopeOidc = str +""" +Space-separated list of OAuth 2.0 scopes requested during authorization. Must include 'openid' (required by OIDC spec). Common values: 'openid profile email'. Additional scopes depend on the identity provider. +""" diff --git a/src/auth0/management/types/connection_scope_paypal.py b/src/auth0/management/types/connection_scope_paypal.py index 2491b23e..43c951f1 100644 --- a/src/auth0/management/types/connection_scope_paypal.py +++ b/src/auth0/management/types/connection_scope_paypal.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopePaypal = ConnectionScopeArray +""" +OAuth 2.0 scopes requested from PayPal during authorization. Built automatically from the enabled attribute flags (profile, email, address, phone) plus any freeform_scopes. Always includes 'openid' as the base scope. +""" diff --git a/src/auth0/management/types/connection_scope_salesforce.py b/src/auth0/management/types/connection_scope_salesforce.py index 47357fc6..a2f65e60 100644 --- a/src/auth0/management/types/connection_scope_salesforce.py +++ b/src/auth0/management/types/connection_scope_salesforce.py @@ -3,3 +3,6 @@ from .connection_scope_array import ConnectionScopeArray ConnectionScopeSalesforce = ConnectionScopeArray +""" +OAuth scopes to request from Salesforce. This is computed from enabled permission options and any additional freeform scopes. +""" diff --git a/src/auth0/management/types/connection_scopes_supported.py b/src/auth0/management/types/connection_scopes_supported.py index 2303a355..a8fbe40a 100644 --- a/src/auth0/management/types/connection_scopes_supported.py +++ b/src/auth0/management/types/connection_scopes_supported.py @@ -3,3 +3,6 @@ import typing ConnectionScopesSupported = typing.Optional[typing.List[str]] +""" +A list of the OAuth 2.0 [RFC6749] scope values that this server supports. The server MUST support the openid scope value. Servers MAY choose not to advertise some supported scope values even when this parameter is used, although those defined in [OpenID.Core] SHOULD be listed, if supported. RECOMMENDED but not REQUIRED +""" diff --git a/src/auth0/management/types/connection_send_back_channel_nonce.py b/src/auth0/management/types/connection_send_back_channel_nonce.py index 62f34be8..7e977e8a 100644 --- a/src/auth0/management/types/connection_send_back_channel_nonce.py +++ b/src/auth0/management/types/connection_send_back_channel_nonce.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSendBackChannelNonce = bool +""" +When true and type is 'back_channel', includes a cryptographic nonce in authorization requests to prevent replay attacks. The identity provider must include this nonce in the ID token for validation. +""" diff --git a/src/auth0/management/types/connection_sha_1_thumbprint.py b/src/auth0/management/types/connection_sha_1_thumbprint.py index e5ac828f..6805d44d 100644 --- a/src/auth0/management/types/connection_sha_1_thumbprint.py +++ b/src/auth0/management/types/connection_sha_1_thumbprint.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSha1Thumbprint = str +""" +SHA-1 thumbprint of the certificate +""" diff --git a/src/auth0/management/types/connection_show_as_button.py b/src/auth0/management/types/connection_show_as_button.py index abac91df..3eab3271 100644 --- a/src/auth0/management/types/connection_show_as_button.py +++ b/src/auth0/management/types/connection_show_as_button.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionShowAsButton = bool +""" +Enables showing a button for the connection in the login page (new experience only). If false, it will be usable only by HRD. Defaults to `false`. +""" diff --git a/src/auth0/management/types/connection_sign_in_endpoint_ad.py b/src/auth0/management/types/connection_sign_in_endpoint_ad.py index 858a77b7..de492dd1 100644 --- a/src/auth0/management/types/connection_sign_in_endpoint_ad.py +++ b/src/auth0/management/types/connection_sign_in_endpoint_ad.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionSignInEndpointAd = ConnectionHttpsUrlWithHttpFallback255 +""" +The sign-in endpoint type for the AD-LDAP connector agent (managed by the AD Connector agent). +""" diff --git a/src/auth0/management/types/connection_sign_in_endpoint_adfs.py b/src/auth0/management/types/connection_sign_in_endpoint_adfs.py index dedd58cb..f772a386 100644 --- a/src/auth0/management/types/connection_sign_in_endpoint_adfs.py +++ b/src/auth0/management/types/connection_sign_in_endpoint_adfs.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_2048 import ConnectionHttpsUrlWithHttpFallback2048 ConnectionSignInEndpointAdfs = ConnectionHttpsUrlWithHttpFallback2048 +""" +Passive Requestor (WS-Fed) sign-in endpoint discovered from metadata or provided explicitly. +""" diff --git a/src/auth0/management/types/connection_sign_in_endpoint_saml.py b/src/auth0/management/types/connection_sign_in_endpoint_saml.py index da782a5d..dd77c839 100644 --- a/src/auth0/management/types/connection_sign_in_endpoint_saml.py +++ b/src/auth0/management/types/connection_sign_in_endpoint_saml.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_2048 import ConnectionHttpsUrlWithHttpFallback2048 ConnectionSignInEndpointSaml = ConnectionHttpsUrlWithHttpFallback2048 +""" +Identity provider's SAML SingleSignOnService endpoint URL where Auth0 sends SAML authentication requests. This is the primary login URL for the SAML connection. Required unless using metadataUrl or metadataXml. +""" diff --git a/src/auth0/management/types/connection_sign_out_endpoint_saml.py b/src/auth0/management/types/connection_sign_out_endpoint_saml.py index 997902a7..3a4d93d3 100644 --- a/src/auth0/management/types/connection_sign_out_endpoint_saml.py +++ b/src/auth0/management/types/connection_sign_out_endpoint_saml.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_2048 import ConnectionHttpsUrlWithHttpFallback2048 ConnectionSignOutEndpointSaml = ConnectionHttpsUrlWithHttpFallback2048 +""" +Identity provider's SAML SingleLogoutService endpoint URL where Auth0 sends logout requests for federated sign-out. When not provided, defaults to signInEndpoint. Only used if disableSignout is false. +""" diff --git a/src/auth0/management/types/connection_sign_saml_request_saml.py b/src/auth0/management/types/connection_sign_saml_request_saml.py index d07e5637..460d1fc8 100644 --- a/src/auth0/management/types/connection_sign_saml_request_saml.py +++ b/src/auth0/management/types/connection_sign_saml_request_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSignSamlRequestSaml = bool +""" +When true, Auth0 signs SAML authentication requests using the connection's signing key. The signature includes the request's digest and is validated by the identity provider. Defaults to false (unsigned requests). +""" diff --git a/src/auth0/management/types/connection_signature_algorithm_saml.py b/src/auth0/management/types/connection_signature_algorithm_saml.py index 56cfc633..ca4f49f7 100644 --- a/src/auth0/management/types/connection_signature_algorithm_saml.py +++ b/src/auth0/management/types/connection_signature_algorithm_saml.py @@ -3,3 +3,6 @@ from .connection_signature_algorithm_enum_saml import ConnectionSignatureAlgorithmEnumSaml ConnectionSignatureAlgorithmSaml = ConnectionSignatureAlgorithmEnumSaml +""" +Algorithm used to sign SAML authentication requests and logout requests using the connection's signing key. Common values: 'rsa-sha256' (RSA signature with SHA-256 digest) or 'rsa-sha1'. Defaults to 'rsa-sha256'. +""" diff --git a/src/auth0/management/types/connection_signing_cert_saml.py b/src/auth0/management/types/connection_signing_cert_saml.py index a91ef6c6..5b1c10d0 100644 --- a/src/auth0/management/types/connection_signing_cert_saml.py +++ b/src/auth0/management/types/connection_signing_cert_saml.py @@ -3,3 +3,6 @@ from .connection_signing_certificate_pem_saml import ConnectionSigningCertificatePemSaml ConnectionSigningCertSaml = ConnectionSigningCertificatePemSaml +""" +Base64-encoded X.509 certificate from the identity provider used to validate signatures in SAML responses and assertions. The certificate is decoded and used for cryptographic signature verification. +""" diff --git a/src/auth0/management/types/connection_signing_certificate_der_saml.py b/src/auth0/management/types/connection_signing_certificate_der_saml.py index 762d31a8..87aa8269 100644 --- a/src/auth0/management/types/connection_signing_certificate_der_saml.py +++ b/src/auth0/management/types/connection_signing_certificate_der_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSigningCertificateDerSaml = str +""" +X.509 signing certificate from the identity provider in .der format. Used to validate signatures in SAML Responses and Assertions. This is an alternative to signingCert and is kept for backward compatibility. Prefer using signingCert instead. +""" diff --git a/src/auth0/management/types/connection_signing_certificate_pem_ping_federate.py b/src/auth0/management/types/connection_signing_certificate_pem_ping_federate.py index 3323e991..ab6b7b30 100644 --- a/src/auth0/management/types/connection_signing_certificate_pem_ping_federate.py +++ b/src/auth0/management/types/connection_signing_certificate_pem_ping_federate.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSigningCertificatePemPingFederate = str +""" +Base64-encoded X.509 certificate from the identity provider used to validate signatures in SAML responses and assertions. The certificate is decoded and used for cryptographic signature verification. +""" diff --git a/src/auth0/management/types/connection_signing_certificate_pem_saml.py b/src/auth0/management/types/connection_signing_certificate_pem_saml.py index 86eca469..6beb1be4 100644 --- a/src/auth0/management/types/connection_signing_certificate_pem_saml.py +++ b/src/auth0/management/types/connection_signing_certificate_pem_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionSigningCertificatePemSaml = str +""" +Base64-encoded X.509 certificate from the identity provider used to validate signatures in SAML responses and assertions. The certificate is decoded and used for cryptographic signature verification. +""" diff --git a/src/auth0/management/types/connection_strategy_version_enum_windows_live.py b/src/auth0/management/types/connection_strategy_version_enum_windows_live.py index 1d7ac165..616c825f 100644 --- a/src/auth0/management/types/connection_strategy_version_enum_windows_live.py +++ b/src/auth0/management/types/connection_strategy_version_enum_windows_live.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionStrategyVersionEnumWindowsLive = int +""" +Version number of the windowslive strategy implementation. +""" diff --git a/src/auth0/management/types/connection_subject_types_supported.py b/src/auth0/management/types/connection_subject_types_supported.py index fb4ecde2..2fe6b2ea 100644 --- a/src/auth0/management/types/connection_subject_types_supported.py +++ b/src/auth0/management/types/connection_subject_types_supported.py @@ -3,3 +3,6 @@ import typing ConnectionSubjectTypesSupported = typing.List[str] +""" +A list of the Subject Identifier types that this OP supports. Valid types include pairwise and public +""" diff --git a/src/auth0/management/types/connection_template_sms.py b/src/auth0/management/types/connection_template_sms.py index 939fbfdb..203b4c20 100644 --- a/src/auth0/management/types/connection_template_sms.py +++ b/src/auth0/management/types/connection_template_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTemplateSms = str +""" +SMS message template. Use `@@password@@` as a placeholder for the verification code. +""" diff --git a/src/auth0/management/types/connection_tenant_domain.py b/src/auth0/management/types/connection_tenant_domain.py index 20251b76..813bb0a8 100644 --- a/src/auth0/management/types/connection_tenant_domain.py +++ b/src/auth0/management/types/connection_tenant_domain.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTenantDomain = str +""" +Tenant domain +""" diff --git a/src/auth0/management/types/connection_tenant_domain_ad.py b/src/auth0/management/types/connection_tenant_domain_ad.py index c550c8da..619d18da 100644 --- a/src/auth0/management/types/connection_tenant_domain_ad.py +++ b/src/auth0/management/types/connection_tenant_domain_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTenantDomainAd = str +""" +Primary AD domain hint used for HRD and discovery. +""" diff --git a/src/auth0/management/types/connection_tenant_domain_google_apps.py b/src/auth0/management/types/connection_tenant_domain_google_apps.py index 1f3c1016..b7ea9e6d 100644 --- a/src/auth0/management/types/connection_tenant_domain_google_apps.py +++ b/src/auth0/management/types/connection_tenant_domain_google_apps.py @@ -3,3 +3,6 @@ from .connection_tenant_domain import ConnectionTenantDomain ConnectionTenantDomainGoogleApps = ConnectionTenantDomain +""" +The Google Workspace primary domain used to identify the organization during authentication. +""" diff --git a/src/auth0/management/types/connection_tenant_id_azure_ad.py b/src/auth0/management/types/connection_tenant_id_azure_ad.py index 2a9c9e52..ff1ca4a5 100644 --- a/src/auth0/management/types/connection_tenant_id_azure_ad.py +++ b/src/auth0/management/types/connection_tenant_id_azure_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTenantIdAzureAd = str +""" +The Azure AD tenant ID as a UUID. The unique identifier for your Azure AD organization. Must be a valid 36-character UUID. +""" diff --git a/src/auth0/management/types/connection_thumbprints.py b/src/auth0/management/types/connection_thumbprints.py index d57a6b9d..fff89341 100644 --- a/src/auth0/management/types/connection_thumbprints.py +++ b/src/auth0/management/types/connection_thumbprints.py @@ -3,3 +3,6 @@ import typing ConnectionThumbprints = typing.List[str] +""" +Array of certificate thumbprints (SHA-128/SHA-256/SHA-512 hex hashes) for validating SAML signatures. Used with WS-Federation protocol. Maximum 20 thumbprints. Each thumbprint must be a hexadecimal string. +""" diff --git a/src/auth0/management/types/connection_thumbprints_ad.py b/src/auth0/management/types/connection_thumbprints_ad.py index 35452d90..f76a00f1 100644 --- a/src/auth0/management/types/connection_thumbprints_ad.py +++ b/src/auth0/management/types/connection_thumbprints_ad.py @@ -5,3 +5,6 @@ from .connection_sha_1_thumbprint import ConnectionSha1Thumbprint ConnectionThumbprintsAd = typing.List[ConnectionSha1Thumbprint] +""" +Array of certificate SHA-1 thumbprints for validating signatures. Managed by Auth0 when using the AD Connector agent. +""" diff --git a/src/auth0/management/types/connection_thumbprints_saml.py b/src/auth0/management/types/connection_thumbprints_saml.py index d4293f40..7193b408 100644 --- a/src/auth0/management/types/connection_thumbprints_saml.py +++ b/src/auth0/management/types/connection_thumbprints_saml.py @@ -5,3 +5,6 @@ from .connection_sha_1_thumbprint import ConnectionSha1Thumbprint ConnectionThumbprintsSaml = typing.List[ConnectionSha1Thumbprint] +""" +SHA-1 thumbprints (fingerprints) of the identity provider's signing certificates. Automatically computed from signingCert during connection creation. Each thumbprint must be a 40-character hexadecimal string. +""" diff --git a/src/auth0/management/types/connection_token_endpoint_auth_methods_supported.py b/src/auth0/management/types/connection_token_endpoint_auth_methods_supported.py index 058278ab..703e3bdf 100644 --- a/src/auth0/management/types/connection_token_endpoint_auth_methods_supported.py +++ b/src/auth0/management/types/connection_token_endpoint_auth_methods_supported.py @@ -3,3 +3,6 @@ import typing ConnectionTokenEndpointAuthMethodsSupported = typing.List[str] +""" +JSON array containing a list of Client Authentication methods supported by this Token Endpoint. The options are client_secret_post, client_secret_basic, client_secret_jwt, and private_key_jwt, as described in Section 9 of OpenID Connect Core 1.0 [OpenID.Core]. Other authentication methods MAY be defined by extensions. If omitted, the default is client_secret_basic -- the HTTP Basic Authentication Scheme specified in Section 2.3.1 of OAuth 2.0 [RFC6749]. +""" diff --git a/src/auth0/management/types/connection_token_endpoint_auth_signing_alg_values_supported.py b/src/auth0/management/types/connection_token_endpoint_auth_signing_alg_values_supported.py index 0dec5960..36680818 100644 --- a/src/auth0/management/types/connection_token_endpoint_auth_signing_alg_values_supported.py +++ b/src/auth0/management/types/connection_token_endpoint_auth_signing_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionTokenEndpointAuthSigningAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWS signing algorithms (alg values) supported by the Token Endpoint for the signature on the JWT [JWT] used to authenticate the Client at the Token Endpoint for the private_key_jwt and client_secret_jwt authentication methods. Servers SHOULD support RS256. The value none MUST NOT be used. +""" diff --git a/src/auth0/management/types/connection_totp_length_email.py b/src/auth0/management/types/connection_totp_length_email.py index 21b846d5..1d79cd72 100644 --- a/src/auth0/management/types/connection_totp_length_email.py +++ b/src/auth0/management/types/connection_totp_length_email.py @@ -3,3 +3,6 @@ from .connection_totp_length_passwordless import ConnectionTotpLengthPasswordless ConnectionTotpLengthEmail = ConnectionTotpLengthPasswordless +""" +Length of the TOTP code +""" diff --git a/src/auth0/management/types/connection_totp_length_passwordless.py b/src/auth0/management/types/connection_totp_length_passwordless.py index 85541da0..67eed572 100644 --- a/src/auth0/management/types/connection_totp_length_passwordless.py +++ b/src/auth0/management/types/connection_totp_length_passwordless.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTotpLengthPasswordless = int +""" +Length of the TOTP code +""" diff --git a/src/auth0/management/types/connection_totp_length_sms.py b/src/auth0/management/types/connection_totp_length_sms.py index 65ecfa63..57ddf3c4 100644 --- a/src/auth0/management/types/connection_totp_length_sms.py +++ b/src/auth0/management/types/connection_totp_length_sms.py @@ -3,3 +3,6 @@ from .connection_totp_length_passwordless import ConnectionTotpLengthPasswordless ConnectionTotpLengthSms = ConnectionTotpLengthPasswordless +""" +Number of digits in the verification code +""" diff --git a/src/auth0/management/types/connection_totp_time_step_email.py b/src/auth0/management/types/connection_totp_time_step_email.py index 3e9c4c73..e7222753 100644 --- a/src/auth0/management/types/connection_totp_time_step_email.py +++ b/src/auth0/management/types/connection_totp_time_step_email.py @@ -3,3 +3,6 @@ from .connection_totp_time_step_passwordless import ConnectionTotpTimeStepPasswordless ConnectionTotpTimeStepEmail = ConnectionTotpTimeStepPasswordless +""" +Time step for TOTP in seconds +""" diff --git a/src/auth0/management/types/connection_totp_time_step_passwordless.py b/src/auth0/management/types/connection_totp_time_step_passwordless.py index ed5f18f8..0eed7a40 100644 --- a/src/auth0/management/types/connection_totp_time_step_passwordless.py +++ b/src/auth0/management/types/connection_totp_time_step_passwordless.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTotpTimeStepPasswordless = int +""" +Time step for TOTP in seconds +""" diff --git a/src/auth0/management/types/connection_totp_time_step_sms.py b/src/auth0/management/types/connection_totp_time_step_sms.py index ed70818d..c71c0b46 100644 --- a/src/auth0/management/types/connection_totp_time_step_sms.py +++ b/src/auth0/management/types/connection_totp_time_step_sms.py @@ -3,3 +3,6 @@ from .connection_totp_time_step_passwordless import ConnectionTotpTimeStepPasswordless ConnectionTotpTimeStepSms = ConnectionTotpTimeStepPasswordless +""" +Code validity duration in seconds +""" diff --git a/src/auth0/management/types/connection_twilio_sid_sms.py b/src/auth0/management/types/connection_twilio_sid_sms.py index cd8aad5e..4115b079 100644 --- a/src/auth0/management/types/connection_twilio_sid_sms.py +++ b/src/auth0/management/types/connection_twilio_sid_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTwilioSidSms = str +""" +Twilio Account SID +""" diff --git a/src/auth0/management/types/connection_twilio_token_sms.py b/src/auth0/management/types/connection_twilio_token_sms.py index 2f106677..b3c71865 100644 --- a/src/auth0/management/types/connection_twilio_token_sms.py +++ b/src/auth0/management/types/connection_twilio_token_sms.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionTwilioTokenSms = str +""" +Twilio Auth Token +""" diff --git a/src/auth0/management/types/connection_ui_locales_supported.py b/src/auth0/management/types/connection_ui_locales_supported.py index 3f8c1c13..862ba411 100644 --- a/src/auth0/management/types/connection_ui_locales_supported.py +++ b/src/auth0/management/types/connection_ui_locales_supported.py @@ -3,3 +3,6 @@ import typing ConnectionUiLocalesSupported = typing.List[str] +""" +Languages and scripts supported for the user interface, represented as a JSON array of BCP47 [RFC5646] language tag values. +""" diff --git a/src/auth0/management/types/connection_upstream_params.py b/src/auth0/management/types/connection_upstream_params.py index 5dfc1859..fcf1618f 100644 --- a/src/auth0/management/types/connection_upstream_params.py +++ b/src/auth0/management/types/connection_upstream_params.py @@ -5,3 +5,6 @@ from .connection_upstream_additional_properties import ConnectionUpstreamAdditionalProperties ConnectionUpstreamParams = typing.Optional[typing.Dict[str, typing.Optional[ConnectionUpstreamAdditionalProperties]]] +""" +Options for adding parameters in the request to the upstream IdP +""" diff --git a/src/auth0/management/types/connection_upstream_params_facebook.py b/src/auth0/management/types/connection_upstream_params_facebook.py index 53f39254..032c3400 100644 --- a/src/auth0/management/types/connection_upstream_params_facebook.py +++ b/src/auth0/management/types/connection_upstream_params_facebook.py @@ -5,3 +5,6 @@ from .connection_upstream_additional_properties import ConnectionUpstreamAdditionalProperties ConnectionUpstreamParamsFacebook = typing.Dict[str, ConnectionUpstreamAdditionalProperties] +""" +Options for adding parameters in the request to the upstream IdP. See https://auth0.com/docs/authenticate/identity-providers/pass-parameters-to-idps +""" diff --git a/src/auth0/management/types/connection_use_common_endpoint_azure_ad.py b/src/auth0/management/types/connection_use_common_endpoint_azure_ad.py index b04c1adf..5131fd43 100644 --- a/src/auth0/management/types/connection_use_common_endpoint_azure_ad.py +++ b/src/auth0/management/types/connection_use_common_endpoint_azure_ad.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionUseCommonEndpointAzureAd = bool +""" +When enabled (true), uses the Azure AD common endpoint for multi-tenant authentication. Allows users from any Azure AD organization to sign in. Requires userid_attribute set to 'sub' (not 'oid'). Cannot be used with SCIM provisioning. Defaults to false. +""" diff --git a/src/auth0/management/types/connection_user_authorization_urlo_auth_1.py b/src/auth0/management/types/connection_user_authorization_urlo_auth_1.py index 74755abb..4ed3ed0a 100644 --- a/src/auth0/management/types/connection_user_authorization_urlo_auth_1.py +++ b/src/auth0/management/types/connection_user_authorization_urlo_auth_1.py @@ -3,3 +3,6 @@ from .connection_https_url_with_http_fallback_255 import ConnectionHttpsUrlWithHttpFallback255 ConnectionUserAuthorizationUrloAuth1 = ConnectionHttpsUrlWithHttpFallback255 +""" +The URL of the OAuth 1.0a user-authorization endpoint. This endpoint is used to redirect users to the provider's site to authorize the temporary request token obtained from the request-token endpoint during the OAuth 1.0a authentication flow. +""" diff --git a/src/auth0/management/types/connection_user_id_attribute_saml.py b/src/auth0/management/types/connection_user_id_attribute_saml.py index fde2406d..7e8b091d 100644 --- a/src/auth0/management/types/connection_user_id_attribute_saml.py +++ b/src/auth0/management/types/connection_user_id_attribute_saml.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ConnectionUserIdAttributeSaml = str +""" +Custom SAML assertion attribute to use as the unique user identifier. When provided, this attribute is prepended to the default user_id mapping list with highest priority. Accepts a string (single SAML attribute name). +""" diff --git a/src/auth0/management/types/connection_userid_attribute_azure_ad.py b/src/auth0/management/types/connection_userid_attribute_azure_ad.py index bbe76bb1..2c4407c1 100644 --- a/src/auth0/management/types/connection_userid_attribute_azure_ad.py +++ b/src/auth0/management/types/connection_userid_attribute_azure_ad.py @@ -3,3 +3,6 @@ from .connection_userid_attribute_enum_azure_ad import ConnectionUseridAttributeEnumAzureAd ConnectionUseridAttributeAzureAd = ConnectionUseridAttributeEnumAzureAd +""" +The Azure AD claim to use as the unique user identifier. 'oid' (Object ID) is recommended for single-tenant connections and required for SCIM. 'sub' (Subject) is required for multi-tenant/common endpoint. Only applies with OpenID Connect protocol. +""" diff --git a/src/auth0/management/types/connection_userinfo_encryption_alg_values_supported.py b/src/auth0/management/types/connection_userinfo_encryption_alg_values_supported.py index 703ac5c0..961482cf 100644 --- a/src/auth0/management/types/connection_userinfo_encryption_alg_values_supported.py +++ b/src/auth0/management/types/connection_userinfo_encryption_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionUserinfoEncryptionAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE [JWE] encryption algorithms (alg values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT]. +""" diff --git a/src/auth0/management/types/connection_userinfo_encryption_enc_values_supported.py b/src/auth0/management/types/connection_userinfo_encryption_enc_values_supported.py index eb37978e..6a4011fe 100644 --- a/src/auth0/management/types/connection_userinfo_encryption_enc_values_supported.py +++ b/src/auth0/management/types/connection_userinfo_encryption_enc_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionUserinfoEncryptionEncValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWE encryption algorithms (enc values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT]. +""" diff --git a/src/auth0/management/types/connection_userinfo_signing_alg_values_supported.py b/src/auth0/management/types/connection_userinfo_signing_alg_values_supported.py index 1b4c7312..e04ac05b 100644 --- a/src/auth0/management/types/connection_userinfo_signing_alg_values_supported.py +++ b/src/auth0/management/types/connection_userinfo_signing_alg_values_supported.py @@ -3,3 +3,6 @@ import typing ConnectionUserinfoSigningAlgValuesSupported = typing.List[str] +""" +JSON array containing a list of the JWS [JWS] signing algorithms (alg values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT]. The value none MAY be included. +""" diff --git a/src/auth0/management/types/connection_waad_protocol.py b/src/auth0/management/types/connection_waad_protocol.py index 85f5ec99..12036be9 100644 --- a/src/auth0/management/types/connection_waad_protocol.py +++ b/src/auth0/management/types/connection_waad_protocol.py @@ -3,3 +3,6 @@ from .connection_waad_protocol_enum_azure_ad import ConnectionWaadProtocolEnumAzureAd ConnectionWaadProtocol = ConnectionWaadProtocolEnumAzureAd +""" +The authentication protocol for Azure AD v1 endpoints. 'openid-connect' (default, recommended) uses modern OAuth 2.0/OIDC. 'ws-federation' is a legacy SAML-based protocol for older integrations. Only available with Azure AD v1 API. +""" diff --git a/src/auth0/management/types/connections_metadata.py b/src/auth0/management/types/connections_metadata.py index d034a95a..3e25e29e 100644 --- a/src/auth0/management/types/connections_metadata.py +++ b/src/auth0/management/types/connections_metadata.py @@ -3,3 +3,6 @@ import typing ConnectionsMetadata = typing.Dict[str, typing.Optional[str]] +""" +Metadata associated with the connection in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. +""" diff --git a/src/auth0/management/types/create_client_authentication_method_self_signed_tls_client_auth_credentials.py b/src/auth0/management/types/create_client_authentication_method_self_signed_tls_client_auth_credentials.py index 38ea3b2a..8123c5fa 100644 --- a/src/auth0/management/types/create_client_authentication_method_self_signed_tls_client_auth_credentials.py +++ b/src/auth0/management/types/create_client_authentication_method_self_signed_tls_client_auth_credentials.py @@ -5,3 +5,6 @@ from .x_509_certificate_credential import X509CertificateCredential CreateClientAuthenticationMethodSelfSignedTlsClientAuthCredentials = typing.List[X509CertificateCredential] +""" +Fully defined credentials that will be enabled on the client for mTLS authentication utilizing self-signed certificate. +""" diff --git a/src/auth0/management/types/create_hook_secret_request_content.py b/src/auth0/management/types/create_hook_secret_request_content.py index 75905b7c..0271978f 100644 --- a/src/auth0/management/types/create_hook_secret_request_content.py +++ b/src/auth0/management/types/create_hook_secret_request_content.py @@ -3,3 +3,6 @@ import typing CreateHookSecretRequestContent = typing.Dict[str, str] +""" +Hashmap of key-value pairs where the value must be a string. +""" diff --git a/src/auth0/management/types/delete_hook_secret_request_content.py b/src/auth0/management/types/delete_hook_secret_request_content.py index bd1c1ff1..98a0290c 100644 --- a/src/auth0/management/types/delete_hook_secret_request_content.py +++ b/src/auth0/management/types/delete_hook_secret_request_content.py @@ -3,3 +3,6 @@ import typing DeleteHookSecretRequestContent = typing.List[str] +""" +Array of secret names to delete. +""" diff --git a/src/auth0/management/types/delete_user_identity_response_content.py b/src/auth0/management/types/delete_user_identity_response_content.py index 0e747300..36654eb5 100644 --- a/src/auth0/management/types/delete_user_identity_response_content.py +++ b/src/auth0/management/types/delete_user_identity_response_content.py @@ -5,3 +5,6 @@ from .delete_user_identity_response_content_item import DeleteUserIdentityResponseContentItem DeleteUserIdentityResponseContent = typing.List[DeleteUserIdentityResponseContentItem] +""" +An array of objects with information about the user's identities. +""" diff --git a/src/auth0/management/types/domain_metadata.py b/src/auth0/management/types/domain_metadata.py index da04ff6f..58c5f02e 100644 --- a/src/auth0/management/types/domain_metadata.py +++ b/src/auth0/management/types/domain_metadata.py @@ -3,3 +3,6 @@ import typing DomainMetadata = typing.Dict[str, typing.Optional[str]] +""" +Domain metadata associated with the custom domain, in the form of an object with string values (max 255 chars). Maximum of 10 domain metadata properties allowed. +""" diff --git a/src/auth0/management/types/email_provider_settings.py b/src/auth0/management/types/email_provider_settings.py index f9c75e5f..2cf78d12 100644 --- a/src/auth0/management/types/email_provider_settings.py +++ b/src/auth0/management/types/email_provider_settings.py @@ -3,3 +3,6 @@ import typing EmailProviderSettings = typing.Dict[str, typing.Any] +""" +Specific provider setting +""" diff --git a/src/auth0/management/types/email_smtp_host.py b/src/auth0/management/types/email_smtp_host.py index 18c25e77..23473571 100644 --- a/src/auth0/management/types/email_smtp_host.py +++ b/src/auth0/management/types/email_smtp_host.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. EmailSmtpHost = str +""" +SMTP host. +""" diff --git a/src/auth0/management/types/email_specific_provider_settings_with_additional_properties.py b/src/auth0/management/types/email_specific_provider_settings_with_additional_properties.py index 1f79bb9e..ee9f7d45 100644 --- a/src/auth0/management/types/email_specific_provider_settings_with_additional_properties.py +++ b/src/auth0/management/types/email_specific_provider_settings_with_additional_properties.py @@ -3,3 +3,6 @@ import typing EmailSpecificProviderSettingsWithAdditionalProperties = typing.Optional[typing.Dict[str, typing.Any]] +""" +Specific provider setting +""" diff --git a/src/auth0/management/types/flow_execution_debug.py b/src/auth0/management/types/flow_execution_debug.py index 4699a62d..deb92707 100644 --- a/src/auth0/management/types/flow_execution_debug.py +++ b/src/auth0/management/types/flow_execution_debug.py @@ -3,3 +3,6 @@ import typing FlowExecutionDebug = typing.Dict[str, typing.Any] +""" +Flow execution debug. +""" diff --git a/src/auth0/management/types/get_active_users_count_stats_response_content.py b/src/auth0/management/types/get_active_users_count_stats_response_content.py index 1c26dfcd..e1314ad4 100644 --- a/src/auth0/management/types/get_active_users_count_stats_response_content.py +++ b/src/auth0/management/types/get_active_users_count_stats_response_content.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. GetActiveUsersCountStatsResponseContent = float +""" +Number of active users in the last 30 days. +""" diff --git a/src/auth0/management/types/get_custom_texts_by_language_response_content.py b/src/auth0/management/types/get_custom_texts_by_language_response_content.py index d9fe0872..d5c43a06 100644 --- a/src/auth0/management/types/get_custom_texts_by_language_response_content.py +++ b/src/auth0/management/types/get_custom_texts_by_language_response_content.py @@ -3,3 +3,6 @@ import typing GetCustomTextsByLanguageResponseContent = typing.Dict[str, typing.Any] +""" +An object containing custom dictionaries for a group of screens. +""" diff --git a/src/auth0/management/types/get_hook_secret_response_content.py b/src/auth0/management/types/get_hook_secret_response_content.py index 73d455f7..a945fa53 100644 --- a/src/auth0/management/types/get_hook_secret_response_content.py +++ b/src/auth0/management/types/get_hook_secret_response_content.py @@ -3,3 +3,6 @@ import typing GetHookSecretResponseContent = typing.Dict[str, str] +""" +Hashmap of key-value pairs where the value must be a string. +""" diff --git a/src/auth0/management/types/get_job_user_error.py b/src/auth0/management/types/get_job_user_error.py index d165a6d3..16d4d468 100644 --- a/src/auth0/management/types/get_job_user_error.py +++ b/src/auth0/management/types/get_job_user_error.py @@ -3,3 +3,6 @@ import typing GetJobUserError = typing.Dict[str, typing.Any] +""" +User, as provided in the import file +""" diff --git a/src/auth0/management/types/get_partials_response_content.py b/src/auth0/management/types/get_partials_response_content.py index b78f0808..fc06896d 100644 --- a/src/auth0/management/types/get_partials_response_content.py +++ b/src/auth0/management/types/get_partials_response_content.py @@ -3,3 +3,6 @@ import typing GetPartialsResponseContent = typing.Dict[str, typing.Any] +""" +An object containing template partials for a group of screens. +""" diff --git a/src/auth0/management/types/get_scim_tokens_response_content.py b/src/auth0/management/types/get_scim_tokens_response_content.py index 16ad2524..24aaacf3 100644 --- a/src/auth0/management/types/get_scim_tokens_response_content.py +++ b/src/auth0/management/types/get_scim_tokens_response_content.py @@ -5,3 +5,6 @@ from .scim_token_item import ScimTokenItem GetScimTokensResponseContent = typing.List[ScimTokenItem] +""" +The list of scim tokens for scim clients +""" diff --git a/src/auth0/management/types/guardian_enrollment_date.py b/src/auth0/management/types/guardian_enrollment_date.py index 1a4a974e..66abfd81 100644 --- a/src/auth0/management/types/guardian_enrollment_date.py +++ b/src/auth0/management/types/guardian_enrollment_date.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. GuardianEnrollmentDate = str +""" +Enrollment date and time. +""" diff --git a/src/auth0/management/types/hook_dependencies.py b/src/auth0/management/types/hook_dependencies.py index 7a2fca81..1d15ca5a 100644 --- a/src/auth0/management/types/hook_dependencies.py +++ b/src/auth0/management/types/hook_dependencies.py @@ -3,3 +3,6 @@ import typing HookDependencies = typing.Dict[str, str] +""" +Dependencies of this hook used by webtask server. +""" diff --git a/src/auth0/management/types/list_self_service_profile_custom_text_response_content.py b/src/auth0/management/types/list_self_service_profile_custom_text_response_content.py index bb782c45..edbcd797 100644 --- a/src/auth0/management/types/list_self_service_profile_custom_text_response_content.py +++ b/src/auth0/management/types/list_self_service_profile_custom_text_response_content.py @@ -3,3 +3,6 @@ import typing ListSelfServiceProfileCustomTextResponseContent = typing.Dict[str, str] +""" +The list of custom text keys and values. +""" diff --git a/src/auth0/management/types/log_date_object.py b/src/auth0/management/types/log_date_object.py index 229c7b72..90f0497c 100644 --- a/src/auth0/management/types/log_date_object.py +++ b/src/auth0/management/types/log_date_object.py @@ -3,3 +3,6 @@ import typing LogDateObject = typing.Dict[str, typing.Any] +""" +Date when the event occurred in ISO 8601 format. +""" diff --git a/src/auth0/management/types/log_details.py b/src/auth0/management/types/log_details.py index f3acc5cf..c4264b6d 100644 --- a/src/auth0/management/types/log_details.py +++ b/src/auth0/management/types/log_details.py @@ -3,3 +3,6 @@ import typing LogDetails = typing.Dict[str, typing.Any] +""" +Additional useful details about this event (structure is dependent upon event type). +""" diff --git a/src/auth0/management/types/network_acl_action_allow_enum.py b/src/auth0/management/types/network_acl_action_allow_enum.py index d86d6a03..3e72f15a 100644 --- a/src/auth0/management/types/network_acl_action_allow_enum.py +++ b/src/auth0/management/types/network_acl_action_allow_enum.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. NetworkAclActionAllowEnum = bool +""" +Indicates the rule will allow requests that either match or not_match specific criteria +""" diff --git a/src/auth0/management/types/network_acl_action_block_enum.py b/src/auth0/management/types/network_acl_action_block_enum.py index 779de4e6..0c75f2fb 100644 --- a/src/auth0/management/types/network_acl_action_block_enum.py +++ b/src/auth0/management/types/network_acl_action_block_enum.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. NetworkAclActionBlockEnum = bool +""" +Indicates the rule will block requests that either match or not_match specific criteria +""" diff --git a/src/auth0/management/types/network_acl_action_log_enum.py b/src/auth0/management/types/network_acl_action_log_enum.py index 021ff939..9e17aa86 100644 --- a/src/auth0/management/types/network_acl_action_log_enum.py +++ b/src/auth0/management/types/network_acl_action_log_enum.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. NetworkAclActionLogEnum = bool +""" +Indicates the rule will log requests that either match or not_match specific criteria +""" diff --git a/src/auth0/management/types/network_acl_action_redirect_enum.py b/src/auth0/management/types/network_acl_action_redirect_enum.py index 60f8162b..17a16201 100644 --- a/src/auth0/management/types/network_acl_action_redirect_enum.py +++ b/src/auth0/management/types/network_acl_action_redirect_enum.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. NetworkAclActionRedirectEnum = bool +""" +Indicates the rule will redirect requests that either match or not_match specific criteria +""" diff --git a/src/auth0/management/types/organization_metadata.py b/src/auth0/management/types/organization_metadata.py index 3063a8c7..1442d676 100644 --- a/src/auth0/management/types/organization_metadata.py +++ b/src/auth0/management/types/organization_metadata.py @@ -3,3 +3,6 @@ import typing OrganizationMetadata = typing.Dict[str, typing.Optional[str]] +""" +Metadata associated with the organization, in the form of an object with string values (max 255 chars). Maximum of 25 metadata properties allowed. +""" diff --git a/src/auth0/management/types/refresh_token_date_object.py b/src/auth0/management/types/refresh_token_date_object.py index da0facc6..37c90a6d 100644 --- a/src/auth0/management/types/refresh_token_date_object.py +++ b/src/auth0/management/types/refresh_token_date_object.py @@ -3,3 +3,6 @@ import typing RefreshTokenDateObject = typing.Dict[str, typing.Any] +""" +The date and time when the refresh token was created +""" diff --git a/src/auth0/management/types/refresh_token_metadata.py b/src/auth0/management/types/refresh_token_metadata.py index 08aed06f..c45b52b1 100644 --- a/src/auth0/management/types/refresh_token_metadata.py +++ b/src/auth0/management/types/refresh_token_metadata.py @@ -3,3 +3,6 @@ import typing RefreshTokenMetadata = typing.Optional[typing.Dict[str, typing.Any]] +""" +Metadata associated with the refresh token, in the form of an object with string values (max 255 chars). Maximum of 25 metadata properties allowed. +""" diff --git a/src/auth0/management/types/refresh_token_session_id.py b/src/auth0/management/types/refresh_token_session_id.py index 021c2388..73de5fec 100644 --- a/src/auth0/management/types/refresh_token_session_id.py +++ b/src/auth0/management/types/refresh_token_session_id.py @@ -3,3 +3,6 @@ import typing RefreshTokenSessionId = typing.Optional[str] +""" +ID of the authenticated session used to obtain this refresh-token +""" diff --git a/src/auth0/management/types/resource_server_verification_key_pem_certificate.py b/src/auth0/management/types/resource_server_verification_key_pem_certificate.py index 12259b93..a9081a81 100644 --- a/src/auth0/management/types/resource_server_verification_key_pem_certificate.py +++ b/src/auth0/management/types/resource_server_verification_key_pem_certificate.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. ResourceServerVerificationKeyPemCertificate = str +""" +PEM-encoded certificate +""" diff --git a/src/auth0/management/types/self_service_profile_description.py b/src/auth0/management/types/self_service_profile_description.py index 025f4246..a1afbf1e 100644 --- a/src/auth0/management/types/self_service_profile_description.py +++ b/src/auth0/management/types/self_service_profile_description.py @@ -3,3 +3,6 @@ import typing SelfServiceProfileDescription = typing.Optional[str] +""" +The description of the self-service Profile. +""" diff --git a/src/auth0/management/types/self_service_profile_user_attributes.py b/src/auth0/management/types/self_service_profile_user_attributes.py index fdb2749c..43856176 100644 --- a/src/auth0/management/types/self_service_profile_user_attributes.py +++ b/src/auth0/management/types/self_service_profile_user_attributes.py @@ -5,3 +5,6 @@ from .self_service_profile_user_attribute import SelfServiceProfileUserAttribute SelfServiceProfileUserAttributes = typing.Optional[typing.List[SelfServiceProfileUserAttribute]] +""" +List of attributes to be mapped that will be shown to the user during the SS-SSO flow. +""" diff --git a/src/auth0/management/types/session_ip.py b/src/auth0/management/types/session_ip.py index 7e8e41fa..d93fb234 100644 --- a/src/auth0/management/types/session_ip.py +++ b/src/auth0/management/types/session_ip.py @@ -3,3 +3,6 @@ import typing SessionIp = typing.Optional[str] +""" +First IP address associated with this session +""" diff --git a/src/auth0/management/types/session_metadata.py b/src/auth0/management/types/session_metadata.py index caaddb67..28624886 100644 --- a/src/auth0/management/types/session_metadata.py +++ b/src/auth0/management/types/session_metadata.py @@ -3,3 +3,6 @@ import typing SessionMetadata = typing.Optional[typing.Dict[str, typing.Any]] +""" +Metadata associated with the session, in the form of an object with string values (max 255 chars). Maximum of 25 metadata properties allowed. +""" diff --git a/src/auth0/management/types/set_partials_request_content.py b/src/auth0/management/types/set_partials_request_content.py index 2ca88603..2059471b 100644 --- a/src/auth0/management/types/set_partials_request_content.py +++ b/src/auth0/management/types/set_partials_request_content.py @@ -3,3 +3,6 @@ import typing SetPartialsRequestContent = typing.Dict[str, typing.Any] +""" +An object containing template partials for a group of screens. +""" diff --git a/src/auth0/management/types/set_self_service_profile_custom_text_request_content.py b/src/auth0/management/types/set_self_service_profile_custom_text_request_content.py index 7739c9d8..81a6dd65 100644 --- a/src/auth0/management/types/set_self_service_profile_custom_text_request_content.py +++ b/src/auth0/management/types/set_self_service_profile_custom_text_request_content.py @@ -3,3 +3,6 @@ import typing SetSelfServiceProfileCustomTextRequestContent = typing.Dict[str, str] +""" +The list of text keys and values to customize the self-service SSO page. Values can be plain text or rich HTML content limited to basic styling tags and hyperlinks. +""" diff --git a/src/auth0/management/types/set_self_service_profile_custom_text_response_content.py b/src/auth0/management/types/set_self_service_profile_custom_text_response_content.py index 8135ebc5..22180288 100644 --- a/src/auth0/management/types/set_self_service_profile_custom_text_response_content.py +++ b/src/auth0/management/types/set_self_service_profile_custom_text_response_content.py @@ -3,3 +3,6 @@ import typing SetSelfServiceProfileCustomTextResponseContent = typing.Dict[str, str] +""" +The resulting list of custom text keys and values. +""" diff --git a/src/auth0/management/types/sets_custom_texts_by_language_request_content.py b/src/auth0/management/types/sets_custom_texts_by_language_request_content.py index e7f87b1e..f8ebe391 100644 --- a/src/auth0/management/types/sets_custom_texts_by_language_request_content.py +++ b/src/auth0/management/types/sets_custom_texts_by_language_request_content.py @@ -3,3 +3,6 @@ import typing SetsCustomTextsByLanguageRequestContent = typing.Dict[str, typing.Any] +""" +An object containing custom dictionaries for a group of screens. +""" diff --git a/src/auth0/management/types/suspicious_ip_throttling_allowlist.py b/src/auth0/management/types/suspicious_ip_throttling_allowlist.py index b63ba444..07c5716e 100644 --- a/src/auth0/management/types/suspicious_ip_throttling_allowlist.py +++ b/src/auth0/management/types/suspicious_ip_throttling_allowlist.py @@ -5,3 +5,6 @@ from .suspicious_ip_throttling_allowlist_item import SuspiciousIpThrottlingAllowlistItem SuspiciousIpThrottlingAllowlist = typing.List[SuspiciousIpThrottlingAllowlistItem] +""" +List of trusted IP addresses that will not have attack protection enforced against them. +""" diff --git a/src/auth0/management/types/test_action_payload.py b/src/auth0/management/types/test_action_payload.py index b9e05814..e713ce86 100644 --- a/src/auth0/management/types/test_action_payload.py +++ b/src/auth0/management/types/test_action_payload.py @@ -3,3 +3,6 @@ import typing TestActionPayload = typing.Dict[str, typing.Any] +""" +The payload for the action. +""" diff --git a/src/auth0/management/types/test_action_result_payload.py b/src/auth0/management/types/test_action_result_payload.py index ea0beaa6..24536d40 100644 --- a/src/auth0/management/types/test_action_result_payload.py +++ b/src/auth0/management/types/test_action_result_payload.py @@ -3,3 +3,6 @@ import typing TestActionResultPayload = typing.Dict[str, typing.Any] +""" +The resulting payload after an action was executed. +""" diff --git a/src/auth0/management/types/test_event_data_content.py b/src/auth0/management/types/test_event_data_content.py index b8dd4a98..8b62dc4f 100644 --- a/src/auth0/management/types/test_event_data_content.py +++ b/src/auth0/management/types/test_event_data_content.py @@ -3,3 +3,6 @@ import typing TestEventDataContent = typing.Dict[str, typing.Any] +""" +The raw payload of the test event. +""" diff --git a/src/auth0/management/types/update_hook_secret_request_content.py b/src/auth0/management/types/update_hook_secret_request_content.py index f0f2d9e7..2f9c68d3 100644 --- a/src/auth0/management/types/update_hook_secret_request_content.py +++ b/src/auth0/management/types/update_hook_secret_request_content.py @@ -3,3 +3,6 @@ import typing UpdateHookSecretRequestContent = typing.Dict[str, str] +""" +Hashmap of key-value pairs where the value must be a string. +""" diff --git a/src/auth0/management/types/user_app_metadata_schema.py b/src/auth0/management/types/user_app_metadata_schema.py index 71f968d2..ce82ead6 100644 --- a/src/auth0/management/types/user_app_metadata_schema.py +++ b/src/auth0/management/types/user_app_metadata_schema.py @@ -3,3 +3,6 @@ import typing UserAppMetadataSchema = typing.Dict[str, typing.Any] +""" +User metadata to which this user has read-only access. +""" diff --git a/src/auth0/management/types/user_attribute_profile_id.py b/src/auth0/management/types/user_attribute_profile_id.py index af00990f..6ee253ec 100644 --- a/src/auth0/management/types/user_attribute_profile_id.py +++ b/src/auth0/management/types/user_attribute_profile_id.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. UserAttributeProfileId = str +""" +User Attribute Profile identifier. +""" diff --git a/src/auth0/management/types/user_attribute_profile_name.py b/src/auth0/management/types/user_attribute_profile_name.py index 9fa4a228..a1a630ec 100644 --- a/src/auth0/management/types/user_attribute_profile_name.py +++ b/src/auth0/management/types/user_attribute_profile_name.py @@ -1,3 +1,6 @@ # This file was auto-generated by Fern from our API Definition. UserAttributeProfileName = str +""" +The name of the user attribute profile. +""" diff --git a/src/auth0/management/types/user_attribute_profile_saml_mapping.py b/src/auth0/management/types/user_attribute_profile_saml_mapping.py index b6f79f46..7e03a6a0 100644 --- a/src/auth0/management/types/user_attribute_profile_saml_mapping.py +++ b/src/auth0/management/types/user_attribute_profile_saml_mapping.py @@ -3,3 +3,6 @@ import typing UserAttributeProfileSamlMapping = typing.List[str] +""" +SAML mapping override for this strategy +""" diff --git a/src/auth0/management/types/user_attribute_profile_user_attributes.py b/src/auth0/management/types/user_attribute_profile_user_attributes.py index 046a7b37..21e23ba3 100644 --- a/src/auth0/management/types/user_attribute_profile_user_attributes.py +++ b/src/auth0/management/types/user_attribute_profile_user_attributes.py @@ -7,3 +7,6 @@ ) UserAttributeProfileUserAttributes = typing.Dict[str, UserAttributeProfileUserAttributeAdditionalProperties] +""" +User attributes configuration map. Keys are attribute names, values are the mapping configuration for each attribute. +""" diff --git a/src/auth0/management/types/user_attribute_profile_user_id_saml_mapping.py b/src/auth0/management/types/user_attribute_profile_user_id_saml_mapping.py index abce0f6f..ee133a86 100644 --- a/src/auth0/management/types/user_attribute_profile_user_id_saml_mapping.py +++ b/src/auth0/management/types/user_attribute_profile_user_id_saml_mapping.py @@ -3,3 +3,6 @@ import typing UserAttributeProfileUserIdSamlMapping = typing.List[str] +""" +SAML mapping for user ID +""" diff --git a/src/auth0/management/types/user_metadata.py b/src/auth0/management/types/user_metadata.py index 2c92f8a3..2cd63926 100644 --- a/src/auth0/management/types/user_metadata.py +++ b/src/auth0/management/types/user_metadata.py @@ -3,3 +3,6 @@ import typing UserMetadata = typing.Dict[str, typing.Any] +""" +Data related to the user that does not affect the application's core functionality. +""" diff --git a/src/auth0/management/types/user_metadata_schema.py b/src/auth0/management/types/user_metadata_schema.py index a6de8c8e..573f0441 100644 --- a/src/auth0/management/types/user_metadata_schema.py +++ b/src/auth0/management/types/user_metadata_schema.py @@ -3,3 +3,6 @@ import typing UserMetadataSchema = typing.Dict[str, typing.Any] +""" +User metadata to which this user has read/write access. +""" diff --git a/src/auth0/management/user_attribute_profiles/raw_client.py b/src/auth0/management/user_attribute_profiles/raw_client.py index e2d7c74e..4ecb0089 100644 --- a/src/auth0/management/user_attribute_profiles/raw_client.py +++ b/src/auth0/management/user_attribute_profiles/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..core.serialization import convert_and_respect_annotation_metadata @@ -32,6 +33,7 @@ from ..types.user_attribute_profile_patch_user_id import UserAttributeProfilePatchUserId from ..types.user_attribute_profile_user_attributes import UserAttributeProfileUserAttributes from ..types.user_attribute_profile_user_id import UserAttributeProfileUserId +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -141,6 +143,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -256,6 +262,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def list_templates( @@ -325,6 +335,10 @@ def list_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get_template( @@ -347,7 +361,7 @@ def get_template( User Attribute Profile Template successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/templates/{jsonable_encoder(id)}", + f"user-attribute-profiles/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -408,6 +422,10 @@ def get_template( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -430,7 +448,7 @@ def get( Record for existing user attribute profile. """ _response = self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -491,6 +509,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -510,7 +532,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -553,6 +575,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -587,7 +613,7 @@ def update( User attribute profile successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -661,6 +687,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -771,6 +801,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -886,6 +920,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def list_templates( @@ -955,6 +993,10 @@ async def list_templates( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get_template( @@ -977,7 +1019,7 @@ async def get_template( User Attribute Profile Template successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/templates/{jsonable_encoder(id)}", + f"user-attribute-profiles/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1038,6 +1080,10 @@ async def get_template( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1060,7 +1106,7 @@ async def get( Record for existing user attribute profile. """ _response = await self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -1121,6 +1167,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1142,7 +1192,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1185,6 +1235,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1219,7 +1273,7 @@ async def update( User attribute profile successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"user-attribute-profiles/{jsonable_encoder(id)}", + f"user-attribute-profiles/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1293,4 +1347,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/user_blocks/raw_client.py b/src/auth0/management/user_blocks/raw_client.py index f40da3ae..24a34c34 100644 --- a/src/auth0/management/user_blocks/raw_client.py +++ b/src/auth0/management/user_blocks/raw_client.py @@ -6,7 +6,8 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ..errors.unauthorized_error import UnauthorizedError from ..types.list_user_blocks_by_identifier_response_content import ListUserBlocksByIdentifierResponseContent from ..types.list_user_blocks_response_content import ListUserBlocksResponseContent +from pydantic import ValidationError class RawUserBlocksClient: @@ -117,6 +119,10 @@ def list_by_identifier( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete_by_identifier( @@ -197,6 +203,10 @@ def delete_by_identifier( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def list( @@ -229,7 +239,7 @@ def list( User block successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"user-blocks/{jsonable_encoder(id)}", + f"user-blocks/{encode_path_param(id)}", method="GET", params={ "consider_brute_force_enablement": consider_brute_force_enablement, @@ -304,6 +314,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -325,7 +339,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"user-blocks/{jsonable_encoder(id)}", + f"user-blocks/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -390,6 +404,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -492,6 +510,10 @@ async def list_by_identifier( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete_by_identifier( @@ -572,6 +594,10 @@ async def delete_by_identifier( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def list( @@ -604,7 +630,7 @@ async def list( User block successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"user-blocks/{jsonable_encoder(id)}", + f"user-blocks/{encode_path_param(id)}", method="GET", params={ "consider_brute_force_enablement": consider_brute_force_enablement, @@ -679,6 +705,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -702,7 +732,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"user-blocks/{jsonable_encoder(id)}", + f"user-blocks/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -767,4 +797,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/user_grants/raw_client.py b/src/auth0/management/user_grants/raw_client.py index b3ae3ba6..d8fbf6a1 100644 --- a/src/auth0/management/user_grants/raw_client.py +++ b/src/auth0/management/user_grants/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.forbidden_error import ForbiddenError @@ -15,6 +16,7 @@ from ..errors.unauthorized_error import UnauthorizedError from ..types.list_user_grants_offset_paginated_response_content import ListUserGrantsOffsetPaginatedResponseContent from ..types.user_grant import UserGrant +from pydantic import ValidationError class RawUserGrantsClient: @@ -135,6 +137,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete_by_user_id( @@ -202,6 +208,10 @@ def delete_by_user_id( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -221,7 +231,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"grants/{jsonable_encoder(id)}", + f"grants/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -264,6 +274,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -388,6 +402,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete_by_user_id( @@ -455,6 +473,10 @@ async def delete_by_user_id( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -476,7 +498,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"grants/{jsonable_encoder(id)}", + f"grants/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -519,4 +541,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/authentication_methods/raw_client.py b/src/auth0/management/users/authentication_methods/raw_client.py index 2a6fa90a..7a7c8f70 100644 --- a/src/auth0/management/users/authentication_methods/raw_client.py +++ b/src/auth0/management/users/authentication_methods/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -28,6 +29,7 @@ from ...types.set_user_authentication_methods_request_content import SetUserAuthenticationMethodsRequestContent from ...types.update_user_authentication_method_response_content import UpdateUserAuthenticationMethodResponseContent from ...types.user_authentication_method import UserAuthenticationMethod +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -74,7 +76,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="GET", params={ "page": page, @@ -160,6 +162,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -219,7 +225,7 @@ def create( Authentication method created. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="POST", json={ "type": type, @@ -317,6 +323,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( @@ -347,7 +357,7 @@ def set( All authentication methods successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="PUT", json=convert_and_respect_annotation_metadata( object_=request, annotation=SetUserAuthenticationMethodsRequestContent, direction="write" @@ -426,6 +436,10 @@ def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete_all(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -445,7 +459,7 @@ def delete_all(self, id: str, *, request_options: typing.Optional[RequestOptions HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="DELETE", request_options=request_options, ) @@ -499,6 +513,10 @@ def delete_all(self, id: str, *, request_options: typing.Optional[RequestOptions _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -522,7 +540,7 @@ def get( Authentication method retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="GET", request_options=request_options, ) @@ -594,6 +612,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -618,7 +640,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="DELETE", request_options=request_options, ) @@ -683,6 +705,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -720,7 +746,7 @@ def update( Authentication method updated. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="PATCH", json={ "name": name, @@ -800,6 +826,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -844,7 +874,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="GET", params={ "page": page, @@ -933,6 +963,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -992,7 +1026,7 @@ async def create( Authentication method created. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="POST", json={ "type": type, @@ -1090,6 +1124,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( @@ -1120,7 +1158,7 @@ async def set( All authentication methods successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="PUT", json=convert_and_respect_annotation_metadata( object_=request, annotation=SetUserAuthenticationMethodsRequestContent, direction="write" @@ -1199,6 +1237,10 @@ async def set( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete_all( @@ -1220,7 +1262,7 @@ async def delete_all( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods", + f"users/{encode_path_param(id)}/authentication-methods", method="DELETE", request_options=request_options, ) @@ -1274,6 +1316,10 @@ async def delete_all( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1297,7 +1343,7 @@ async def get( Authentication method retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="GET", request_options=request_options, ) @@ -1369,6 +1415,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1393,7 +1443,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="DELETE", request_options=request_options, ) @@ -1458,6 +1508,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1495,7 +1549,7 @@ async def update( Authentication method updated. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authentication-methods/{jsonable_encoder(authentication_method_id)}", + f"users/{encode_path_param(id)}/authentication-methods/{encode_path_param(authentication_method_id)}", method="PATCH", json={ "name": name, @@ -1575,4 +1629,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/authenticators/raw_client.py b/src/auth0/management/users/authenticators/raw_client.py index 2cfe6718..1a731e06 100644 --- a/src/auth0/management/users/authenticators/raw_client.py +++ b/src/auth0/management/users/authenticators/raw_client.py @@ -6,13 +6,15 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError from ...errors.forbidden_error import ForbiddenError from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError +from pydantic import ValidationError class RawAuthenticatorsClient: @@ -36,7 +38,7 @@ def delete_all(self, id: str, *, request_options: typing.Optional[RequestOptions HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authenticators", + f"users/{encode_path_param(id)}/authenticators", method="DELETE", request_options=request_options, ) @@ -90,6 +92,10 @@ def delete_all(self, id: str, *, request_options: typing.Optional[RequestOptions _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -116,7 +122,7 @@ async def delete_all( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/authenticators", + f"users/{encode_path_param(id)}/authenticators", method="DELETE", request_options=request_options, ) @@ -170,4 +176,8 @@ async def delete_all( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/connected_accounts/raw_client.py b/src/auth0/management/users/connected_accounts/raw_client.py index 27342c19..97667952 100644 --- a/src/auth0/management/users/connected_accounts/raw_client.py +++ b/src/auth0/management/users/connected_accounts/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.connected_account import ConnectedAccount from ...types.list_user_connected_accounts_response_content import ListUserConnectedAccountsResponseContent +from pydantic import ValidationError class RawConnectedAccountsClient: @@ -52,7 +54,7 @@ def list( Connected accounts successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/connected-accounts", + f"users/{encode_path_param(id)}/connected-accounts", method="GET", params={ "from": from_, @@ -126,6 +128,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -164,7 +170,7 @@ async def list( Connected accounts successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/connected-accounts", + f"users/{encode_path_param(id)}/connected-accounts", method="GET", params={ "from": from_, @@ -241,4 +247,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/enrollments/raw_client.py b/src/auth0/management/users/enrollments/raw_client.py index 69f7a256..40ac9b27 100644 --- a/src/auth0/management/users/enrollments/raw_client.py +++ b/src/auth0/management/users/enrollments/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.users_enrollment import UsersEnrollment +from pydantic import ValidationError class RawEnrollmentsClient: @@ -41,7 +43,7 @@ def get( Enrollments successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/enrollments", + f"users/{encode_path_param(id)}/enrollments", method="GET", request_options=request_options, ) @@ -113,6 +115,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -140,7 +146,7 @@ async def get( Enrollments successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/enrollments", + f"users/{encode_path_param(id)}/enrollments", method="GET", request_options=request_options, ) @@ -212,4 +218,8 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/federated_connections_tokensets/raw_client.py b/src/auth0/management/users/federated_connections_tokensets/raw_client.py index ed6765a5..4416f034 100644 --- a/src/auth0/management/users/federated_connections_tokensets/raw_client.py +++ b/src/auth0/management/users/federated_connections_tokensets/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.federated_connection_token_set import FederatedConnectionTokenSet +from pydantic import ValidationError class RawFederatedConnectionsTokensetsClient: @@ -41,7 +43,7 @@ def list( Flows successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/federated-connections-tokensets", + f"users/{encode_path_param(id)}/federated-connections-tokensets", method="GET", request_options=request_options, ) @@ -102,6 +104,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -124,7 +130,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/federated-connections-tokensets/{jsonable_encoder(tokenset_id)}", + f"users/{encode_path_param(id)}/federated-connections-tokensets/{encode_path_param(tokenset_id)}", method="DELETE", request_options=request_options, ) @@ -178,6 +184,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -205,7 +215,7 @@ async def list( Flows successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/federated-connections-tokensets", + f"users/{encode_path_param(id)}/federated-connections-tokensets", method="GET", request_options=request_options, ) @@ -266,6 +276,10 @@ async def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -288,7 +302,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/federated-connections-tokensets/{jsonable_encoder(tokenset_id)}", + f"users/{encode_path_param(id)}/federated-connections-tokensets/{encode_path_param(tokenset_id)}", method="DELETE", request_options=request_options, ) @@ -342,4 +356,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/groups/raw_client.py b/src/auth0/management/users/groups/raw_client.py index 25025296..0811220f 100644 --- a/src/auth0/management/users/groups/raw_client.py +++ b/src/auth0/management/users/groups/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.get_user_groups_paginated_response_content import GetUserGroupsPaginatedResponseContent from ...types.user_groups_response_schema import UserGroupsResponseSchema +from pydantic import ValidationError class RawGroupsClient: @@ -60,7 +62,7 @@ def get( Groups successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/groups", + f"users/{encode_path_param(id)}/groups", method="GET", params={ "fields": fields, @@ -138,6 +140,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -184,7 +190,7 @@ async def get( Groups successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/groups", + f"users/{encode_path_param(id)}/groups", method="GET", params={ "fields": fields, @@ -265,4 +271,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/identities/raw_client.py b/src/auth0/management/users/identities/raw_client.py index 82064810..204ecaa4 100644 --- a/src/auth0/management/users/identities/raw_client.py +++ b/src/auth0/management/users/identities/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -19,6 +20,7 @@ from ...types.user_id import UserId from ...types.user_identity import UserIdentity from ...types.user_identity_provider_enum import UserIdentityProviderEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -93,7 +95,7 @@ def link( Identity successfully added. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/identities", + f"users/{encode_path_param(id)}/identities", method="POST", json={ "provider": provider, @@ -177,6 +179,10 @@ def link( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -212,7 +218,7 @@ def delete( User identity successfully unlinked. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/identities/{jsonable_encoder(provider)}/{jsonable_encoder(user_id)}", + f"users/{encode_path_param(id)}/identities/{encode_path_param(provider)}/{encode_path_param(user_id)}", method="DELETE", request_options=request_options, ) @@ -273,6 +279,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -345,7 +355,7 @@ async def link( Identity successfully added. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/identities", + f"users/{encode_path_param(id)}/identities", method="POST", json={ "provider": provider, @@ -429,6 +439,10 @@ async def link( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -464,7 +478,7 @@ async def delete( User identity successfully unlinked. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/identities/{jsonable_encoder(provider)}/{jsonable_encoder(user_id)}", + f"users/{encode_path_param(id)}/identities/{encode_path_param(provider)}/{encode_path_param(user_id)}", method="DELETE", request_options=request_options, ) @@ -525,4 +539,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/logs/raw_client.py b/src/auth0/management/users/logs/raw_client.py index 973d02a1..33f0a34c 100644 --- a/src/auth0/management/users/logs/raw_client.py +++ b/src/auth0/management/users/logs/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.log import Log from ...types.user_list_log_offset_paginated_response_content import UserListLogOffsetPaginatedResponseContent +from pydantic import ValidationError class RawLogsClient: @@ -68,7 +70,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/logs", + f"users/{encode_path_param(id)}/logs", method="GET", params={ "page": page, @@ -145,6 +147,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -199,7 +205,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/logs", + f"users/{encode_path_param(id)}/logs", method="GET", params={ "page": page, @@ -279,4 +285,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/multifactor/raw_client.py b/src/auth0/management/users/multifactor/raw_client.py index f7d075db..52a8fb88 100644 --- a/src/auth0/management/users/multifactor/raw_client.py +++ b/src/auth0/management/users/multifactor/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -15,6 +16,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.user_multifactor_provider_enum import UserMultifactorProviderEnum +from pydantic import ValidationError class RawMultifactorClient: @@ -40,7 +42,7 @@ def invalidate_remember_browser( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/multifactor/actions/invalidate-remember-browser", + f"users/{encode_path_param(id)}/multifactor/actions/invalidate-remember-browser", method="POST", request_options=request_options, ) @@ -83,6 +85,10 @@ def invalidate_remember_browser( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete_provider( @@ -107,7 +113,7 @@ def delete_provider( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/multifactor/{jsonable_encoder(provider)}", + f"users/{encode_path_param(id)}/multifactor/{encode_path_param(provider)}", method="DELETE", request_options=request_options, ) @@ -172,6 +178,10 @@ def delete_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -198,7 +208,7 @@ async def invalidate_remember_browser( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/multifactor/actions/invalidate-remember-browser", + f"users/{encode_path_param(id)}/multifactor/actions/invalidate-remember-browser", method="POST", request_options=request_options, ) @@ -241,6 +251,10 @@ async def invalidate_remember_browser( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete_provider( @@ -265,7 +279,7 @@ async def delete_provider( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/multifactor/{jsonable_encoder(provider)}", + f"users/{encode_path_param(id)}/multifactor/{encode_path_param(provider)}", method="DELETE", request_options=request_options, ) @@ -330,4 +344,8 @@ async def delete_provider( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/organizations/raw_client.py b/src/auth0/management/users/organizations/raw_client.py index cb0dfa49..ebd75799 100644 --- a/src/auth0/management/users/organizations/raw_client.py +++ b/src/auth0/management/users/organizations/raw_client.py @@ -5,8 +5,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.forbidden_error import ForbiddenError @@ -16,6 +17,7 @@ ListUserOrganizationsOffsetPaginatedResponseContent, ) from ...types.organization import Organization +from pydantic import ValidationError class RawOrganizationsClient: @@ -59,7 +61,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/organizations", + f"users/{encode_path_param(id)}/organizations", method="GET", params={ "page": page, @@ -123,6 +125,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -167,7 +173,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/organizations", + f"users/{encode_path_param(id)}/organizations", method="GET", params={ "page": page, @@ -234,4 +240,8 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/permissions/raw_client.py b/src/auth0/management/users/permissions/raw_client.py index 2b272860..3b3d6d5b 100644 --- a/src/auth0/management/users/permissions/raw_client.py +++ b/src/auth0/management/users/permissions/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...core.serialization import convert_and_respect_annotation_metadata @@ -21,6 +22,7 @@ ) from ...types.permission_request_payload import PermissionRequestPayload from ...types.user_permission_schema import UserPermissionSchema +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -67,7 +69,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="GET", params={ "per_page": per_page, @@ -153,6 +155,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -181,7 +187,7 @@ def create( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="POST", json={ "permissions": convert_and_respect_annotation_metadata( @@ -244,6 +250,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -272,7 +282,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="DELETE", json={ "permissions": convert_and_respect_annotation_metadata( @@ -335,6 +345,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -379,7 +393,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="GET", params={ "per_page": per_page, @@ -468,6 +482,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -496,7 +514,7 @@ async def create( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="POST", json={ "permissions": convert_and_respect_annotation_metadata( @@ -559,6 +577,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -587,7 +609,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/permissions", + f"users/{encode_path_param(id)}/permissions", method="DELETE", json={ "permissions": convert_and_respect_annotation_metadata( @@ -650,4 +672,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/raw_client.py b/src/auth0/management/users/raw_client.py index 9abd6ea1..a6bdf789 100644 --- a/src/auth0/management/users/raw_client.py +++ b/src/auth0/management/users/raw_client.py @@ -6,8 +6,9 @@ from ..core.api_error import ApiError from ..core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ..core.http_response import AsyncHttpResponse, HttpResponse -from ..core.jsonable_encoder import jsonable_encoder +from ..core.jsonable_encoder import encode_path_param from ..core.pagination import AsyncPager, SyncPager +from ..core.parse_error import ParsingError from ..core.pydantic_utilities import parse_obj_as from ..core.request_options import RequestOptions from ..errors.bad_request_error import BadRequestError @@ -26,6 +27,7 @@ from ..types.update_user_response_content import UpdateUserResponseContent from ..types.user_metadata import UserMetadata from ..types.user_response_schema import UserResponseSchema +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -208,6 +210,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -392,6 +398,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def list_users_by_email( @@ -495,6 +505,10 @@ def list_users_by_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -528,7 +542,7 @@ def get( User successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -604,6 +618,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -623,7 +641,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -677,6 +695,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -843,7 +865,7 @@ def update( User successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="PATCH", json={ "blocked": blocked, @@ -939,6 +961,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def regenerate_recovery_code( @@ -961,7 +987,7 @@ def regenerate_recovery_code( New recovery code successfully generated. """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/recovery-code-regeneration", + f"users/{encode_path_param(id)}/recovery-code-regeneration", method="POST", request_options=request_options, ) @@ -1022,6 +1048,10 @@ def regenerate_recovery_code( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def revoke_access( @@ -1054,7 +1084,7 @@ def revoke_access( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/revoke-access", + f"users/{encode_path_param(id)}/revoke-access", method="POST", json={ "session_id": session_id, @@ -1116,6 +1146,10 @@ def revoke_access( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -1299,6 +1333,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -1483,6 +1521,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def list_users_by_email( @@ -1586,6 +1628,10 @@ async def list_users_by_email( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -1619,7 +1665,7 @@ async def get( User successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="GET", params={ "fields": fields, @@ -1695,6 +1741,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -1716,7 +1766,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -1770,6 +1820,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1936,7 +1990,7 @@ async def update( User successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}", + f"users/{encode_path_param(id)}", method="PATCH", json={ "blocked": blocked, @@ -2032,6 +2086,10 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def regenerate_recovery_code( @@ -2054,7 +2112,7 @@ async def regenerate_recovery_code( New recovery code successfully generated. """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/recovery-code-regeneration", + f"users/{encode_path_param(id)}/recovery-code-regeneration", method="POST", request_options=request_options, ) @@ -2115,6 +2173,10 @@ async def regenerate_recovery_code( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def revoke_access( @@ -2147,7 +2209,7 @@ async def revoke_access( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/revoke-access", + f"users/{encode_path_param(id)}/revoke-access", method="POST", json={ "session_id": session_id, @@ -2209,4 +2271,8 @@ async def revoke_access( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/refresh_token/raw_client.py b/src/auth0/management/users/refresh_token/raw_client.py index fd19edb5..50797c15 100644 --- a/src/auth0/management/users/refresh_token/raw_client.py +++ b/src/auth0/management/users/refresh_token/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.list_refresh_tokens_paginated_response_content import ListRefreshTokensPaginatedResponseContent from ...types.refresh_token_response_content import RefreshTokenResponseContent +from pydantic import ValidationError class RawRefreshTokenClient: @@ -54,7 +56,7 @@ def list( The refresh tokens were retrieved """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/refresh-tokens", + f"users/{encode_path_param(user_id)}/refresh-tokens", method="GET", params={ "from": from_, @@ -128,6 +130,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, user_id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -147,7 +153,7 @@ def delete(self, user_id: str, *, request_options: typing.Optional[RequestOption HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/refresh-tokens", + f"users/{encode_path_param(user_id)}/refresh-tokens", method="DELETE", request_options=request_options, ) @@ -212,6 +218,10 @@ def delete(self, user_id: str, *, request_options: typing.Optional[RequestOption _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -250,7 +260,7 @@ async def list( The refresh tokens were retrieved """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/refresh-tokens", + f"users/{encode_path_param(user_id)}/refresh-tokens", method="GET", params={ "from": from_, @@ -327,6 +337,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -348,7 +362,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/refresh-tokens", + f"users/{encode_path_param(user_id)}/refresh-tokens", method="DELETE", request_options=request_options, ) @@ -413,4 +427,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/risk_assessments/raw_client.py b/src/auth0/management/users/risk_assessments/raw_client.py index b05edfec..09fbc71f 100644 --- a/src/auth0/management/users/risk_assessments/raw_client.py +++ b/src/auth0/management/users/risk_assessments/raw_client.py @@ -6,7 +6,8 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -14,6 +15,7 @@ from ...errors.too_many_requests_error import TooManyRequestsError from ...errors.unauthorized_error import UnauthorizedError from ...types.assessors_type_enum import AssessorsTypeEnum +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -53,7 +55,7 @@ def clear( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/risk-assessments/clear", + f"users/{encode_path_param(id)}/risk-assessments/clear", method="POST", json={ "connection": connection, @@ -115,6 +117,10 @@ def clear( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -152,7 +158,7 @@ async def clear( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/risk-assessments/clear", + f"users/{encode_path_param(id)}/risk-assessments/clear", method="POST", json={ "connection": connection, @@ -214,4 +220,8 @@ async def clear( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/roles/raw_client.py b/src/auth0/management/users/roles/raw_client.py index efeb5d58..ad21837a 100644 --- a/src/auth0/management/users/roles/raw_client.py +++ b/src/auth0/management/users/roles/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.list_user_roles_offset_paginated_response_content import ListUserRolesOffsetPaginatedResponseContent from ...types.role import Role +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -64,7 +66,7 @@ def list( page = page if page is not None else 0 _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="GET", params={ "per_page": per_page, @@ -128,6 +130,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def assign( @@ -154,7 +160,7 @@ def assign( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="POST", json={ "roles": roles, @@ -215,6 +221,10 @@ def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete( @@ -241,7 +251,7 @@ def delete( HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="DELETE", json={ "roles": roles, @@ -291,6 +301,10 @@ def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -337,7 +351,7 @@ async def list( page = page if page is not None else 0 _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="GET", params={ "per_page": per_page, @@ -404,6 +418,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def assign( @@ -430,7 +448,7 @@ async def assign( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="POST", json={ "roles": roles, @@ -491,6 +509,10 @@ async def assign( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -517,7 +539,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(id)}/roles", + f"users/{encode_path_param(id)}/roles", method="DELETE", json={ "roles": roles, @@ -567,4 +589,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/users/sessions/raw_client.py b/src/auth0/management/users/sessions/raw_client.py index f7313c48..9cdc1b4e 100644 --- a/src/auth0/management/users/sessions/raw_client.py +++ b/src/auth0/management/users/sessions/raw_client.py @@ -6,8 +6,9 @@ from ...core.api_error import ApiError from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ...core.http_response import AsyncHttpResponse, HttpResponse -from ...core.jsonable_encoder import jsonable_encoder +from ...core.jsonable_encoder import encode_path_param from ...core.pagination import AsyncPager, SyncPager +from ...core.parse_error import ParsingError from ...core.pydantic_utilities import parse_obj_as from ...core.request_options import RequestOptions from ...errors.bad_request_error import BadRequestError @@ -17,6 +18,7 @@ from ...errors.unauthorized_error import UnauthorizedError from ...types.list_user_sessions_paginated_response_content import ListUserSessionsPaginatedResponseContent from ...types.session_response_content import SessionResponseContent +from pydantic import ValidationError class RawSessionsClient: @@ -54,7 +56,7 @@ def list( The sessions were retrieved """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/sessions", + f"users/{encode_path_param(user_id)}/sessions", method="GET", params={ "from": from_, @@ -128,6 +130,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, user_id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -147,7 +153,7 @@ def delete(self, user_id: str, *, request_options: typing.Optional[RequestOption HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/sessions", + f"users/{encode_path_param(user_id)}/sessions", method="DELETE", request_options=request_options, ) @@ -212,6 +218,10 @@ def delete(self, user_id: str, *, request_options: typing.Optional[RequestOption _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -250,7 +260,7 @@ async def list( The sessions were retrieved """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/sessions", + f"users/{encode_path_param(user_id)}/sessions", method="GET", params={ "from": from_, @@ -327,6 +337,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -348,7 +362,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"users/{jsonable_encoder(user_id)}/sessions", + f"users/{encode_path_param(user_id)}/sessions", method="DELETE", request_options=request_options, ) @@ -413,4 +427,8 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/src/auth0/management/verifiable_credentials/verification/templates/raw_client.py b/src/auth0/management/verifiable_credentials/verification/templates/raw_client.py index 4f06a6eb..e6e4de90 100644 --- a/src/auth0/management/verifiable_credentials/verification/templates/raw_client.py +++ b/src/auth0/management/verifiable_credentials/verification/templates/raw_client.py @@ -6,8 +6,9 @@ from ....core.api_error import ApiError from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse -from ....core.jsonable_encoder import jsonable_encoder +from ....core.jsonable_encoder import encode_path_param from ....core.pagination import AsyncPager, SyncPager +from ....core.parse_error import ParsingError from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....core.serialization import convert_and_respect_annotation_metadata @@ -29,6 +30,7 @@ UpdateVerifiableCredentialTemplateResponseContent, ) from ....types.verifiable_credential_template_response import VerifiableCredentialTemplateResponse +from pydantic import ValidationError # this is used as the default value for optional parameters OMIT = typing.cast(typing.Any, ...) @@ -138,6 +140,10 @@ def list( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def create( @@ -263,6 +269,10 @@ def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def get( @@ -285,7 +295,7 @@ def get( Template successfully retrieved. """ _response = self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -357,6 +367,10 @@ def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = None) -> HttpResponse[None]: @@ -376,7 +390,7 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = HttpResponse[None] """ _response = self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -430,6 +444,10 @@ def delete(self, id: str, *, request_options: typing.Optional[RequestOptions] = _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def update( @@ -473,7 +491,7 @@ def update( Template successfully updated. """ _response = self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -559,6 +577,10 @@ def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) @@ -669,6 +691,10 @@ async def _get_next(): _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def create( @@ -794,6 +820,10 @@ async def create( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def get( @@ -816,7 +846,7 @@ async def get( Template successfully retrieved. """ _response = await self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="GET", request_options=request_options, ) @@ -888,6 +918,10 @@ async def get( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def delete( @@ -909,7 +943,7 @@ async def delete( AsyncHttpResponse[None] """ _response = await self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="DELETE", request_options=request_options, ) @@ -963,6 +997,10 @@ async def delete( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def update( @@ -1006,7 +1044,7 @@ async def update( Template successfully updated. """ _response = await self._client_wrapper.httpx_client.request( - f"verifiable-credentials/verification/templates/{jsonable_encoder(id)}", + f"verifiable-credentials/verification/templates/{encode_path_param(id)}", method="PATCH", json={ "name": name, @@ -1092,4 +1130,8 @@ async def update( _response_json = _response.json() except JSONDecodeError: raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response.text) + except ValidationError as e: + raise ParsingError( + status_code=_response.status_code, headers=dict(_response.headers), body=_response.json(), cause=e + ) raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) diff --git a/tests/conftest.py b/tests/conftest.py index 02300944..4174fa98 100644 --- a/tests/conftest.py +++ b/tests/conftest.py @@ -15,7 +15,8 @@ import pytest _STARTED: bool = False -_WIREMOCK_PORT: str = "8080" # Default, will be updated after container starts +_EXTERNAL: bool = False # True when using an external WireMock instance (skip container lifecycle) +_WIREMOCK_URL: str = "http://localhost:8080" # Default, will be updated after container starts _PROJECT_NAME: str = "auth0-api" # This file lives at tests/conftest.py, so the project root is one level up. @@ -41,10 +42,19 @@ def _get_wiremock_port() -> str: def _start_wiremock() -> None: """Starts the WireMock container using docker-compose.""" - global _STARTED, _WIREMOCK_PORT + global _STARTED, _EXTERNAL, _WIREMOCK_URL if _STARTED: return + # If WIREMOCK_URL is already set (e.g., by CI/CD pipeline), skip container management + existing_url = os.environ.get("WIREMOCK_URL") + if existing_url: + _WIREMOCK_URL = existing_url + _EXTERNAL = True + _STARTED = True + print(f"\nUsing external WireMock at {_WIREMOCK_URL} (container management skipped)") + return + print(f"\nStarting WireMock container (project: {_PROJECT_NAME})...") try: subprocess.run( @@ -54,8 +64,9 @@ def _start_wiremock() -> None: text=True, ) _WIREMOCK_PORT = _get_wiremock_port() - os.environ["WIREMOCK_PORT"] = _WIREMOCK_PORT - print(f"WireMock container is ready on port {_WIREMOCK_PORT}") + _WIREMOCK_URL = f"http://localhost:{_WIREMOCK_PORT}" + os.environ["WIREMOCK_URL"] = _WIREMOCK_URL + print(f"WireMock container is ready at {_WIREMOCK_URL}") _STARTED = True except subprocess.CalledProcessError as e: print(f"Failed to start WireMock: {e.stderr}") @@ -64,6 +75,10 @@ def _start_wiremock() -> None: def _stop_wiremock() -> None: """Stops and removes the WireMock container.""" + if _EXTERNAL: + # Container is managed externally; nothing to tear down. + return + print("\nStopping WireMock container...") subprocess.run( ["docker", "compose", "-f", _COMPOSE_FILE, "-p", _PROJECT_NAME, "down", "-v"], @@ -82,6 +97,26 @@ def _is_xdist_worker(config: pytest.Config) -> bool: return hasattr(config, "workerinput") +def _has_httpx_aiohttp() -> bool: + """Check if httpx_aiohttp is importable.""" + try: + import httpx_aiohttp # type: ignore[import-not-found] # noqa: F401 + + return True + except ImportError: + return False + + +def pytest_collection_modifyitems(config: pytest.Config, items: list) -> None: + """Auto-skip @pytest.mark.aiohttp tests when httpx_aiohttp is not installed.""" + if _has_httpx_aiohttp(): + return + skip_aiohttp = pytest.mark.skip(reason="httpx_aiohttp not installed") + for item in items: + if "aiohttp" in item.keywords: + item.add_marker(skip_aiohttp) + + def pytest_configure(config: pytest.Config) -> None: """ Pytest hook that runs during test session setup. diff --git a/tests/test_aiohttp_autodetect.py b/tests/test_aiohttp_autodetect.py new file mode 100644 index 00000000..32b05909 --- /dev/null +++ b/tests/test_aiohttp_autodetect.py @@ -0,0 +1,116 @@ +import importlib +import sys +import unittest +from unittest import mock + +import httpx +import pytest + + +class TestMakeDefaultAsyncClientWithoutAiohttp(unittest.TestCase): + """Tests for _make_default_async_client when httpx_aiohttp is NOT installed.""" + + def test_returns_httpx_async_client(self) -> None: + """When httpx_aiohttp is not installed, returns plain httpx.AsyncClient.""" + with mock.patch.dict(sys.modules, {"httpx_aiohttp": None}): + from auth0.management.client import _make_default_async_client + + client = _make_default_async_client(timeout=60, follow_redirects=True) + self.assertIsInstance(client, httpx.AsyncClient) + self.assertEqual(client.timeout.read, 60) + self.assertTrue(client.follow_redirects) + + def test_follow_redirects_none(self) -> None: + """When follow_redirects is None, omits it from httpx.AsyncClient.""" + with mock.patch.dict(sys.modules, {"httpx_aiohttp": None}): + from auth0.management.client import _make_default_async_client + + client = _make_default_async_client(timeout=60, follow_redirects=None) + self.assertIsInstance(client, httpx.AsyncClient) + self.assertFalse(client.follow_redirects) + + def test_explicit_httpx_client_bypasses_autodetect(self) -> None: + """When user passes httpx_client explicitly, _make_default_async_client is not called.""" + + explicit_client = httpx.AsyncClient(timeout=120) + with mock.patch("auth0.management.client._make_default_async_client") as mock_make: + # Replicate the generated conditional: httpx_client if httpx_client is not None else _make_default_async_client(...) + result = explicit_client if explicit_client is not None else mock_make(timeout=60, follow_redirects=True) + mock_make.assert_not_called() + self.assertIs(result, explicit_client) + + +@pytest.mark.aiohttp +class TestMakeDefaultAsyncClientWithAiohttp(unittest.TestCase): + """Tests for _make_default_async_client when httpx_aiohttp IS installed.""" + + def test_returns_aiohttp_client(self) -> None: + """When httpx_aiohttp is installed, returns HttpxAiohttpClient.""" + import httpx_aiohttp # type: ignore[import-not-found] + + from auth0.management.client import _make_default_async_client + + client = _make_default_async_client(timeout=60, follow_redirects=True) + self.assertIsInstance(client, httpx_aiohttp.HttpxAiohttpClient) + self.assertEqual(client.timeout.read, 60) + self.assertTrue(client.follow_redirects) + + def test_follow_redirects_none(self) -> None: + """When httpx_aiohttp is installed and follow_redirects is None, omits it.""" + import httpx_aiohttp # type: ignore[import-not-found] + + from auth0.management.client import _make_default_async_client + + client = _make_default_async_client(timeout=60, follow_redirects=None) + self.assertIsInstance(client, httpx_aiohttp.HttpxAiohttpClient) + self.assertFalse(client.follow_redirects) + + +class TestDefaultClientsWithoutAiohttp(unittest.TestCase): + """Tests for _default_clients.py convenience classes (no aiohttp).""" + + def test_default_async_httpx_client_defaults(self) -> None: + """DefaultAsyncHttpxClient applies SDK defaults.""" + from auth0.management._default_clients import SDK_DEFAULT_TIMEOUT, DefaultAsyncHttpxClient + + client = DefaultAsyncHttpxClient() + self.assertIsInstance(client, httpx.AsyncClient) + self.assertEqual(client.timeout.read, SDK_DEFAULT_TIMEOUT) + self.assertTrue(client.follow_redirects) + + def test_default_async_httpx_client_overrides(self) -> None: + """DefaultAsyncHttpxClient allows overriding defaults.""" + from auth0.management._default_clients import DefaultAsyncHttpxClient + + client = DefaultAsyncHttpxClient(timeout=30, follow_redirects=False) + self.assertEqual(client.timeout.read, 30) + self.assertFalse(client.follow_redirects) + + def test_default_aiohttp_client_raises_without_package(self) -> None: + """DefaultAioHttpClient raises RuntimeError when httpx_aiohttp not installed.""" + import auth0.management._default_clients + + with mock.patch.dict(sys.modules, {"httpx_aiohttp": None}): + importlib.reload(auth0.management._default_clients) + + with self.assertRaises(RuntimeError) as ctx: + auth0.management._default_clients.DefaultAioHttpClient() + self.assertIn("pip install auth0-python[aiohttp]", str(ctx.exception)) + + importlib.reload(auth0.management._default_clients) + + +@pytest.mark.aiohttp +class TestDefaultClientsWithAiohttp(unittest.TestCase): + """Tests for _default_clients.py when httpx_aiohttp IS installed.""" + + def test_default_aiohttp_client_defaults(self) -> None: + """DefaultAioHttpClient works when httpx_aiohttp is installed.""" + import httpx_aiohttp # type: ignore[import-not-found] + + from auth0.management._default_clients import SDK_DEFAULT_TIMEOUT, DefaultAioHttpClient + + client = DefaultAioHttpClient() + self.assertIsInstance(client, httpx_aiohttp.HttpxAiohttpClient) + self.assertEqual(client.timeout.read, SDK_DEFAULT_TIMEOUT) + self.assertTrue(client.follow_redirects) diff --git a/tests/utils/test_http_client.py b/tests/utils/test_http_client.py index 026256d8..36f58793 100644 --- a/tests/utils/test_http_client.py +++ b/tests/utils/test_http_client.py @@ -1,7 +1,9 @@ # This file was auto-generated by Fern from our API Definition. from typing import Any, Dict +from unittest.mock import AsyncMock, MagicMock, patch +import httpx import pytest from auth0.management.core.http_client import ( @@ -298,3 +300,363 @@ def test_preserves_base_url_path_prefix_trailing_slash() -> None: """Test that path prefixes in base URL are preserved.""" result = _build_url("https://cloud.example.com/org/tenant/api/", "/users") assert result == "https://cloud.example.com/org/tenant/api/users" + + +# --------------------------------------------------------------------------- +# Connection error retry tests +# --------------------------------------------------------------------------- + + +def _make_sync_http_client(mock_client: Any) -> HttpClient: + return HttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + ) + + +def _make_async_http_client(mock_client: Any) -> AsyncHttpClient: + return AsyncHttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + async_base_headers=None, + ) + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_retries_on_connect_error(mock_sleep: MagicMock) -> None: + """Sync: connection error retries on httpx.ConnectError.""" + mock_client = MagicMock() + mock_client.request.side_effect = [ + httpx.ConnectError("connection failed"), + _DummyResponse(), + ] + http_client = _make_sync_http_client(mock_client) + + response = http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + assert mock_client.request.call_count == 2 + mock_sleep.assert_called_once() + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_retries_on_remote_protocol_error(mock_sleep: MagicMock) -> None: + """Sync: connection error retries on httpx.RemoteProtocolError.""" + mock_client = MagicMock() + mock_client.request.side_effect = [ + httpx.RemoteProtocolError("Remote end closed connection without response"), + _DummyResponse(), + ] + http_client = _make_sync_http_client(mock_client) + + response = http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + assert mock_client.request.call_count == 2 + mock_sleep.assert_called_once() + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_connection_error_exhausts_retries(mock_sleep: MagicMock) -> None: + """Sync: connection error exhausts retries then raises.""" + mock_client = MagicMock() + mock_client.request.side_effect = httpx.ConnectError("connection failed") + http_client = _make_sync_http_client(mock_client) + + with pytest.raises(httpx.ConnectError): + http_client.request( + path="/test", + method="GET", + request_options={"max_retries": 2}, + ) + + # 1 initial + 2 retries = 3 total attempts + assert mock_client.request.call_count == 3 + assert mock_sleep.call_count == 2 + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_connection_error_respects_max_retries_zero(mock_sleep: MagicMock) -> None: + """Sync: connection error respects max_retries=0.""" + mock_client = MagicMock() + mock_client.request.side_effect = httpx.ConnectError("connection failed") + http_client = _make_sync_http_client(mock_client) + + with pytest.raises(httpx.ConnectError): + http_client.request( + path="/test", + method="GET", + request_options={"max_retries": 0}, + ) + + # No retries, just the initial attempt + assert mock_client.request.call_count == 1 + mock_sleep.assert_not_called() + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_retries_on_connect_error(mock_sleep: AsyncMock) -> None: + """Async: connection error retries on httpx.ConnectError.""" + mock_client = MagicMock() + mock_client.request = AsyncMock( + side_effect=[ + httpx.ConnectError("connection failed"), + _DummyResponse(), + ] + ) + http_client = _make_async_http_client(mock_client) + + response = await http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + assert mock_client.request.call_count == 2 + mock_sleep.assert_called_once() + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_retries_on_remote_protocol_error(mock_sleep: AsyncMock) -> None: + """Async: connection error retries on httpx.RemoteProtocolError.""" + mock_client = MagicMock() + mock_client.request = AsyncMock( + side_effect=[ + httpx.RemoteProtocolError("Remote end closed connection without response"), + _DummyResponse(), + ] + ) + http_client = _make_async_http_client(mock_client) + + response = await http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + assert mock_client.request.call_count == 2 + mock_sleep.assert_called_once() + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_connection_error_exhausts_retries(mock_sleep: AsyncMock) -> None: + """Async: connection error exhausts retries then raises.""" + mock_client = MagicMock() + mock_client.request = AsyncMock(side_effect=httpx.ConnectError("connection failed")) + http_client = _make_async_http_client(mock_client) + + with pytest.raises(httpx.ConnectError): + await http_client.request( + path="/test", + method="GET", + request_options={"max_retries": 2}, + ) + + # 1 initial + 2 retries = 3 total attempts + assert mock_client.request.call_count == 3 + assert mock_sleep.call_count == 2 + + +# --------------------------------------------------------------------------- +# base_max_retries constructor parameter tests +# --------------------------------------------------------------------------- + + +def test_sync_http_client_default_base_max_retries() -> None: + """HttpClient defaults to base_max_retries=2.""" + http_client = HttpClient( + httpx_client=MagicMock(), # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + ) + assert http_client.base_max_retries == 2 + + +def test_async_http_client_default_base_max_retries() -> None: + """AsyncHttpClient defaults to base_max_retries=2.""" + http_client = AsyncHttpClient( + httpx_client=MagicMock(), # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + ) + assert http_client.base_max_retries == 2 + + +def test_sync_http_client_custom_base_max_retries() -> None: + """HttpClient accepts a custom base_max_retries value.""" + http_client = HttpClient( + httpx_client=MagicMock(), # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_max_retries=5, + ) + assert http_client.base_max_retries == 5 + + +def test_async_http_client_custom_base_max_retries() -> None: + """AsyncHttpClient accepts a custom base_max_retries value.""" + http_client = AsyncHttpClient( + httpx_client=MagicMock(), # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_max_retries=5, + ) + assert http_client.base_max_retries == 5 + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_base_max_retries_zero_disables_retries(mock_sleep: MagicMock) -> None: + """Sync: base_max_retries=0 disables retries when no request_options override.""" + mock_client = MagicMock() + mock_client.request.side_effect = httpx.ConnectError("connection failed") + http_client = HttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=0, + ) + + with pytest.raises(httpx.ConnectError): + http_client.request(path="/test", method="GET") + + # No retries, just the initial attempt + assert mock_client.request.call_count == 1 + mock_sleep.assert_not_called() + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_base_max_retries_zero_disables_retries(mock_sleep: AsyncMock) -> None: + """Async: base_max_retries=0 disables retries when no request_options override.""" + mock_client = MagicMock() + mock_client.request = AsyncMock(side_effect=httpx.ConnectError("connection failed")) + http_client = AsyncHttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=0, + ) + + with pytest.raises(httpx.ConnectError): + await http_client.request(path="/test", method="GET") + + # No retries, just the initial attempt + assert mock_client.request.call_count == 1 + mock_sleep.assert_not_called() + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_request_options_override_base_max_retries(mock_sleep: MagicMock) -> None: + """Sync: request_options max_retries overrides base_max_retries.""" + mock_client = MagicMock() + mock_client.request.side_effect = [ + httpx.ConnectError("connection failed"), + httpx.ConnectError("connection failed"), + _DummyResponse(), + ] + http_client = HttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=0, # base says no retries + ) + + # But request_options overrides to allow 2 retries + response = http_client.request( + path="/test", + method="GET", + request_options={"max_retries": 2}, + ) + + assert response.status_code == 200 + # 1 initial + 2 retries = 3 total attempts + assert mock_client.request.call_count == 3 + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_request_options_override_base_max_retries(mock_sleep: AsyncMock) -> None: + """Async: request_options max_retries overrides base_max_retries.""" + mock_client = MagicMock() + mock_client.request = AsyncMock( + side_effect=[ + httpx.ConnectError("connection failed"), + httpx.ConnectError("connection failed"), + _DummyResponse(), + ] + ) + http_client = AsyncHttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=0, # base says no retries + ) + + # But request_options overrides to allow 2 retries + response = await http_client.request( + path="/test", + method="GET", + request_options={"max_retries": 2}, + ) + + assert response.status_code == 200 + # 1 initial + 2 retries = 3 total attempts + assert mock_client.request.call_count == 3 + + +@patch("auth0.management.core.http_client.time.sleep", return_value=None) +def test_sync_base_max_retries_used_as_default(mock_sleep: MagicMock) -> None: + """Sync: base_max_retries is used when request_options has no max_retries.""" + mock_client = MagicMock() + mock_client.request.side_effect = [ + httpx.ConnectError("fail"), + httpx.ConnectError("fail"), + httpx.ConnectError("fail"), + _DummyResponse(), + ] + http_client = HttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=3, + ) + + response = http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + # 1 initial + 3 retries = 4 total attempts + assert mock_client.request.call_count == 4 + + +@pytest.mark.asyncio +@patch("auth0.management.core.http_client.asyncio.sleep", new_callable=AsyncMock) +async def test_async_base_max_retries_used_as_default(mock_sleep: AsyncMock) -> None: + """Async: base_max_retries is used when request_options has no max_retries.""" + mock_client = MagicMock() + mock_client.request = AsyncMock( + side_effect=[ + httpx.ConnectError("fail"), + httpx.ConnectError("fail"), + httpx.ConnectError("fail"), + _DummyResponse(), + ] + ) + http_client = AsyncHttpClient( + httpx_client=mock_client, # type: ignore[arg-type] + base_timeout=lambda: None, + base_headers=lambda: {}, + base_url=lambda: "https://example.com", + base_max_retries=3, + ) + + response = await http_client.request(path="/test", method="GET") + + assert response.status_code == 200 + # 1 initial + 3 retries = 4 total attempts + assert mock_client.request.call_count == 4 diff --git a/tests/wire/conftest.py b/tests/wire/conftest.py index 252a18dd..bc3cd5df 100644 --- a/tests/wire/conftest.py +++ b/tests/wire/conftest.py @@ -25,9 +25,8 @@ def _get_wiremock_base_url() -> str: - """Returns the WireMock base URL using the dynamically assigned port.""" - port = os.environ.get("WIREMOCK_PORT", "8080") - return f"http://localhost:{port}" + """Returns the WireMock base URL from the WIREMOCK_URL environment variable.""" + return os.environ.get("WIREMOCK_URL", "http://localhost:8080") def get_client(test_id: str) -> Auth0: diff --git a/tests/wire/test_actions.py b/tests/wire/test_actions.py index b490b5a6..a33ac236 100644 --- a/tests/wire/test_actions.py +++ b/tests/wire/test_actions.py @@ -1,12 +1,19 @@ from .conftest import get_client, verify_request_count +from auth0.management import ActionTrigger + def test_actions_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.list_.0" client = get_client(test_id) client.actions.list( - trigger_id="post-login", action_name="actionName", deployed=True, page=1, per_page=1, installed=True + trigger_id="post-login", + action_name="actionName", + deployed=True, + page=1, + per_page=1, + installed=True, ) verify_request_count( test_id, @@ -28,7 +35,14 @@ def test_actions_create() -> None: """Test create endpoint with WireMock""" test_id = "actions.create.0" client = get_client(test_id) - client.actions.create(name="name", supported_triggers=[{"id": "post-login"}]) + client.actions.create( + name="name", + supported_triggers=[ + ActionTrigger( + id="post-login", + ) + ], + ) verify_request_count(test_id, "POST", "/actions/actions", None, 1) @@ -36,7 +50,9 @@ def test_actions_get() -> None: """Test get endpoint with WireMock""" test_id = "actions.get.0" client = get_client(test_id) - client.actions.get(id="id") + client.actions.get( + id="id", + ) verify_request_count(test_id, "GET", "/actions/actions/id", None, 1) @@ -44,7 +60,10 @@ def test_actions_delete() -> None: """Test delete endpoint with WireMock""" test_id = "actions.delete.0" client = get_client(test_id) - client.actions.delete(id="id", force=True) + client.actions.delete( + id="id", + force=True, + ) verify_request_count(test_id, "DELETE", "/actions/actions/id", {"force": "true"}, 1) @@ -52,7 +71,9 @@ def test_actions_update() -> None: """Test update endpoint with WireMock""" test_id = "actions.update.0" client = get_client(test_id) - client.actions.update(id="id") + client.actions.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/actions/actions/id", None, 1) @@ -60,7 +81,9 @@ def test_actions_deploy() -> None: """Test deploy endpoint with WireMock""" test_id = "actions.deploy.0" client = get_client(test_id) - client.actions.deploy(id="id") + client.actions.deploy( + id="id", + ) verify_request_count(test_id, "POST", "/actions/actions/id/deploy", None, 1) @@ -68,5 +91,8 @@ def test_actions_test() -> None: """Test test endpoint with WireMock""" test_id = "actions.test.0" client = get_client(test_id) - client.actions.test(id="id", payload={"key": "value"}) + client.actions.test( + id="id", + payload={"key": "value"}, + ) verify_request_count(test_id, "POST", "/actions/actions/id/test", None, 1) diff --git a/tests/wire/test_actions_executions.py b/tests/wire/test_actions_executions.py index 01a59518..b229b3a5 100644 --- a/tests/wire/test_actions_executions.py +++ b/tests/wire/test_actions_executions.py @@ -5,5 +5,7 @@ def test_actions_executions_get() -> None: """Test get endpoint with WireMock""" test_id = "actions.executions.get.0" client = get_client(test_id) - client.actions.executions.get(id="id") + client.actions.executions.get( + id="id", + ) verify_request_count(test_id, "GET", "/actions/executions/id", None, 1) diff --git a/tests/wire/test_actions_modules.py b/tests/wire/test_actions_modules.py index 9b943d12..b1c3196f 100644 --- a/tests/wire/test_actions_modules.py +++ b/tests/wire/test_actions_modules.py @@ -5,7 +5,10 @@ def test_actions_modules_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.modules.list_.0" client = get_client(test_id) - client.actions.modules.list(page=1, per_page=1) + client.actions.modules.list( + page=1, + per_page=1, + ) verify_request_count(test_id, "GET", "/actions/modules", {"page": "1", "per_page": "1"}, 1) @@ -13,7 +16,10 @@ def test_actions_modules_create() -> None: """Test create endpoint with WireMock""" test_id = "actions.modules.create.0" client = get_client(test_id) - client.actions.modules.create(name="name", code="code") + client.actions.modules.create( + name="name", + code="code", + ) verify_request_count(test_id, "POST", "/actions/modules", None, 1) @@ -21,7 +27,9 @@ def test_actions_modules_get() -> None: """Test get endpoint with WireMock""" test_id = "actions.modules.get.0" client = get_client(test_id) - client.actions.modules.get(id="id") + client.actions.modules.get( + id="id", + ) verify_request_count(test_id, "GET", "/actions/modules/id", None, 1) @@ -29,7 +37,9 @@ def test_actions_modules_delete() -> None: """Test delete endpoint with WireMock""" test_id = "actions.modules.delete.0" client = get_client(test_id) - client.actions.modules.delete(id="id") + client.actions.modules.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/actions/modules/id", None, 1) @@ -37,7 +47,9 @@ def test_actions_modules_update() -> None: """Test update endpoint with WireMock""" test_id = "actions.modules.update.0" client = get_client(test_id) - client.actions.modules.update(id="id") + client.actions.modules.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/actions/modules/id", None, 1) @@ -45,7 +57,11 @@ def test_actions_modules_list_actions() -> None: """Test listActions endpoint with WireMock""" test_id = "actions.modules.list_actions.0" client = get_client(test_id) - client.actions.modules.list_actions(id="id", page=1, per_page=1) + client.actions.modules.list_actions( + id="id", + page=1, + per_page=1, + ) verify_request_count(test_id, "GET", "/actions/modules/id/actions", {"page": "1", "per_page": "1"}, 1) @@ -53,5 +69,8 @@ def test_actions_modules_rollback() -> None: """Test rollback endpoint with WireMock""" test_id = "actions.modules.rollback.0" client = get_client(test_id) - client.actions.modules.rollback(id="id", module_version_id="module_version_id") + client.actions.modules.rollback( + id="id", + module_version_id="module_version_id", + ) verify_request_count(test_id, "POST", "/actions/modules/id/rollback", None, 1) diff --git a/tests/wire/test_actions_modules_versions.py b/tests/wire/test_actions_modules_versions.py index 2d77ea15..2cbecebc 100644 --- a/tests/wire/test_actions_modules_versions.py +++ b/tests/wire/test_actions_modules_versions.py @@ -5,7 +5,11 @@ def test_actions_modules_versions_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.modules.versions.list_.0" client = get_client(test_id) - client.actions.modules.versions.list(id="id", page=1, per_page=1) + client.actions.modules.versions.list( + id="id", + page=1, + per_page=1, + ) verify_request_count(test_id, "GET", "/actions/modules/id/versions", {"page": "1", "per_page": "1"}, 1) @@ -13,7 +17,9 @@ def test_actions_modules_versions_create() -> None: """Test create endpoint with WireMock""" test_id = "actions.modules.versions.create.0" client = get_client(test_id) - client.actions.modules.versions.create(id="id") + client.actions.modules.versions.create( + id="id", + ) verify_request_count(test_id, "POST", "/actions/modules/id/versions", None, 1) @@ -21,5 +27,8 @@ def test_actions_modules_versions_get() -> None: """Test get endpoint with WireMock""" test_id = "actions.modules.versions.get.0" client = get_client(test_id) - client.actions.modules.versions.get(id="id", version_id="versionId") + client.actions.modules.versions.get( + id="id", + version_id="versionId", + ) verify_request_count(test_id, "GET", "/actions/modules/id/versions/versionId", None, 1) diff --git a/tests/wire/test_actions_triggers_bindings.py b/tests/wire/test_actions_triggers_bindings.py index 1f60fe08..9906dd9c 100644 --- a/tests/wire/test_actions_triggers_bindings.py +++ b/tests/wire/test_actions_triggers_bindings.py @@ -5,7 +5,11 @@ def test_actions_triggers_bindings_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.triggers.bindings.list_.0" client = get_client(test_id) - client.actions.triggers.bindings.list(trigger_id="post-login", page=1, per_page=1) + client.actions.triggers.bindings.list( + trigger_id="post-login", + page=1, + per_page=1, + ) verify_request_count(test_id, "GET", "/actions/triggers/post-login/bindings", {"page": "1", "per_page": "1"}, 1) @@ -13,5 +17,7 @@ def test_actions_triggers_bindings_update_many() -> None: """Test updateMany endpoint with WireMock""" test_id = "actions.triggers.bindings.update_many.0" client = get_client(test_id) - client.actions.triggers.bindings.update_many(trigger_id="post-login") + client.actions.triggers.bindings.update_many( + trigger_id="post-login", + ) verify_request_count(test_id, "PATCH", "/actions/triggers/post-login/bindings", None, 1) diff --git a/tests/wire/test_actions_versions.py b/tests/wire/test_actions_versions.py index 38c68b2c..fa52d6aa 100644 --- a/tests/wire/test_actions_versions.py +++ b/tests/wire/test_actions_versions.py @@ -1,11 +1,17 @@ from .conftest import get_client, verify_request_count +from auth0.management import DeployActionVersionRequestContent + def test_actions_versions_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.versions.list_.0" client = get_client(test_id) - client.actions.versions.list(action_id="actionId", page=1, per_page=1) + client.actions.versions.list( + action_id="actionId", + page=1, + per_page=1, + ) verify_request_count(test_id, "GET", "/actions/actions/actionId/versions", {"page": "1", "per_page": "1"}, 1) @@ -13,7 +19,10 @@ def test_actions_versions_get() -> None: """Test get endpoint with WireMock""" test_id = "actions.versions.get.0" client = get_client(test_id) - client.actions.versions.get(action_id="actionId", id="id") + client.actions.versions.get( + action_id="actionId", + id="id", + ) verify_request_count(test_id, "GET", "/actions/actions/actionId/versions/id", None, 1) @@ -21,5 +30,9 @@ def test_actions_versions_deploy() -> None: """Test deploy endpoint with WireMock""" test_id = "actions.versions.deploy.0" client = get_client(test_id) - client.actions.versions.deploy(action_id="actionId", id="id", request={}) + client.actions.versions.deploy( + action_id="actionId", + id="id", + request=DeployActionVersionRequestContent(), + ) verify_request_count(test_id, "POST", "/actions/actions/actionId/versions/id/deploy", None, 1) diff --git a/tests/wire/test_anomaly_blocks.py b/tests/wire/test_anomaly_blocks.py index e636a0d4..be48ba26 100644 --- a/tests/wire/test_anomaly_blocks.py +++ b/tests/wire/test_anomaly_blocks.py @@ -5,7 +5,9 @@ def test_anomaly_blocks_check_ip() -> None: """Test checkIp endpoint with WireMock""" test_id = "anomaly.blocks.check_ip.0" client = get_client(test_id) - client.anomaly.blocks.check_ip(id="id") + client.anomaly.blocks.check_ip( + id="id", + ) verify_request_count(test_id, "GET", "/anomaly/blocks/ips/id", None, 1) @@ -13,5 +15,7 @@ def test_anomaly_blocks_unblock_ip() -> None: """Test unblockIp endpoint with WireMock""" test_id = "anomaly.blocks.unblock_ip.0" client = get_client(test_id) - client.anomaly.blocks.unblock_ip(id="id") + client.anomaly.blocks.unblock_ip( + id="id", + ) verify_request_count(test_id, "DELETE", "/anomaly/blocks/ips/id", None, 1) diff --git a/tests/wire/test_branding_phone_providers.py b/tests/wire/test_branding_phone_providers.py index b15ae130..5cbdb1f0 100644 --- a/tests/wire/test_branding_phone_providers.py +++ b/tests/wire/test_branding_phone_providers.py @@ -1,11 +1,15 @@ from .conftest import get_client, verify_request_count +from auth0.management import TwilioProviderCredentials + def test_branding_phone_providers_list_() -> None: """Test list endpoint with WireMock""" test_id = "branding.phone.providers.list_.0" client = get_client(test_id) - client.branding.phone.providers.list(disabled=True) + client.branding.phone.providers.list( + disabled=True, + ) verify_request_count(test_id, "GET", "/branding/phone/providers", {"disabled": "true"}, 1) @@ -13,7 +17,12 @@ def test_branding_phone_providers_create() -> None: """Test create endpoint with WireMock""" test_id = "branding.phone.providers.create.0" client = get_client(test_id) - client.branding.phone.providers.create(name="twilio", credentials={"auth_token": "auth_token"}) + client.branding.phone.providers.create( + name="twilio", + credentials=TwilioProviderCredentials( + auth_token="auth_token", + ), + ) verify_request_count(test_id, "POST", "/branding/phone/providers", None, 1) @@ -21,7 +30,9 @@ def test_branding_phone_providers_get() -> None: """Test get endpoint with WireMock""" test_id = "branding.phone.providers.get.0" client = get_client(test_id) - client.branding.phone.providers.get(id="id") + client.branding.phone.providers.get( + id="id", + ) verify_request_count(test_id, "GET", "/branding/phone/providers/id", None, 1) @@ -29,7 +40,9 @@ def test_branding_phone_providers_delete() -> None: """Test delete endpoint with WireMock""" test_id = "branding.phone.providers.delete.0" client = get_client(test_id) - client.branding.phone.providers.delete(id="id") + client.branding.phone.providers.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/branding/phone/providers/id", None, 1) @@ -37,7 +50,9 @@ def test_branding_phone_providers_update() -> None: """Test update endpoint with WireMock""" test_id = "branding.phone.providers.update.0" client = get_client(test_id) - client.branding.phone.providers.update(id="id") + client.branding.phone.providers.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/branding/phone/providers/id", None, 1) @@ -45,5 +60,8 @@ def test_branding_phone_providers_test() -> None: """Test test endpoint with WireMock""" test_id = "branding.phone.providers.test.0" client = get_client(test_id) - client.branding.phone.providers.test(id="id", to="to") + client.branding.phone.providers.test( + id="id", + to="to", + ) verify_request_count(test_id, "POST", "/branding/phone/providers/id/try", None, 1) diff --git a/tests/wire/test_branding_phone_templates.py b/tests/wire/test_branding_phone_templates.py index e868a0fe..63e8a905 100644 --- a/tests/wire/test_branding_phone_templates.py +++ b/tests/wire/test_branding_phone_templates.py @@ -5,7 +5,9 @@ def test_branding_phone_templates_list_() -> None: """Test list endpoint with WireMock""" test_id = "branding.phone.templates.list_.0" client = get_client(test_id) - client.branding.phone.templates.list(disabled=True) + client.branding.phone.templates.list( + disabled=True, + ) verify_request_count(test_id, "GET", "/branding/phone/templates", {"disabled": "true"}, 1) @@ -21,7 +23,9 @@ def test_branding_phone_templates_get() -> None: """Test get endpoint with WireMock""" test_id = "branding.phone.templates.get.0" client = get_client(test_id) - client.branding.phone.templates.get(id="id") + client.branding.phone.templates.get( + id="id", + ) verify_request_count(test_id, "GET", "/branding/phone/templates/id", None, 1) @@ -29,7 +33,9 @@ def test_branding_phone_templates_delete() -> None: """Test delete endpoint with WireMock""" test_id = "branding.phone.templates.delete.0" client = get_client(test_id) - client.branding.phone.templates.delete(id="id") + client.branding.phone.templates.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/branding/phone/templates/id", None, 1) @@ -37,7 +43,9 @@ def test_branding_phone_templates_update() -> None: """Test update endpoint with WireMock""" test_id = "branding.phone.templates.update.0" client = get_client(test_id) - client.branding.phone.templates.update(id="id") + client.branding.phone.templates.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/branding/phone/templates/id", None, 1) @@ -47,9 +55,7 @@ def test_branding_phone_templates_reset() -> None: client = get_client(test_id) client.branding.phone.templates.reset( id="id", - request={ - "key": "value", - }, + request={"key": "value"}, ) verify_request_count(test_id, "PATCH", "/branding/phone/templates/id/reset", None, 1) @@ -58,5 +64,8 @@ def test_branding_phone_templates_test() -> None: """Test test endpoint with WireMock""" test_id = "branding.phone.templates.test.0" client = get_client(test_id) - client.branding.phone.templates.test(id="id", to="to") + client.branding.phone.templates.test( + id="id", + to="to", + ) verify_request_count(test_id, "POST", "/branding/phone/templates/id/try", None, 1) diff --git a/tests/wire/test_branding_templates.py b/tests/wire/test_branding_templates.py index 23df4428..72b4974b 100644 --- a/tests/wire/test_branding_templates.py +++ b/tests/wire/test_branding_templates.py @@ -13,7 +13,9 @@ def test_branding_templates_update_universal_login() -> None: """Test updateUniversalLogin endpoint with WireMock""" test_id = "branding.templates.update_universal_login.0" client = get_client(test_id) - client.branding.templates.update_universal_login(request="string") + client.branding.templates.update_universal_login( + request="string", + ) verify_request_count(test_id, "PUT", "/branding/templates/universal-login", None, 1) diff --git a/tests/wire/test_branding_themes.py b/tests/wire/test_branding_themes.py index 8a336e45..1d75cdd7 100644 --- a/tests/wire/test_branding_themes.py +++ b/tests/wire/test_branding_themes.py @@ -1,63 +1,95 @@ from .conftest import get_client, verify_request_count +from auth0.management import ( + BrandingThemeBorders, + BrandingThemeColors, + BrandingThemeFontBodyText, + BrandingThemeFontButtonsText, + BrandingThemeFontInputLabels, + BrandingThemeFontLinks, + BrandingThemeFonts, + BrandingThemeFontSubtitle, + BrandingThemeFontTitle, + BrandingThemePageBackground, + BrandingThemeWidget, +) + def test_branding_themes_create() -> None: """Test create endpoint with WireMock""" test_id = "branding.themes.create.0" client = get_client(test_id) client.branding.themes.create( - borders={ - "button_border_radius": 1.1, - "button_border_weight": 1.1, - "buttons_style": "pill", - "input_border_radius": 1.1, - "input_border_weight": 1.1, - "inputs_style": "pill", - "show_widget_shadow": True, - "widget_border_weight": 1.1, - "widget_corner_radius": 1.1, - }, - colors={ - "body_text": "body_text", - "error": "error", - "header": "header", - "icons": "icons", - "input_background": "input_background", - "input_border": "input_border", - "input_filled_text": "input_filled_text", - "input_labels_placeholders": "input_labels_placeholders", - "links_focused_components": "links_focused_components", - "primary_button": "primary_button", - "primary_button_label": "primary_button_label", - "secondary_button_border": "secondary_button_border", - "secondary_button_label": "secondary_button_label", - "success": "success", - "widget_background": "widget_background", - "widget_border": "widget_border", - }, - fonts={ - "body_text": {"bold": True, "size": 1.1}, - "buttons_text": {"bold": True, "size": 1.1}, - "font_url": "font_url", - "input_labels": {"bold": True, "size": 1.1}, - "links": {"bold": True, "size": 1.1}, - "links_style": "normal", - "reference_text_size": 1.1, - "subtitle": {"bold": True, "size": 1.1}, - "title": {"bold": True, "size": 1.1}, - }, - page_background={ - "background_color": "background_color", - "background_image_url": "background_image_url", - "page_layout": "center", - }, - widget={ - "header_text_alignment": "center", - "logo_height": 1.1, - "logo_position": "center", - "logo_url": "logo_url", - "social_buttons_layout": "bottom", - }, + borders=BrandingThemeBorders( + button_border_radius=1.1, + button_border_weight=1.1, + buttons_style="pill", + input_border_radius=1.1, + input_border_weight=1.1, + inputs_style="pill", + show_widget_shadow=True, + widget_border_weight=1.1, + widget_corner_radius=1.1, + ), + colors=BrandingThemeColors( + body_text="body_text", + error="error", + header="header", + icons="icons", + input_background="input_background", + input_border="input_border", + input_filled_text="input_filled_text", + input_labels_placeholders="input_labels_placeholders", + links_focused_components="links_focused_components", + primary_button="primary_button", + primary_button_label="primary_button_label", + secondary_button_border="secondary_button_border", + secondary_button_label="secondary_button_label", + success="success", + widget_background="widget_background", + widget_border="widget_border", + ), + fonts=BrandingThemeFonts( + body_text=BrandingThemeFontBodyText( + bold=True, + size=1.1, + ), + buttons_text=BrandingThemeFontButtonsText( + bold=True, + size=1.1, + ), + font_url="font_url", + input_labels=BrandingThemeFontInputLabels( + bold=True, + size=1.1, + ), + links=BrandingThemeFontLinks( + bold=True, + size=1.1, + ), + links_style="normal", + reference_text_size=1.1, + subtitle=BrandingThemeFontSubtitle( + bold=True, + size=1.1, + ), + title=BrandingThemeFontTitle( + bold=True, + size=1.1, + ), + ), + page_background=BrandingThemePageBackground( + background_color="background_color", + background_image_url="background_image_url", + page_layout="center", + ), + widget=BrandingThemeWidget( + header_text_alignment="center", + logo_height=1.1, + logo_position="center", + logo_url="logo_url", + social_buttons_layout="bottom", + ), ) verify_request_count(test_id, "POST", "/branding/themes", None, 1) @@ -74,7 +106,9 @@ def test_branding_themes_get() -> None: """Test get endpoint with WireMock""" test_id = "branding.themes.get.0" client = get_client(test_id) - client.branding.themes.get(theme_id="themeId") + client.branding.themes.get( + theme_id="themeId", + ) verify_request_count(test_id, "GET", "/branding/themes/themeId", None, 1) @@ -82,7 +116,9 @@ def test_branding_themes_delete() -> None: """Test delete endpoint with WireMock""" test_id = "branding.themes.delete.0" client = get_client(test_id) - client.branding.themes.delete(theme_id="themeId") + client.branding.themes.delete( + theme_id="themeId", + ) verify_request_count(test_id, "DELETE", "/branding/themes/themeId", None, 1) @@ -92,57 +128,75 @@ def test_branding_themes_update() -> None: client = get_client(test_id) client.branding.themes.update( theme_id="themeId", - borders={ - "button_border_radius": 1.1, - "button_border_weight": 1.1, - "buttons_style": "pill", - "input_border_radius": 1.1, - "input_border_weight": 1.1, - "inputs_style": "pill", - "show_widget_shadow": True, - "widget_border_weight": 1.1, - "widget_corner_radius": 1.1, - }, - colors={ - "body_text": "body_text", - "error": "error", - "header": "header", - "icons": "icons", - "input_background": "input_background", - "input_border": "input_border", - "input_filled_text": "input_filled_text", - "input_labels_placeholders": "input_labels_placeholders", - "links_focused_components": "links_focused_components", - "primary_button": "primary_button", - "primary_button_label": "primary_button_label", - "secondary_button_border": "secondary_button_border", - "secondary_button_label": "secondary_button_label", - "success": "success", - "widget_background": "widget_background", - "widget_border": "widget_border", - }, - fonts={ - "body_text": {"bold": True, "size": 1.1}, - "buttons_text": {"bold": True, "size": 1.1}, - "font_url": "font_url", - "input_labels": {"bold": True, "size": 1.1}, - "links": {"bold": True, "size": 1.1}, - "links_style": "normal", - "reference_text_size": 1.1, - "subtitle": {"bold": True, "size": 1.1}, - "title": {"bold": True, "size": 1.1}, - }, - page_background={ - "background_color": "background_color", - "background_image_url": "background_image_url", - "page_layout": "center", - }, - widget={ - "header_text_alignment": "center", - "logo_height": 1.1, - "logo_position": "center", - "logo_url": "logo_url", - "social_buttons_layout": "bottom", - }, + borders=BrandingThemeBorders( + button_border_radius=1.1, + button_border_weight=1.1, + buttons_style="pill", + input_border_radius=1.1, + input_border_weight=1.1, + inputs_style="pill", + show_widget_shadow=True, + widget_border_weight=1.1, + widget_corner_radius=1.1, + ), + colors=BrandingThemeColors( + body_text="body_text", + error="error", + header="header", + icons="icons", + input_background="input_background", + input_border="input_border", + input_filled_text="input_filled_text", + input_labels_placeholders="input_labels_placeholders", + links_focused_components="links_focused_components", + primary_button="primary_button", + primary_button_label="primary_button_label", + secondary_button_border="secondary_button_border", + secondary_button_label="secondary_button_label", + success="success", + widget_background="widget_background", + widget_border="widget_border", + ), + fonts=BrandingThemeFonts( + body_text=BrandingThemeFontBodyText( + bold=True, + size=1.1, + ), + buttons_text=BrandingThemeFontButtonsText( + bold=True, + size=1.1, + ), + font_url="font_url", + input_labels=BrandingThemeFontInputLabels( + bold=True, + size=1.1, + ), + links=BrandingThemeFontLinks( + bold=True, + size=1.1, + ), + links_style="normal", + reference_text_size=1.1, + subtitle=BrandingThemeFontSubtitle( + bold=True, + size=1.1, + ), + title=BrandingThemeFontTitle( + bold=True, + size=1.1, + ), + ), + page_background=BrandingThemePageBackground( + background_color="background_color", + background_image_url="background_image_url", + page_layout="center", + ), + widget=BrandingThemeWidget( + header_text_alignment="center", + logo_height=1.1, + logo_position="center", + logo_url="logo_url", + social_buttons_layout="bottom", + ), ) verify_request_count(test_id, "PATCH", "/branding/themes/themeId", None, 1) diff --git a/tests/wire/test_clientGrants.py b/tests/wire/test_clientGrants.py index d0bb02b9..e54b26f3 100644 --- a/tests/wire/test_clientGrants.py +++ b/tests/wire/test_clientGrants.py @@ -33,7 +33,9 @@ def test_clientGrants_create() -> None: """Test create endpoint with WireMock""" test_id = "client_grants.create.0" client = get_client(test_id) - client.client_grants.create(audience="audience") + client.client_grants.create( + audience="audience", + ) verify_request_count(test_id, "POST", "/client-grants", None, 1) @@ -41,7 +43,9 @@ def test_clientGrants_get() -> None: """Test get endpoint with WireMock""" test_id = "client_grants.get.0" client = get_client(test_id) - client.client_grants.get(id="id") + client.client_grants.get( + id="id", + ) verify_request_count(test_id, "GET", "/client-grants/id", None, 1) @@ -49,7 +53,9 @@ def test_clientGrants_delete() -> None: """Test delete endpoint with WireMock""" test_id = "client_grants.delete.0" client = get_client(test_id) - client.client_grants.delete(id="id") + client.client_grants.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/client-grants/id", None, 1) @@ -57,5 +63,7 @@ def test_clientGrants_update() -> None: """Test update endpoint with WireMock""" test_id = "client_grants.update.0" client = get_client(test_id) - client.client_grants.update(id="id") + client.client_grants.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/client-grants/id", None, 1) diff --git a/tests/wire/test_clientGrants_organizations.py b/tests/wire/test_clientGrants_organizations.py index f8db8595..d997d119 100644 --- a/tests/wire/test_clientGrants_organizations.py +++ b/tests/wire/test_clientGrants_organizations.py @@ -5,5 +5,9 @@ def test_clientGrants_organizations_list_() -> None: """Test list endpoint with WireMock""" test_id = "client_grants.organizations.list_.0" client = get_client(test_id) - client.client_grants.organizations.list(id="id", from_="from", take=1) + client.client_grants.organizations.list( + id="id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/client-grants/id/organizations", {"from": "from", "take": "1"}, 1) diff --git a/tests/wire/test_clients.py b/tests/wire/test_clients.py index b1e98eb8..fcac1939 100644 --- a/tests/wire/test_clients.py +++ b/tests/wire/test_clients.py @@ -41,7 +41,9 @@ def test_clients_create() -> None: """Test create endpoint with WireMock""" test_id = "clients.create.0" client = get_client(test_id) - client.clients.create(name="name") + client.clients.create( + name="name", + ) verify_request_count(test_id, "POST", "/clients", None, 1) @@ -49,7 +51,9 @@ def test_clients_preview_cimd_metadata() -> None: """Test previewCimdMetadata endpoint with WireMock""" test_id = "clients.preview_cimd_metadata.0" client = get_client(test_id) - client.clients.preview_cimd_metadata(external_client_id="external_client_id") + client.clients.preview_cimd_metadata( + external_client_id="external_client_id", + ) verify_request_count(test_id, "POST", "/clients/cimd/preview", None, 1) @@ -57,7 +61,9 @@ def test_clients_register_cimd_client() -> None: """Test registerCimdClient endpoint with WireMock""" test_id = "clients.register_cimd_client.0" client = get_client(test_id) - client.clients.register_cimd_client(external_client_id="external_client_id") + client.clients.register_cimd_client( + external_client_id="external_client_id", + ) verify_request_count(test_id, "POST", "/clients/cimd/register", None, 1) @@ -65,7 +71,11 @@ def test_clients_get() -> None: """Test get endpoint with WireMock""" test_id = "clients.get.0" client = get_client(test_id) - client.clients.get(id="id", fields="fields", include_fields=True) + client.clients.get( + id="id", + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/clients/id", {"fields": "fields", "include_fields": "true"}, 1) @@ -73,7 +83,9 @@ def test_clients_delete() -> None: """Test delete endpoint with WireMock""" test_id = "clients.delete.0" client = get_client(test_id) - client.clients.delete(id="id") + client.clients.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/clients/id", None, 1) @@ -81,7 +93,9 @@ def test_clients_update() -> None: """Test update endpoint with WireMock""" test_id = "clients.update.0" client = get_client(test_id) - client.clients.update(id="id") + client.clients.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/clients/id", None, 1) @@ -89,5 +103,7 @@ def test_clients_rotate_secret() -> None: """Test rotateSecret endpoint with WireMock""" test_id = "clients.rotate_secret.0" client = get_client(test_id) - client.clients.rotate_secret(id="id") + client.clients.rotate_secret( + id="id", + ) verify_request_count(test_id, "POST", "/clients/id/rotate-secret", None, 1) diff --git a/tests/wire/test_clients_connections.py b/tests/wire/test_clients_connections.py index 949a47a9..fea077e8 100644 --- a/tests/wire/test_clients_connections.py +++ b/tests/wire/test_clients_connections.py @@ -5,7 +5,13 @@ def test_clients_connections_get() -> None: """Test get endpoint with WireMock""" test_id = "clients.connections.get.0" client = get_client(test_id) - client.clients.connections.get(id="id", from_="from", take=1, fields="fields", include_fields=True) + client.clients.connections.get( + id="id", + from_="from", + take=1, + fields="fields", + include_fields=True, + ) verify_request_count( test_id, "GET", diff --git a/tests/wire/test_clients_credentials.py b/tests/wire/test_clients_credentials.py index de673006..9187df0a 100644 --- a/tests/wire/test_clients_credentials.py +++ b/tests/wire/test_clients_credentials.py @@ -5,7 +5,9 @@ def test_clients_credentials_list_() -> None: """Test list endpoint with WireMock""" test_id = "clients.credentials.list_.0" client = get_client(test_id) - client.clients.credentials.list(client_id="client_id") + client.clients.credentials.list( + client_id="client_id", + ) verify_request_count(test_id, "GET", "/clients/client_id/credentials", None, 1) @@ -13,7 +15,10 @@ def test_clients_credentials_create() -> None: """Test create endpoint with WireMock""" test_id = "clients.credentials.create.0" client = get_client(test_id) - client.clients.credentials.create(client_id="client_id", credential_type="public_key") + client.clients.credentials.create( + client_id="client_id", + credential_type="public_key", + ) verify_request_count(test_id, "POST", "/clients/client_id/credentials", None, 1) @@ -21,7 +26,10 @@ def test_clients_credentials_get() -> None: """Test get endpoint with WireMock""" test_id = "clients.credentials.get.0" client = get_client(test_id) - client.clients.credentials.get(client_id="client_id", credential_id="credential_id") + client.clients.credentials.get( + client_id="client_id", + credential_id="credential_id", + ) verify_request_count(test_id, "GET", "/clients/client_id/credentials/credential_id", None, 1) @@ -29,7 +37,10 @@ def test_clients_credentials_delete() -> None: """Test delete endpoint with WireMock""" test_id = "clients.credentials.delete.0" client = get_client(test_id) - client.clients.credentials.delete(client_id="client_id", credential_id="credential_id") + client.clients.credentials.delete( + client_id="client_id", + credential_id="credential_id", + ) verify_request_count(test_id, "DELETE", "/clients/client_id/credentials/credential_id", None, 1) @@ -37,5 +48,8 @@ def test_clients_credentials_update() -> None: """Test update endpoint with WireMock""" test_id = "clients.credentials.update.0" client = get_client(test_id) - client.clients.credentials.update(client_id="client_id", credential_id="credential_id") + client.clients.credentials.update( + client_id="client_id", + credential_id="credential_id", + ) verify_request_count(test_id, "PATCH", "/clients/client_id/credentials/credential_id", None, 1) diff --git a/tests/wire/test_connectionProfiles.py b/tests/wire/test_connectionProfiles.py index e6dfde55..04def4c8 100644 --- a/tests/wire/test_connectionProfiles.py +++ b/tests/wire/test_connectionProfiles.py @@ -5,7 +5,10 @@ def test_connectionProfiles_list_() -> None: """Test list endpoint with WireMock""" test_id = "connection_profiles.list_.0" client = get_client(test_id) - client.connection_profiles.list(from_="from", take=1) + client.connection_profiles.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/connection-profiles", {"from": "from", "take": "1"}, 1) @@ -13,7 +16,9 @@ def test_connectionProfiles_create() -> None: """Test create endpoint with WireMock""" test_id = "connection_profiles.create.0" client = get_client(test_id) - client.connection_profiles.create(name="name") + client.connection_profiles.create( + name="name", + ) verify_request_count(test_id, "POST", "/connection-profiles", None, 1) @@ -29,7 +34,9 @@ def test_connectionProfiles_get_template() -> None: """Test getTemplate endpoint with WireMock""" test_id = "connection_profiles.get_template.0" client = get_client(test_id) - client.connection_profiles.get_template(id="id") + client.connection_profiles.get_template( + id="id", + ) verify_request_count(test_id, "GET", "/connection-profiles/templates/id", None, 1) @@ -37,7 +44,9 @@ def test_connectionProfiles_get() -> None: """Test get endpoint with WireMock""" test_id = "connection_profiles.get.0" client = get_client(test_id) - client.connection_profiles.get(id="id") + client.connection_profiles.get( + id="id", + ) verify_request_count(test_id, "GET", "/connection-profiles/id", None, 1) @@ -45,7 +54,9 @@ def test_connectionProfiles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "connection_profiles.delete.0" client = get_client(test_id) - client.connection_profiles.delete(id="id") + client.connection_profiles.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/connection-profiles/id", None, 1) @@ -53,5 +64,7 @@ def test_connectionProfiles_update() -> None: """Test update endpoint with WireMock""" test_id = "connection_profiles.update.0" client = get_client(test_id) - client.connection_profiles.update(id="id") + client.connection_profiles.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/connection-profiles/id", None, 1) diff --git a/tests/wire/test_connections.py b/tests/wire/test_connections.py index 5da55d5f..ae6c0152 100644 --- a/tests/wire/test_connections.py +++ b/tests/wire/test_connections.py @@ -5,7 +5,13 @@ def test_connections_list_() -> None: """Test list endpoint with WireMock""" test_id = "connections.list_.0" client = get_client(test_id) - client.connections.list(from_="from", take=1, name="name", fields="fields", include_fields=True) + client.connections.list( + from_="from", + take=1, + name="name", + fields="fields", + include_fields=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +25,10 @@ def test_connections_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.create.0" client = get_client(test_id) - client.connections.create(name="name", strategy="ad") + client.connections.create( + name="name", + strategy="ad", + ) verify_request_count(test_id, "POST", "/connections", None, 1) @@ -27,7 +36,11 @@ def test_connections_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.get.0" client = get_client(test_id) - client.connections.get(id="id", fields="fields", include_fields=True) + client.connections.get( + id="id", + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/connections/id", {"fields": "fields", "include_fields": "true"}, 1) @@ -35,7 +48,9 @@ def test_connections_delete() -> None: """Test delete endpoint with WireMock""" test_id = "connections.delete.0" client = get_client(test_id) - client.connections.delete(id="id") + client.connections.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/connections/id", None, 1) @@ -43,7 +58,9 @@ def test_connections_update() -> None: """Test update endpoint with WireMock""" test_id = "connections.update.0" client = get_client(test_id) - client.connections.update(id="id") + client.connections.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/connections/id", None, 1) @@ -51,5 +68,7 @@ def test_connections_check_status() -> None: """Test checkStatus endpoint with WireMock""" test_id = "connections.check_status.0" client = get_client(test_id) - client.connections.check_status(id="id") + client.connections.check_status( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/status", None, 1) diff --git a/tests/wire/test_connections_clients.py b/tests/wire/test_connections_clients.py index 39369eee..72d44378 100644 --- a/tests/wire/test_connections_clients.py +++ b/tests/wire/test_connections_clients.py @@ -1,11 +1,17 @@ from .conftest import get_client, verify_request_count +from auth0.management import UpdateEnabledClientConnectionsRequestContentItem + def test_connections_clients_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.clients.get.0" client = get_client(test_id) - client.connections.clients.get(id="id", take=1, from_="from") + client.connections.clients.get( + id="id", + take=1, + from_="from", + ) verify_request_count(test_id, "GET", "/connections/id/clients", {"take": "1", "from": "from"}, 1) @@ -13,5 +19,13 @@ def test_connections_clients_update() -> None: """Test update endpoint with WireMock""" test_id = "connections.clients.update.0" client = get_client(test_id) - client.connections.clients.update(id="id", request=[{"client_id": "client_id", "status": True}]) + client.connections.clients.update( + id="id", + request=[ + UpdateEnabledClientConnectionsRequestContentItem( + client_id="client_id", + status=True, + ) + ], + ) verify_request_count(test_id, "PATCH", "/connections/id/clients", None, 1) diff --git a/tests/wire/test_connections_directoryProvisioning.py b/tests/wire/test_connections_directoryProvisioning.py index bf3b73e1..f730c17b 100644 --- a/tests/wire/test_connections_directoryProvisioning.py +++ b/tests/wire/test_connections_directoryProvisioning.py @@ -1,11 +1,16 @@ from .conftest import get_client, verify_request_count +from auth0.management import CreateDirectoryProvisioningRequestContent, UpdateDirectoryProvisioningRequestContent + def test_connections_directoryProvisioning_list_() -> None: """Test list endpoint with WireMock""" test_id = "connections.directory_provisioning.list_.0" client = get_client(test_id) - client.connections.directory_provisioning.list(from_="from", take=1) + client.connections.directory_provisioning.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/connections-directory-provisionings", {"from": "from", "take": "1"}, 1) @@ -13,7 +18,9 @@ def test_connections_directoryProvisioning_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.directory_provisioning.get.0" client = get_client(test_id) - client.connections.directory_provisioning.get(id="id") + client.connections.directory_provisioning.get( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/directory-provisioning", None, 1) @@ -21,7 +28,10 @@ def test_connections_directoryProvisioning_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.directory_provisioning.create.0" client = get_client(test_id) - client.connections.directory_provisioning.create(id="id", request={}) + client.connections.directory_provisioning.create( + id="id", + request=CreateDirectoryProvisioningRequestContent(), + ) verify_request_count(test_id, "POST", "/connections/id/directory-provisioning", None, 1) @@ -29,7 +39,9 @@ def test_connections_directoryProvisioning_delete() -> None: """Test delete endpoint with WireMock""" test_id = "connections.directory_provisioning.delete.0" client = get_client(test_id) - client.connections.directory_provisioning.delete(id="id") + client.connections.directory_provisioning.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/connections/id/directory-provisioning", None, 1) @@ -37,7 +49,10 @@ def test_connections_directoryProvisioning_update() -> None: """Test update endpoint with WireMock""" test_id = "connections.directory_provisioning.update.0" client = get_client(test_id) - client.connections.directory_provisioning.update(id="id", request={}) + client.connections.directory_provisioning.update( + id="id", + request=UpdateDirectoryProvisioningRequestContent(), + ) verify_request_count(test_id, "PATCH", "/connections/id/directory-provisioning", None, 1) @@ -45,5 +60,7 @@ def test_connections_directoryProvisioning_get_default_mapping() -> None: """Test getDefaultMapping endpoint with WireMock""" test_id = "connections.directory_provisioning.get_default_mapping.0" client = get_client(test_id) - client.connections.directory_provisioning.get_default_mapping(id="id") + client.connections.directory_provisioning.get_default_mapping( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/directory-provisioning/default-mapping", None, 1) diff --git a/tests/wire/test_connections_directoryProvisioning_synchronizations.py b/tests/wire/test_connections_directoryProvisioning_synchronizations.py index 5468dc10..3e7f5e5c 100644 --- a/tests/wire/test_connections_directoryProvisioning_synchronizations.py +++ b/tests/wire/test_connections_directoryProvisioning_synchronizations.py @@ -5,5 +5,7 @@ def test_connections_directoryProvisioning_synchronizations_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.directory_provisioning.synchronizations.create.0" client = get_client(test_id) - client.connections.directory_provisioning.synchronizations.create(id="id") + client.connections.directory_provisioning.synchronizations.create( + id="id", + ) verify_request_count(test_id, "POST", "/connections/id/directory-provisioning/synchronizations", None, 1) diff --git a/tests/wire/test_connections_keys.py b/tests/wire/test_connections_keys.py index 29c90b63..a4d8e7f6 100644 --- a/tests/wire/test_connections_keys.py +++ b/tests/wire/test_connections_keys.py @@ -1,11 +1,15 @@ from .conftest import get_client, verify_request_count +from auth0.management import PostConnectionKeysRequestContent, RotateConnectionKeysRequestContent + def test_connections_keys_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.keys.get.0" client = get_client(test_id) - client.connections.keys.get(id="id") + client.connections.keys.get( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/keys", None, 1) @@ -13,7 +17,10 @@ def test_connections_keys_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.keys.create.0" client = get_client(test_id) - client.connections.keys.create(id="id", request={}) + client.connections.keys.create( + id="id", + request=PostConnectionKeysRequestContent(), + ) verify_request_count(test_id, "POST", "/connections/id/keys", None, 1) @@ -21,5 +28,8 @@ def test_connections_keys_rotate() -> None: """Test rotate endpoint with WireMock""" test_id = "connections.keys.rotate.0" client = get_client(test_id) - client.connections.keys.rotate(id="id", request={}) + client.connections.keys.rotate( + id="id", + request=RotateConnectionKeysRequestContent(), + ) verify_request_count(test_id, "POST", "/connections/id/keys/rotate", None, 1) diff --git a/tests/wire/test_connections_scimConfiguration.py b/tests/wire/test_connections_scimConfiguration.py index f8afaff4..1dfd6c39 100644 --- a/tests/wire/test_connections_scimConfiguration.py +++ b/tests/wire/test_connections_scimConfiguration.py @@ -1,11 +1,16 @@ from .conftest import get_client, verify_request_count +from auth0.management import CreateScimConfigurationRequestContent, ScimMappingItem + def test_connections_scimConfiguration_list_() -> None: """Test list endpoint with WireMock""" test_id = "connections.scim_configuration.list_.0" client = get_client(test_id) - client.connections.scim_configuration.list(from_="from", take=1) + client.connections.scim_configuration.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/connections-scim-configurations", {"from": "from", "take": "1"}, 1) @@ -13,7 +18,9 @@ def test_connections_scimConfiguration_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.scim_configuration.get.0" client = get_client(test_id) - client.connections.scim_configuration.get(id="id") + client.connections.scim_configuration.get( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/scim-configuration", None, 1) @@ -21,7 +28,10 @@ def test_connections_scimConfiguration_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.scim_configuration.create.0" client = get_client(test_id) - client.connections.scim_configuration.create(id="id", request={}) + client.connections.scim_configuration.create( + id="id", + request=CreateScimConfigurationRequestContent(), + ) verify_request_count(test_id, "POST", "/connections/id/scim-configuration", None, 1) @@ -29,7 +39,9 @@ def test_connections_scimConfiguration_delete() -> None: """Test delete endpoint with WireMock""" test_id = "connections.scim_configuration.delete.0" client = get_client(test_id) - client.connections.scim_configuration.delete(id="id") + client.connections.scim_configuration.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/connections/id/scim-configuration", None, 1) @@ -37,7 +49,11 @@ def test_connections_scimConfiguration_update() -> None: """Test update endpoint with WireMock""" test_id = "connections.scim_configuration.update.0" client = get_client(test_id) - client.connections.scim_configuration.update(id="id", user_id_attribute="user_id_attribute", mapping=[{}]) + client.connections.scim_configuration.update( + id="id", + user_id_attribute="user_id_attribute", + mapping=[ScimMappingItem()], + ) verify_request_count(test_id, "PATCH", "/connections/id/scim-configuration", None, 1) @@ -45,5 +61,7 @@ def test_connections_scimConfiguration_get_default_mapping() -> None: """Test getDefaultMapping endpoint with WireMock""" test_id = "connections.scim_configuration.get_default_mapping.0" client = get_client(test_id) - client.connections.scim_configuration.get_default_mapping(id="id") + client.connections.scim_configuration.get_default_mapping( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/scim-configuration/default-mapping", None, 1) diff --git a/tests/wire/test_connections_scimConfiguration_tokens.py b/tests/wire/test_connections_scimConfiguration_tokens.py index 1c02b680..6475210a 100644 --- a/tests/wire/test_connections_scimConfiguration_tokens.py +++ b/tests/wire/test_connections_scimConfiguration_tokens.py @@ -5,7 +5,9 @@ def test_connections_scimConfiguration_tokens_get() -> None: """Test get endpoint with WireMock""" test_id = "connections.scim_configuration.tokens.get.0" client = get_client(test_id) - client.connections.scim_configuration.tokens.get(id="id") + client.connections.scim_configuration.tokens.get( + id="id", + ) verify_request_count(test_id, "GET", "/connections/id/scim-configuration/tokens", None, 1) @@ -13,7 +15,9 @@ def test_connections_scimConfiguration_tokens_create() -> None: """Test create endpoint with WireMock""" test_id = "connections.scim_configuration.tokens.create.0" client = get_client(test_id) - client.connections.scim_configuration.tokens.create(id="id") + client.connections.scim_configuration.tokens.create( + id="id", + ) verify_request_count(test_id, "POST", "/connections/id/scim-configuration/tokens", None, 1) @@ -21,5 +25,8 @@ def test_connections_scimConfiguration_tokens_delete() -> None: """Test delete endpoint with WireMock""" test_id = "connections.scim_configuration.tokens.delete.0" client = get_client(test_id) - client.connections.scim_configuration.tokens.delete(id="id", token_id="tokenId") + client.connections.scim_configuration.tokens.delete( + id="id", + token_id="tokenId", + ) verify_request_count(test_id, "DELETE", "/connections/id/scim-configuration/tokens/tokenId", None, 1) diff --git a/tests/wire/test_connections_users.py b/tests/wire/test_connections_users.py index e169451a..890ae073 100644 --- a/tests/wire/test_connections_users.py +++ b/tests/wire/test_connections_users.py @@ -5,5 +5,8 @@ def test_connections_users_delete_by_email() -> None: """Test deleteByEmail endpoint with WireMock""" test_id = "connections.users.delete_by_email.0" client = get_client(test_id) - client.connections.users.delete_by_email(id="id", email="email") + client.connections.users.delete_by_email( + id="id", + email="email", + ) verify_request_count(test_id, "DELETE", "/connections/id/users", {"email": "email"}, 1) diff --git a/tests/wire/test_customDomains.py b/tests/wire/test_customDomains.py index 75d77a67..a4e0066c 100644 --- a/tests/wire/test_customDomains.py +++ b/tests/wire/test_customDomains.py @@ -5,7 +5,12 @@ def test_customDomains_list_() -> None: """Test list endpoint with WireMock""" test_id = "custom_domains.list_.0" client = get_client(test_id) - client.custom_domains.list(q="q", fields="fields", include_fields=True, sort="sort") + client.custom_domains.list( + q="q", + fields="fields", + include_fields=True, + sort="sort", + ) verify_request_count( test_id, "GET", "/custom-domains", {"q": "q", "fields": "fields", "include_fields": "true", "sort": "sort"}, 1 ) @@ -15,7 +20,10 @@ def test_customDomains_create() -> None: """Test create endpoint with WireMock""" test_id = "custom_domains.create.0" client = get_client(test_id) - client.custom_domains.create(domain="domain", type="auth0_managed_certs") + client.custom_domains.create( + domain="domain", + type="auth0_managed_certs", + ) verify_request_count(test_id, "POST", "/custom-domains", None, 1) @@ -31,7 +39,9 @@ def test_customDomains_set_default() -> None: """Test setDefault endpoint with WireMock""" test_id = "custom_domains.set_default.0" client = get_client(test_id) - client.custom_domains.set_default(domain="domain") + client.custom_domains.set_default( + domain="domain", + ) verify_request_count(test_id, "PATCH", "/custom-domains/default", None, 1) @@ -39,7 +49,9 @@ def test_customDomains_get() -> None: """Test get endpoint with WireMock""" test_id = "custom_domains.get.0" client = get_client(test_id) - client.custom_domains.get(id="id") + client.custom_domains.get( + id="id", + ) verify_request_count(test_id, "GET", "/custom-domains/id", None, 1) @@ -47,7 +59,9 @@ def test_customDomains_delete() -> None: """Test delete endpoint with WireMock""" test_id = "custom_domains.delete.0" client = get_client(test_id) - client.custom_domains.delete(id="id") + client.custom_domains.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/custom-domains/id", None, 1) @@ -55,7 +69,9 @@ def test_customDomains_update() -> None: """Test update endpoint with WireMock""" test_id = "custom_domains.update.0" client = get_client(test_id) - client.custom_domains.update(id="id") + client.custom_domains.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/custom-domains/id", None, 1) @@ -63,7 +79,9 @@ def test_customDomains_test() -> None: """Test test endpoint with WireMock""" test_id = "custom_domains.test.0" client = get_client(test_id) - client.custom_domains.test(id="id") + client.custom_domains.test( + id="id", + ) verify_request_count(test_id, "POST", "/custom-domains/id/test", None, 1) @@ -71,5 +89,7 @@ def test_customDomains_verify() -> None: """Test verify endpoint with WireMock""" test_id = "custom_domains.verify.0" client = get_client(test_id) - client.custom_domains.verify(id="id") + client.custom_domains.verify( + id="id", + ) verify_request_count(test_id, "POST", "/custom-domains/id/verify", None, 1) diff --git a/tests/wire/test_deviceCredentials.py b/tests/wire/test_deviceCredentials.py index 224ac491..bb49c2ce 100644 --- a/tests/wire/test_deviceCredentials.py +++ b/tests/wire/test_deviceCredentials.py @@ -38,7 +38,10 @@ def test_deviceCredentials_create_public_key() -> None: test_id = "device_credentials.create_public_key.0" client = get_client(test_id) client.device_credentials.create_public_key( - device_name="device_name", type="public_key", value="value", device_id="device_id" + device_name="device_name", + type="public_key", + value="value", + device_id="device_id", ) verify_request_count(test_id, "POST", "/device-credentials", None, 1) @@ -47,5 +50,7 @@ def test_deviceCredentials_delete() -> None: """Test delete endpoint with WireMock""" test_id = "device_credentials.delete.0" client = get_client(test_id) - client.device_credentials.delete(id="id") + client.device_credentials.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/device-credentials/id", None, 1) diff --git a/tests/wire/test_emailTemplates.py b/tests/wire/test_emailTemplates.py index efc4b55c..496447cf 100644 --- a/tests/wire/test_emailTemplates.py +++ b/tests/wire/test_emailTemplates.py @@ -5,7 +5,9 @@ def test_emailTemplates_create() -> None: """Test create endpoint with WireMock""" test_id = "email_templates.create.0" client = get_client(test_id) - client.email_templates.create(template="verify_email") + client.email_templates.create( + template="verify_email", + ) verify_request_count(test_id, "POST", "/email-templates", None, 1) @@ -13,7 +15,9 @@ def test_emailTemplates_get() -> None: """Test get endpoint with WireMock""" test_id = "email_templates.get.0" client = get_client(test_id) - client.email_templates.get(template_name="verify_email") + client.email_templates.get( + template_name="verify_email", + ) verify_request_count(test_id, "GET", "/email-templates/verify_email", None, 1) @@ -21,7 +25,10 @@ def test_emailTemplates_set_() -> None: """Test set endpoint with WireMock""" test_id = "email_templates.set_.0" client = get_client(test_id) - client.email_templates.set(template_name="verify_email", template="verify_email") + client.email_templates.set( + template_name="verify_email", + template="verify_email", + ) verify_request_count(test_id, "PUT", "/email-templates/verify_email", None, 1) @@ -29,5 +36,7 @@ def test_emailTemplates_update() -> None: """Test update endpoint with WireMock""" test_id = "email_templates.update.0" client = get_client(test_id) - client.email_templates.update(template_name="verify_email") + client.email_templates.update( + template_name="verify_email", + ) verify_request_count(test_id, "PATCH", "/email-templates/verify_email", None, 1) diff --git a/tests/wire/test_emails_provider.py b/tests/wire/test_emails_provider.py index fddd81e7..1148232b 100644 --- a/tests/wire/test_emails_provider.py +++ b/tests/wire/test_emails_provider.py @@ -1,11 +1,16 @@ from .conftest import get_client, verify_request_count +from auth0.management import EmailProviderCredentialsSchemaZero + def test_emails_provider_get() -> None: """Test get endpoint with WireMock""" test_id = "emails.provider.get.0" client = get_client(test_id) - client.emails.provider.get(fields="fields", include_fields=True) + client.emails.provider.get( + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/emails/provider", {"fields": "fields", "include_fields": "true"}, 1) @@ -13,7 +18,12 @@ def test_emails_provider_create() -> None: """Test create endpoint with WireMock""" test_id = "emails.provider.create.0" client = get_client(test_id) - client.emails.provider.create(name="mailgun", credentials={"api_key": "api_key"}) + client.emails.provider.create( + name="mailgun", + credentials=EmailProviderCredentialsSchemaZero( + api_key="api_key", + ), + ) verify_request_count(test_id, "POST", "/emails/provider", None, 1) diff --git a/tests/wire/test_eventStreams.py b/tests/wire/test_eventStreams.py index 024184d4..e9326358 100644 --- a/tests/wire/test_eventStreams.py +++ b/tests/wire/test_eventStreams.py @@ -1,11 +1,21 @@ from .conftest import get_client, verify_request_count +from auth0.management import ( + CreateEventStreamWebHookRequestContent, + EventStreamWebhookBasicAuth, + EventStreamWebhookConfiguration, + EventStreamWebhookDestination, +) + def test_eventStreams_list_() -> None: """Test list endpoint with WireMock""" test_id = "event_streams.list_.0" client = get_client(test_id) - client.event_streams.list(from_="from", take=1) + client.event_streams.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/event-streams", {"from": "from", "take": "1"}, 1) @@ -14,15 +24,18 @@ def test_eventStreams_create() -> None: test_id = "event_streams.create.0" client = get_client(test_id) client.event_streams.create( - request={ - "destination": { - "type": "webhook", - "configuration": { - "webhook_endpoint": "webhook_endpoint", - "webhook_authorization": {"method": "basic", "username": "username"}, - }, - } - } + request=CreateEventStreamWebHookRequestContent( + destination=EventStreamWebhookDestination( + type="webhook", + configuration=EventStreamWebhookConfiguration( + webhook_endpoint="webhook_endpoint", + webhook_authorization=EventStreamWebhookBasicAuth( + method="basic", + username="username", + ), + ), + ), + ), ) verify_request_count(test_id, "POST", "/event-streams", None, 1) @@ -31,7 +44,9 @@ def test_eventStreams_get() -> None: """Test get endpoint with WireMock""" test_id = "event_streams.get.0" client = get_client(test_id) - client.event_streams.get(id="id") + client.event_streams.get( + id="id", + ) verify_request_count(test_id, "GET", "/event-streams/id", None, 1) @@ -39,7 +54,9 @@ def test_eventStreams_delete() -> None: """Test delete endpoint with WireMock""" test_id = "event_streams.delete.0" client = get_client(test_id) - client.event_streams.delete(id="id") + client.event_streams.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/event-streams/id", None, 1) @@ -47,7 +64,9 @@ def test_eventStreams_update() -> None: """Test update endpoint with WireMock""" test_id = "event_streams.update.0" client = get_client(test_id) - client.event_streams.update(id="id") + client.event_streams.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/event-streams/id", None, 1) @@ -55,5 +74,8 @@ def test_eventStreams_test() -> None: """Test test endpoint with WireMock""" test_id = "event_streams.test.0" client = get_client(test_id) - client.event_streams.test(id="id", event_type="user.created") + client.event_streams.test( + id="id", + event_type="user.created", + ) verify_request_count(test_id, "POST", "/event-streams/id/test", None, 1) diff --git a/tests/wire/test_eventStreams_deliveries.py b/tests/wire/test_eventStreams_deliveries.py index 755c1a36..48d402e6 100644 --- a/tests/wire/test_eventStreams_deliveries.py +++ b/tests/wire/test_eventStreams_deliveries.py @@ -34,5 +34,8 @@ def test_eventStreams_deliveries_get_history() -> None: """Test getHistory endpoint with WireMock""" test_id = "event_streams.deliveries.get_history.0" client = get_client(test_id) - client.event_streams.deliveries.get_history(id="id", event_id="event_id") + client.event_streams.deliveries.get_history( + id="id", + event_id="event_id", + ) verify_request_count(test_id, "GET", "/event-streams/id/deliveries/event_id", None, 1) diff --git a/tests/wire/test_eventStreams_redeliveries.py b/tests/wire/test_eventStreams_redeliveries.py index 0fb7ac24..2e55ad5e 100644 --- a/tests/wire/test_eventStreams_redeliveries.py +++ b/tests/wire/test_eventStreams_redeliveries.py @@ -5,7 +5,9 @@ def test_eventStreams_redeliveries_create() -> None: """Test create endpoint with WireMock""" test_id = "event_streams.redeliveries.create.0" client = get_client(test_id) - client.event_streams.redeliveries.create(id="id") + client.event_streams.redeliveries.create( + id="id", + ) verify_request_count(test_id, "POST", "/event-streams/id/redeliver", None, 1) @@ -13,5 +15,8 @@ def test_eventStreams_redeliveries_create_by_id() -> None: """Test createById endpoint with WireMock""" test_id = "event_streams.redeliveries.create_by_id.0" client = get_client(test_id) - client.event_streams.redeliveries.create_by_id(id="id", event_id="event_id") + client.event_streams.redeliveries.create_by_id( + id="id", + event_id="event_id", + ) verify_request_count(test_id, "POST", "/event-streams/id/redeliver/event_id", None, 1) diff --git a/tests/wire/test_flows.py b/tests/wire/test_flows.py index aab90b57..01c94b75 100644 --- a/tests/wire/test_flows.py +++ b/tests/wire/test_flows.py @@ -5,7 +5,12 @@ def test_flows_list_() -> None: """Test list endpoint with WireMock""" test_id = "flows.list_.0" client = get_client(test_id) - client.flows.list(page=1, per_page=1, include_totals=True, synchronous=True) + client.flows.list( + page=1, + per_page=1, + include_totals=True, + synchronous=True, + ) verify_request_count( test_id, "GET", "/flows", {"page": "1", "per_page": "1", "include_totals": "true", "synchronous": "true"}, 1 ) @@ -15,7 +20,9 @@ def test_flows_create() -> None: """Test create endpoint with WireMock""" test_id = "flows.create.0" client = get_client(test_id) - client.flows.create(name="name") + client.flows.create( + name="name", + ) verify_request_count(test_id, "POST", "/flows", None, 1) @@ -23,7 +30,9 @@ def test_flows_get() -> None: """Test get endpoint with WireMock""" test_id = "flows.get.0" client = get_client(test_id) - client.flows.get(id="id") + client.flows.get( + id="id", + ) verify_request_count(test_id, "GET", "/flows/id", None, 1) @@ -31,7 +40,9 @@ def test_flows_delete() -> None: """Test delete endpoint with WireMock""" test_id = "flows.delete.0" client = get_client(test_id) - client.flows.delete(id="id") + client.flows.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/flows/id", None, 1) @@ -39,5 +50,7 @@ def test_flows_update() -> None: """Test update endpoint with WireMock""" test_id = "flows.update.0" client = get_client(test_id) - client.flows.update(id="id") + client.flows.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/flows/id", None, 1) diff --git a/tests/wire/test_flows_executions.py b/tests/wire/test_flows_executions.py index c706b923..bc7413d8 100644 --- a/tests/wire/test_flows_executions.py +++ b/tests/wire/test_flows_executions.py @@ -5,7 +5,11 @@ def test_flows_executions_list_() -> None: """Test list endpoint with WireMock""" test_id = "flows.executions.list_.0" client = get_client(test_id) - client.flows.executions.list(flow_id="flow_id", from_="from", take=1) + client.flows.executions.list( + flow_id="flow_id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/flows/flow_id/executions", {"from": "from", "take": "1"}, 1) @@ -13,7 +17,10 @@ def test_flows_executions_get() -> None: """Test get endpoint with WireMock""" test_id = "flows.executions.get.0" client = get_client(test_id) - client.flows.executions.get(flow_id="flow_id", execution_id="execution_id") + client.flows.executions.get( + flow_id="flow_id", + execution_id="execution_id", + ) verify_request_count(test_id, "GET", "/flows/flow_id/executions/execution_id", None, 1) @@ -21,5 +28,8 @@ def test_flows_executions_delete() -> None: """Test delete endpoint with WireMock""" test_id = "flows.executions.delete.0" client = get_client(test_id) - client.flows.executions.delete(flow_id="flow_id", execution_id="execution_id") + client.flows.executions.delete( + flow_id="flow_id", + execution_id="execution_id", + ) verify_request_count(test_id, "DELETE", "/flows/flow_id/executions/execution_id", None, 1) diff --git a/tests/wire/test_flows_vault_connections.py b/tests/wire/test_flows_vault_connections.py index f9fbcd4f..871761bd 100644 --- a/tests/wire/test_flows_vault_connections.py +++ b/tests/wire/test_flows_vault_connections.py @@ -1,11 +1,17 @@ from .conftest import get_client, verify_request_count +from auth0.management import CreateFlowsVaultConnectionActivecampaignApiKey, FlowsVaultConnectioSetupApiKeyWithBaseUrl + def test_flows_vault_connections_list_() -> None: """Test list endpoint with WireMock""" test_id = "flows.vault.connections.list_.0" client = get_client(test_id) - client.flows.vault.connections.list(page=1, per_page=1, include_totals=True) + client.flows.vault.connections.list( + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/flows/vault/connections", {"page": "1", "per_page": "1", "include_totals": "true"}, 1 ) @@ -16,11 +22,15 @@ def test_flows_vault_connections_create() -> None: test_id = "flows.vault.connections.create.0" client = get_client(test_id) client.flows.vault.connections.create( - request={ - "name": "name", - "app_id": "ACTIVECAMPAIGN", - "setup": {"type": "API_KEY", "api_key": "api_key", "base_url": "base_url"}, - } + request=CreateFlowsVaultConnectionActivecampaignApiKey( + name="name", + app_id="ACTIVECAMPAIGN", + setup=FlowsVaultConnectioSetupApiKeyWithBaseUrl( + type="API_KEY", + api_key="api_key", + base_url="base_url", + ), + ), ) verify_request_count(test_id, "POST", "/flows/vault/connections", None, 1) @@ -29,7 +39,9 @@ def test_flows_vault_connections_get() -> None: """Test get endpoint with WireMock""" test_id = "flows.vault.connections.get.0" client = get_client(test_id) - client.flows.vault.connections.get(id="id") + client.flows.vault.connections.get( + id="id", + ) verify_request_count(test_id, "GET", "/flows/vault/connections/id", None, 1) @@ -37,7 +49,9 @@ def test_flows_vault_connections_delete() -> None: """Test delete endpoint with WireMock""" test_id = "flows.vault.connections.delete.0" client = get_client(test_id) - client.flows.vault.connections.delete(id="id") + client.flows.vault.connections.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/flows/vault/connections/id", None, 1) @@ -45,5 +59,7 @@ def test_flows_vault_connections_update() -> None: """Test update endpoint with WireMock""" test_id = "flows.vault.connections.update.0" client = get_client(test_id) - client.flows.vault.connections.update(id="id") + client.flows.vault.connections.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/flows/vault/connections/id", None, 1) diff --git a/tests/wire/test_forms.py b/tests/wire/test_forms.py index d8e322a1..66d4f106 100644 --- a/tests/wire/test_forms.py +++ b/tests/wire/test_forms.py @@ -5,7 +5,11 @@ def test_forms_list_() -> None: """Test list endpoint with WireMock""" test_id = "forms.list_.0" client = get_client(test_id) - client.forms.list(page=1, per_page=1, include_totals=True) + client.forms.list( + page=1, + per_page=1, + include_totals=True, + ) verify_request_count(test_id, "GET", "/forms", {"page": "1", "per_page": "1", "include_totals": "true"}, 1) @@ -13,7 +17,9 @@ def test_forms_create() -> None: """Test create endpoint with WireMock""" test_id = "forms.create.0" client = get_client(test_id) - client.forms.create(name="name") + client.forms.create( + name="name", + ) verify_request_count(test_id, "POST", "/forms", None, 1) @@ -21,7 +27,9 @@ def test_forms_get() -> None: """Test get endpoint with WireMock""" test_id = "forms.get.0" client = get_client(test_id) - client.forms.get(id="id") + client.forms.get( + id="id", + ) verify_request_count(test_id, "GET", "/forms/id", None, 1) @@ -29,7 +37,9 @@ def test_forms_delete() -> None: """Test delete endpoint with WireMock""" test_id = "forms.delete.0" client = get_client(test_id) - client.forms.delete(id="id") + client.forms.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/forms/id", None, 1) @@ -37,5 +47,7 @@ def test_forms_update() -> None: """Test update endpoint with WireMock""" test_id = "forms.update.0" client = get_client(test_id) - client.forms.update(id="id") + client.forms.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/forms/id", None, 1) diff --git a/tests/wire/test_groups.py b/tests/wire/test_groups.py index 57ab94c5..8ae906a6 100644 --- a/tests/wire/test_groups.py +++ b/tests/wire/test_groups.py @@ -35,7 +35,9 @@ def test_groups_get() -> None: """Test get endpoint with WireMock""" test_id = "groups.get.0" client = get_client(test_id) - client.groups.get(id="id") + client.groups.get( + id="id", + ) verify_request_count(test_id, "GET", "/groups/id", None, 1) @@ -43,5 +45,7 @@ def test_groups_delete() -> None: """Test delete endpoint with WireMock""" test_id = "groups.delete.0" client = get_client(test_id) - client.groups.delete(id="id") + client.groups.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/groups/id", None, 1) diff --git a/tests/wire/test_groups_members.py b/tests/wire/test_groups_members.py index d6457646..f40d8d05 100644 --- a/tests/wire/test_groups_members.py +++ b/tests/wire/test_groups_members.py @@ -5,7 +5,13 @@ def test_groups_members_get() -> None: """Test get endpoint with WireMock""" test_id = "groups.members.get.0" client = get_client(test_id) - client.groups.members.get(id="id", fields="fields", include_fields=True, from_="from", take=1) + client.groups.members.get( + id="id", + fields="fields", + include_fields=True, + from_="from", + take=1, + ) verify_request_count( test_id, "GET", diff --git a/tests/wire/test_guardian_enrollments.py b/tests/wire/test_guardian_enrollments.py index 634e6e55..6c3f8cf4 100644 --- a/tests/wire/test_guardian_enrollments.py +++ b/tests/wire/test_guardian_enrollments.py @@ -5,7 +5,9 @@ def test_guardian_enrollments_create_ticket() -> None: """Test createTicket endpoint with WireMock""" test_id = "guardian.enrollments.create_ticket.0" client = get_client(test_id) - client.guardian.enrollments.create_ticket(user_id="user_id") + client.guardian.enrollments.create_ticket( + user_id="user_id", + ) verify_request_count(test_id, "POST", "/guardian/enrollments/ticket", None, 1) @@ -13,7 +15,9 @@ def test_guardian_enrollments_get() -> None: """Test get endpoint with WireMock""" test_id = "guardian.enrollments.get.0" client = get_client(test_id) - client.guardian.enrollments.get(id="id") + client.guardian.enrollments.get( + id="id", + ) verify_request_count(test_id, "GET", "/guardian/enrollments/id", None, 1) @@ -21,5 +25,7 @@ def test_guardian_enrollments_delete() -> None: """Test delete endpoint with WireMock""" test_id = "guardian.enrollments.delete.0" client = get_client(test_id) - client.guardian.enrollments.delete(id="id") + client.guardian.enrollments.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/guardian/enrollments/id", None, 1) diff --git a/tests/wire/test_guardian_factors.py b/tests/wire/test_guardian_factors.py index 76232510..743163dd 100644 --- a/tests/wire/test_guardian_factors.py +++ b/tests/wire/test_guardian_factors.py @@ -13,5 +13,8 @@ def test_guardian_factors_set_() -> None: """Test set endpoint with WireMock""" test_id = "guardian.factors.set_.0" client = get_client(test_id) - client.guardian.factors.set(name="push-notification", enabled=True) + client.guardian.factors.set( + name="push-notification", + enabled=True, + ) verify_request_count(test_id, "PUT", "/guardian/factors/push-notification", None, 1) diff --git a/tests/wire/test_guardian_factors_phone.py b/tests/wire/test_guardian_factors_phone.py index 5ba1c07d..e57f43ba 100644 --- a/tests/wire/test_guardian_factors_phone.py +++ b/tests/wire/test_guardian_factors_phone.py @@ -13,7 +13,9 @@ def test_guardian_factors_phone_set_message_types() -> None: """Test setMessageTypes endpoint with WireMock""" test_id = "guardian.factors.phone.set_message_types.0" client = get_client(test_id) - client.guardian.factors.phone.set_message_types(message_types=["sms"]) + client.guardian.factors.phone.set_message_types( + message_types=["sms"], + ) verify_request_count(test_id, "PUT", "/guardian/factors/phone/message-types", None, 1) @@ -45,7 +47,9 @@ def test_guardian_factors_phone_set_provider() -> None: """Test setProvider endpoint with WireMock""" test_id = "guardian.factors.phone.set_provider.0" client = get_client(test_id) - client.guardian.factors.phone.set_provider(provider="auth0") + client.guardian.factors.phone.set_provider( + provider="auth0", + ) verify_request_count(test_id, "PUT", "/guardian/factors/phone/selected-provider", None, 1) @@ -62,6 +66,7 @@ def test_guardian_factors_phone_set_templates() -> None: test_id = "guardian.factors.phone.set_templates.0" client = get_client(test_id) client.guardian.factors.phone.set_templates( - enrollment_message="enrollment_message", verification_message="verification_message" + enrollment_message="enrollment_message", + verification_message="verification_message", ) verify_request_count(test_id, "PUT", "/guardian/factors/phone/templates", None, 1) diff --git a/tests/wire/test_guardian_factors_pushNotification.py b/tests/wire/test_guardian_factors_pushNotification.py index 21bbaec1..ff661d6d 100644 --- a/tests/wire/test_guardian_factors_pushNotification.py +++ b/tests/wire/test_guardian_factors_pushNotification.py @@ -93,5 +93,7 @@ def test_guardian_factors_pushNotification_set_provider() -> None: """Test setProvider endpoint with WireMock""" test_id = "guardian.factors.push_notification.set_provider.0" client = get_client(test_id) - client.guardian.factors.push_notification.set_provider(provider="guardian") + client.guardian.factors.push_notification.set_provider( + provider="guardian", + ) verify_request_count(test_id, "PUT", "/guardian/factors/push-notification/selected-provider", None, 1) diff --git a/tests/wire/test_guardian_factors_sms.py b/tests/wire/test_guardian_factors_sms.py index 7e377120..235ba505 100644 --- a/tests/wire/test_guardian_factors_sms.py +++ b/tests/wire/test_guardian_factors_sms.py @@ -29,7 +29,9 @@ def test_guardian_factors_sms_set_provider() -> None: """Test setProvider endpoint with WireMock""" test_id = "guardian.factors.sms.set_provider.0" client = get_client(test_id) - client.guardian.factors.sms.set_provider(provider="auth0") + client.guardian.factors.sms.set_provider( + provider="auth0", + ) verify_request_count(test_id, "PUT", "/guardian/factors/sms/selected-provider", None, 1) @@ -46,6 +48,7 @@ def test_guardian_factors_sms_set_templates() -> None: test_id = "guardian.factors.sms.set_templates.0" client = get_client(test_id) client.guardian.factors.sms.set_templates( - enrollment_message="enrollment_message", verification_message="verification_message" + enrollment_message="enrollment_message", + verification_message="verification_message", ) verify_request_count(test_id, "PUT", "/guardian/factors/sms/templates", None, 1) diff --git a/tests/wire/test_guardian_policies.py b/tests/wire/test_guardian_policies.py index ae27d97f..e26796a6 100644 --- a/tests/wire/test_guardian_policies.py +++ b/tests/wire/test_guardian_policies.py @@ -13,5 +13,7 @@ def test_guardian_policies_set_() -> None: """Test set endpoint with WireMock""" test_id = "guardian.policies.set_.0" client = get_client(test_id) - client.guardian.policies.set(request=["all-applications"]) + client.guardian.policies.set( + request=["all-applications"], + ) verify_request_count(test_id, "PUT", "/guardian/policies", None, 1) diff --git a/tests/wire/test_hooks.py b/tests/wire/test_hooks.py index 28bd421f..796e681b 100644 --- a/tests/wire/test_hooks.py +++ b/tests/wire/test_hooks.py @@ -6,7 +6,12 @@ def test_hooks_list_() -> None: test_id = "hooks.list_.0" client = get_client(test_id) client.hooks.list( - page=1, per_page=1, include_totals=True, enabled=True, fields="fields", trigger_id="credentials-exchange" + page=1, + per_page=1, + include_totals=True, + enabled=True, + fields="fields", + trigger_id="credentials-exchange", ) verify_request_count( test_id, @@ -28,7 +33,11 @@ def test_hooks_create() -> None: """Test create endpoint with WireMock""" test_id = "hooks.create.0" client = get_client(test_id) - client.hooks.create(name="name", script="script", trigger_id="credentials-exchange") + client.hooks.create( + name="name", + script="script", + trigger_id="credentials-exchange", + ) verify_request_count(test_id, "POST", "/hooks", None, 1) @@ -36,7 +45,10 @@ def test_hooks_get() -> None: """Test get endpoint with WireMock""" test_id = "hooks.get.0" client = get_client(test_id) - client.hooks.get(id="id", fields="fields") + client.hooks.get( + id="id", + fields="fields", + ) verify_request_count(test_id, "GET", "/hooks/id", {"fields": "fields"}, 1) @@ -44,7 +56,9 @@ def test_hooks_delete() -> None: """Test delete endpoint with WireMock""" test_id = "hooks.delete.0" client = get_client(test_id) - client.hooks.delete(id="id") + client.hooks.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/hooks/id", None, 1) @@ -52,5 +66,7 @@ def test_hooks_update() -> None: """Test update endpoint with WireMock""" test_id = "hooks.update.0" client = get_client(test_id) - client.hooks.update(id="id") + client.hooks.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/hooks/id", None, 1) diff --git a/tests/wire/test_hooks_secrets.py b/tests/wire/test_hooks_secrets.py index b77109ba..be31618c 100644 --- a/tests/wire/test_hooks_secrets.py +++ b/tests/wire/test_hooks_secrets.py @@ -5,7 +5,9 @@ def test_hooks_secrets_get() -> None: """Test get endpoint with WireMock""" test_id = "hooks.secrets.get.0" client = get_client(test_id) - client.hooks.secrets.get(id="id") + client.hooks.secrets.get( + id="id", + ) verify_request_count(test_id, "GET", "/hooks/id/secrets", None, 1) @@ -13,7 +15,10 @@ def test_hooks_secrets_create() -> None: """Test create endpoint with WireMock""" test_id = "hooks.secrets.create.0" client = get_client(test_id) - client.hooks.secrets.create(id="id", request={"key": "value"}) + client.hooks.secrets.create( + id="id", + request={"key": "value"}, + ) verify_request_count(test_id, "POST", "/hooks/id/secrets", None, 1) @@ -21,7 +26,10 @@ def test_hooks_secrets_delete() -> None: """Test delete endpoint with WireMock""" test_id = "hooks.secrets.delete.0" client = get_client(test_id) - client.hooks.secrets.delete(id="id", request=["string"]) + client.hooks.secrets.delete( + id="id", + request=["string"], + ) verify_request_count(test_id, "DELETE", "/hooks/id/secrets", None, 1) @@ -29,5 +37,8 @@ def test_hooks_secrets_update() -> None: """Test update endpoint with WireMock""" test_id = "hooks.secrets.update.0" client = get_client(test_id) - client.hooks.secrets.update(id="id", request={"key": "value"}) + client.hooks.secrets.update( + id="id", + request={"key": "value"}, + ) verify_request_count(test_id, "PATCH", "/hooks/id/secrets", None, 1) diff --git a/tests/wire/test_jobs.py b/tests/wire/test_jobs.py index d829c746..bf57aaf7 100644 --- a/tests/wire/test_jobs.py +++ b/tests/wire/test_jobs.py @@ -5,5 +5,7 @@ def test_jobs_get() -> None: """Test get endpoint with WireMock""" test_id = "jobs.get.0" client = get_client(test_id) - client.jobs.get(id="id") + client.jobs.get( + id="id", + ) verify_request_count(test_id, "GET", "/jobs/id", None, 1) diff --git a/tests/wire/test_jobs_errors.py b/tests/wire/test_jobs_errors.py index 3ae88444..5a990994 100644 --- a/tests/wire/test_jobs_errors.py +++ b/tests/wire/test_jobs_errors.py @@ -5,5 +5,7 @@ def test_jobs_errors_get() -> None: """Test get endpoint with WireMock""" test_id = "jobs.errors.get.0" client = get_client(test_id) - client.jobs.errors.get(id="id") + client.jobs.errors.get( + id="id", + ) verify_request_count(test_id, "GET", "/jobs/id/errors", None, 1) diff --git a/tests/wire/test_jobs_usersImports.py b/tests/wire/test_jobs_usersImports.py index 48fc0b54..2c944805 100644 --- a/tests/wire/test_jobs_usersImports.py +++ b/tests/wire/test_jobs_usersImports.py @@ -5,5 +5,8 @@ def test_jobs_usersImports_create() -> None: """Test create endpoint with WireMock""" test_id = "jobs.users_imports.create.0" client = get_client(test_id) - client.jobs.users_imports.create(users="example_users", connection_id="connection_id") + client.jobs.users_imports.create( + users="example_users", + connection_id="connection_id", + ) verify_request_count(test_id, "POST", "/jobs/users-imports", None, 1) diff --git a/tests/wire/test_jobs_verificationEmail.py b/tests/wire/test_jobs_verificationEmail.py index e97c18af..fbe2549d 100644 --- a/tests/wire/test_jobs_verificationEmail.py +++ b/tests/wire/test_jobs_verificationEmail.py @@ -5,5 +5,7 @@ def test_jobs_verificationEmail_create() -> None: """Test create endpoint with WireMock""" test_id = "jobs.verification_email.create.0" client = get_client(test_id) - client.jobs.verification_email.create(user_id="user_id") + client.jobs.verification_email.create( + user_id="user_id", + ) verify_request_count(test_id, "POST", "/jobs/verification-email", None, 1) diff --git a/tests/wire/test_keys_customSigning.py b/tests/wire/test_keys_customSigning.py index b6979157..e4c8e15e 100644 --- a/tests/wire/test_keys_customSigning.py +++ b/tests/wire/test_keys_customSigning.py @@ -1,5 +1,7 @@ from .conftest import get_client, verify_request_count +from auth0.management import CustomSigningKeyJwk + def test_keys_customSigning_get() -> None: """Test get endpoint with WireMock""" @@ -13,7 +15,13 @@ def test_keys_customSigning_set_() -> None: """Test set endpoint with WireMock""" test_id = "keys.custom_signing.set_.0" client = get_client(test_id) - client.keys.custom_signing.set(keys=[{"kty": "EC"}]) + client.keys.custom_signing.set( + keys=[ + CustomSigningKeyJwk( + kty="EC", + ) + ], + ) verify_request_count(test_id, "PUT", "/keys/custom-signing", None, 1) diff --git a/tests/wire/test_keys_encryption.py b/tests/wire/test_keys_encryption.py index 52b567e1..a165bb3f 100644 --- a/tests/wire/test_keys_encryption.py +++ b/tests/wire/test_keys_encryption.py @@ -5,7 +5,11 @@ def test_keys_encryption_list_() -> None: """Test list endpoint with WireMock""" test_id = "keys.encryption.list_.0" client = get_client(test_id) - client.keys.encryption.list(page=1, per_page=1, include_totals=True) + client.keys.encryption.list( + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/keys/encryption", {"page": "1", "per_page": "1", "include_totals": "true"}, 1 ) @@ -15,7 +19,9 @@ def test_keys_encryption_create() -> None: """Test create endpoint with WireMock""" test_id = "keys.encryption.create.0" client = get_client(test_id) - client.keys.encryption.create(type="customer-provided-root-key") + client.keys.encryption.create( + type="customer-provided-root-key", + ) verify_request_count(test_id, "POST", "/keys/encryption", None, 1) @@ -31,7 +37,9 @@ def test_keys_encryption_get() -> None: """Test get endpoint with WireMock""" test_id = "keys.encryption.get.0" client = get_client(test_id) - client.keys.encryption.get(kid="kid") + client.keys.encryption.get( + kid="kid", + ) verify_request_count(test_id, "GET", "/keys/encryption/kid", None, 1) @@ -39,7 +47,10 @@ def test_keys_encryption_import_() -> None: """Test import endpoint with WireMock""" test_id = "keys.encryption.import_.0" client = get_client(test_id) - client.keys.encryption.import_(kid="kid", wrapped_key="wrapped_key") + client.keys.encryption.import_( + kid="kid", + wrapped_key="wrapped_key", + ) verify_request_count(test_id, "POST", "/keys/encryption/kid", None, 1) @@ -47,7 +58,9 @@ def test_keys_encryption_delete() -> None: """Test delete endpoint with WireMock""" test_id = "keys.encryption.delete.0" client = get_client(test_id) - client.keys.encryption.delete(kid="kid") + client.keys.encryption.delete( + kid="kid", + ) verify_request_count(test_id, "DELETE", "/keys/encryption/kid", None, 1) @@ -55,5 +68,7 @@ def test_keys_encryption_create_public_wrapping_key() -> None: """Test createPublicWrappingKey endpoint with WireMock""" test_id = "keys.encryption.create_public_wrapping_key.0" client = get_client(test_id) - client.keys.encryption.create_public_wrapping_key(kid="kid") + client.keys.encryption.create_public_wrapping_key( + kid="kid", + ) verify_request_count(test_id, "POST", "/keys/encryption/kid/wrapping-key", None, 1) diff --git a/tests/wire/test_keys_signing.py b/tests/wire/test_keys_signing.py index 3487fc6d..df08005c 100644 --- a/tests/wire/test_keys_signing.py +++ b/tests/wire/test_keys_signing.py @@ -21,7 +21,9 @@ def test_keys_signing_get() -> None: """Test get endpoint with WireMock""" test_id = "keys.signing.get.0" client = get_client(test_id) - client.keys.signing.get(kid="kid") + client.keys.signing.get( + kid="kid", + ) verify_request_count(test_id, "GET", "/keys/signing/kid", None, 1) @@ -29,5 +31,7 @@ def test_keys_signing_revoke() -> None: """Test revoke endpoint with WireMock""" test_id = "keys.signing.revoke.0" client = get_client(test_id) - client.keys.signing.revoke(kid="kid") + client.keys.signing.revoke( + kid="kid", + ) verify_request_count(test_id, "PUT", "/keys/signing/kid/revoke", None, 1) diff --git a/tests/wire/test_logStreams.py b/tests/wire/test_logStreams.py index 17ee6073..533297f7 100644 --- a/tests/wire/test_logStreams.py +++ b/tests/wire/test_logStreams.py @@ -1,5 +1,7 @@ from .conftest import get_client, verify_request_count +from auth0.management import CreateLogStreamHttpRequestBody, LogStreamHttpSink + def test_logStreams_list_() -> None: """Test list endpoint with WireMock""" @@ -13,7 +15,14 @@ def test_logStreams_create() -> None: """Test create endpoint with WireMock""" test_id = "log_streams.create.0" client = get_client(test_id) - client.log_streams.create(request={"type": "http", "sink": {"http_endpoint": "httpEndpoint"}}) + client.log_streams.create( + request=CreateLogStreamHttpRequestBody( + type="http", + sink=LogStreamHttpSink( + http_endpoint="httpEndpoint", + ), + ), + ) verify_request_count(test_id, "POST", "/log-streams", None, 1) @@ -21,7 +30,9 @@ def test_logStreams_get() -> None: """Test get endpoint with WireMock""" test_id = "log_streams.get.0" client = get_client(test_id) - client.log_streams.get(id="id") + client.log_streams.get( + id="id", + ) verify_request_count(test_id, "GET", "/log-streams/id", None, 1) @@ -29,7 +40,9 @@ def test_logStreams_delete() -> None: """Test delete endpoint with WireMock""" test_id = "log_streams.delete.0" client = get_client(test_id) - client.log_streams.delete(id="id") + client.log_streams.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/log-streams/id", None, 1) @@ -37,5 +50,7 @@ def test_logStreams_update() -> None: """Test update endpoint with WireMock""" test_id = "log_streams.update.0" client = get_client(test_id) - client.log_streams.update(id="id") + client.log_streams.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/log-streams/id", None, 1) diff --git a/tests/wire/test_logs.py b/tests/wire/test_logs.py index 871bc85e..7567de69 100644 --- a/tests/wire/test_logs.py +++ b/tests/wire/test_logs.py @@ -6,7 +6,13 @@ def test_logs_list_() -> None: test_id = "logs.list_.0" client = get_client(test_id) client.logs.list( - page=1, per_page=1, sort="sort", fields="fields", include_fields=True, include_totals=True, search="search" + page=1, + per_page=1, + sort="sort", + fields="fields", + include_fields=True, + include_totals=True, + search="search", ) verify_request_count( test_id, @@ -29,5 +35,7 @@ def test_logs_get() -> None: """Test get endpoint with WireMock""" test_id = "logs.get.0" client = get_client(test_id) - client.logs.get(id="id") + client.logs.get( + id="id", + ) verify_request_count(test_id, "GET", "/logs/id", None, 1) diff --git a/tests/wire/test_networkAcls.py b/tests/wire/test_networkAcls.py index 208e424d..1181a8e3 100644 --- a/tests/wire/test_networkAcls.py +++ b/tests/wire/test_networkAcls.py @@ -1,11 +1,17 @@ from .conftest import get_client, verify_request_count +from auth0.management import NetworkAclAction, NetworkAclRule + def test_networkAcls_list_() -> None: """Test list endpoint with WireMock""" test_id = "network_acls.list_.0" client = get_client(test_id) - client.network_acls.list(page=1, per_page=1, include_totals=True) + client.network_acls.list( + page=1, + per_page=1, + include_totals=True, + ) verify_request_count(test_id, "GET", "/network-acls", {"page": "1", "per_page": "1", "include_totals": "true"}, 1) @@ -13,7 +19,14 @@ def test_networkAcls_create() -> None: """Test create endpoint with WireMock""" test_id = "network_acls.create.0" client = get_client(test_id) - client.network_acls.create(description="description", active=True, rule={"action": {}, "scope": "management"}) + client.network_acls.create( + description="description", + active=True, + rule=NetworkAclRule( + action=NetworkAclAction(), + scope="management", + ), + ) verify_request_count(test_id, "POST", "/network-acls", None, 1) @@ -21,7 +34,9 @@ def test_networkAcls_get() -> None: """Test get endpoint with WireMock""" test_id = "network_acls.get.0" client = get_client(test_id) - client.network_acls.get(id="id") + client.network_acls.get( + id="id", + ) verify_request_count(test_id, "GET", "/network-acls/id", None, 1) @@ -29,7 +44,15 @@ def test_networkAcls_set_() -> None: """Test set endpoint with WireMock""" test_id = "network_acls.set_.0" client = get_client(test_id) - client.network_acls.set(id="id", description="description", active=True, rule={"action": {}, "scope": "management"}) + client.network_acls.set( + id="id", + description="description", + active=True, + rule=NetworkAclRule( + action=NetworkAclAction(), + scope="management", + ), + ) verify_request_count(test_id, "PUT", "/network-acls/id", None, 1) @@ -37,7 +60,9 @@ def test_networkAcls_delete() -> None: """Test delete endpoint with WireMock""" test_id = "network_acls.delete.0" client = get_client(test_id) - client.network_acls.delete(id="id") + client.network_acls.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/network-acls/id", None, 1) @@ -45,5 +70,7 @@ def test_networkAcls_update() -> None: """Test update endpoint with WireMock""" test_id = "network_acls.update.0" client = get_client(test_id) - client.network_acls.update(id="id") + client.network_acls.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/network-acls/id", None, 1) diff --git a/tests/wire/test_organizations.py b/tests/wire/test_organizations.py index 9666a83d..a263e9f1 100644 --- a/tests/wire/test_organizations.py +++ b/tests/wire/test_organizations.py @@ -5,7 +5,11 @@ def test_organizations_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.list_.0" client = get_client(test_id) - client.organizations.list(from_="from", take=1, sort="sort") + client.organizations.list( + from_="from", + take=1, + sort="sort", + ) verify_request_count(test_id, "GET", "/organizations", {"from": "from", "take": "1", "sort": "sort"}, 1) @@ -13,7 +17,9 @@ def test_organizations_create() -> None: """Test create endpoint with WireMock""" test_id = "organizations.create.0" client = get_client(test_id) - client.organizations.create(name="name") + client.organizations.create( + name="name", + ) verify_request_count(test_id, "POST", "/organizations", None, 1) @@ -21,7 +27,9 @@ def test_organizations_get_by_name() -> None: """Test getByName endpoint with WireMock""" test_id = "organizations.get_by_name.0" client = get_client(test_id) - client.organizations.get_by_name(name="name") + client.organizations.get_by_name( + name="name", + ) verify_request_count(test_id, "GET", "/organizations/name/name", None, 1) @@ -29,7 +37,9 @@ def test_organizations_get() -> None: """Test get endpoint with WireMock""" test_id = "organizations.get.0" client = get_client(test_id) - client.organizations.get(id="id") + client.organizations.get( + id="id", + ) verify_request_count(test_id, "GET", "/organizations/id", None, 1) @@ -37,7 +47,9 @@ def test_organizations_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.delete.0" client = get_client(test_id) - client.organizations.delete(id="id") + client.organizations.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/organizations/id", None, 1) @@ -45,5 +57,7 @@ def test_organizations_update() -> None: """Test update endpoint with WireMock""" test_id = "organizations.update.0" client = get_client(test_id) - client.organizations.update(id="id") + client.organizations.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/organizations/id", None, 1) diff --git a/tests/wire/test_organizations_clientGrants.py b/tests/wire/test_organizations_clientGrants.py index 3e4188ba..501157c7 100644 --- a/tests/wire/test_organizations_clientGrants.py +++ b/tests/wire/test_organizations_clientGrants.py @@ -6,7 +6,12 @@ def test_organizations_clientGrants_list_() -> None: test_id = "organizations.client_grants.list_.0" client = get_client(test_id) client.organizations.client_grants.list( - id="id", audience="audience", client_id="client_id", page=1, per_page=1, include_totals=True + id="id", + audience="audience", + client_id="client_id", + page=1, + per_page=1, + include_totals=True, ) verify_request_count( test_id, @@ -21,7 +26,10 @@ def test_organizations_clientGrants_create() -> None: """Test create endpoint with WireMock""" test_id = "organizations.client_grants.create.0" client = get_client(test_id) - client.organizations.client_grants.create(id="id", grant_id="grant_id") + client.organizations.client_grants.create( + id="id", + grant_id="grant_id", + ) verify_request_count(test_id, "POST", "/organizations/id/client-grants", None, 1) @@ -29,5 +37,8 @@ def test_organizations_clientGrants_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.client_grants.delete.0" client = get_client(test_id) - client.organizations.client_grants.delete(id="id", grant_id="grant_id") + client.organizations.client_grants.delete( + id="id", + grant_id="grant_id", + ) verify_request_count(test_id, "DELETE", "/organizations/id/client-grants/grant_id", None, 1) diff --git a/tests/wire/test_organizations_connections.py b/tests/wire/test_organizations_connections.py index 64fe3f27..7290af32 100644 --- a/tests/wire/test_organizations_connections.py +++ b/tests/wire/test_organizations_connections.py @@ -5,7 +5,13 @@ def test_organizations_connections_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.connections.list_.0" client = get_client(test_id) - client.organizations.connections.list(id="id", page=1, per_page=1, include_totals=True, is_enabled=True) + client.organizations.connections.list( + id="id", + page=1, + per_page=1, + include_totals=True, + is_enabled=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +25,10 @@ def test_organizations_connections_create() -> None: """Test create endpoint with WireMock""" test_id = "organizations.connections.create.0" client = get_client(test_id) - client.organizations.connections.create(id="id", connection_id="connection_id") + client.organizations.connections.create( + id="id", + connection_id="connection_id", + ) verify_request_count(test_id, "POST", "/organizations/id/connections", None, 1) @@ -27,7 +36,10 @@ def test_organizations_connections_get() -> None: """Test get endpoint with WireMock""" test_id = "organizations.connections.get.0" client = get_client(test_id) - client.organizations.connections.get(id="id", connection_id="connection_id") + client.organizations.connections.get( + id="id", + connection_id="connection_id", + ) verify_request_count(test_id, "GET", "/organizations/id/connections/connection_id", None, 1) @@ -35,7 +47,10 @@ def test_organizations_connections_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.connections.delete.0" client = get_client(test_id) - client.organizations.connections.delete(id="id", connection_id="connection_id") + client.organizations.connections.delete( + id="id", + connection_id="connection_id", + ) verify_request_count(test_id, "DELETE", "/organizations/id/connections/connection_id", None, 1) @@ -43,5 +58,8 @@ def test_organizations_connections_update() -> None: """Test update endpoint with WireMock""" test_id = "organizations.connections.update.0" client = get_client(test_id) - client.organizations.connections.update(id="id", connection_id="connection_id") + client.organizations.connections.update( + id="id", + connection_id="connection_id", + ) verify_request_count(test_id, "PATCH", "/organizations/id/connections/connection_id", None, 1) diff --git a/tests/wire/test_organizations_discoveryDomains.py b/tests/wire/test_organizations_discoveryDomains.py index 6fdf87d7..be9bb52c 100644 --- a/tests/wire/test_organizations_discoveryDomains.py +++ b/tests/wire/test_organizations_discoveryDomains.py @@ -5,7 +5,11 @@ def test_organizations_discoveryDomains_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.discovery_domains.list_.0" client = get_client(test_id) - client.organizations.discovery_domains.list(id="id", from_="from", take=1) + client.organizations.discovery_domains.list( + id="id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/organizations/id/discovery-domains", {"from": "from", "take": "1"}, 1) @@ -13,7 +17,10 @@ def test_organizations_discoveryDomains_create() -> None: """Test create endpoint with WireMock""" test_id = "organizations.discovery_domains.create.0" client = get_client(test_id) - client.organizations.discovery_domains.create(id="id", domain="domain") + client.organizations.discovery_domains.create( + id="id", + domain="domain", + ) verify_request_count(test_id, "POST", "/organizations/id/discovery-domains", None, 1) @@ -21,7 +28,10 @@ def test_organizations_discoveryDomains_get_by_name() -> None: """Test getByName endpoint with WireMock""" test_id = "organizations.discovery_domains.get_by_name.0" client = get_client(test_id) - client.organizations.discovery_domains.get_by_name(id="id", discovery_domain="discovery_domain") + client.organizations.discovery_domains.get_by_name( + id="id", + discovery_domain="discovery_domain", + ) verify_request_count(test_id, "GET", "/organizations/id/discovery-domains/name/discovery_domain", None, 1) @@ -29,7 +39,10 @@ def test_organizations_discoveryDomains_get() -> None: """Test get endpoint with WireMock""" test_id = "organizations.discovery_domains.get.0" client = get_client(test_id) - client.organizations.discovery_domains.get(id="id", discovery_domain_id="discovery_domain_id") + client.organizations.discovery_domains.get( + id="id", + discovery_domain_id="discovery_domain_id", + ) verify_request_count(test_id, "GET", "/organizations/id/discovery-domains/discovery_domain_id", None, 1) @@ -37,7 +50,10 @@ def test_organizations_discoveryDomains_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.discovery_domains.delete.0" client = get_client(test_id) - client.organizations.discovery_domains.delete(id="id", discovery_domain_id="discovery_domain_id") + client.organizations.discovery_domains.delete( + id="id", + discovery_domain_id="discovery_domain_id", + ) verify_request_count(test_id, "DELETE", "/organizations/id/discovery-domains/discovery_domain_id", None, 1) @@ -45,5 +61,8 @@ def test_organizations_discoveryDomains_update() -> None: """Test update endpoint with WireMock""" test_id = "organizations.discovery_domains.update.0" client = get_client(test_id) - client.organizations.discovery_domains.update(id="id", discovery_domain_id="discovery_domain_id") + client.organizations.discovery_domains.update( + id="id", + discovery_domain_id="discovery_domain_id", + ) verify_request_count(test_id, "PATCH", "/organizations/id/discovery-domains/discovery_domain_id", None, 1) diff --git a/tests/wire/test_organizations_enabledConnections.py b/tests/wire/test_organizations_enabledConnections.py index 15515c3e..29cbb1c8 100644 --- a/tests/wire/test_organizations_enabledConnections.py +++ b/tests/wire/test_organizations_enabledConnections.py @@ -5,7 +5,12 @@ def test_organizations_enabledConnections_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.enabled_connections.list_.0" client = get_client(test_id) - client.organizations.enabled_connections.list(id="id", page=1, per_page=1, include_totals=True) + client.organizations.enabled_connections.list( + id="id", + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +24,10 @@ def test_organizations_enabledConnections_add() -> None: """Test add endpoint with WireMock""" test_id = "organizations.enabled_connections.add.0" client = get_client(test_id) - client.organizations.enabled_connections.add(id="id", connection_id="connection_id") + client.organizations.enabled_connections.add( + id="id", + connection_id="connection_id", + ) verify_request_count(test_id, "POST", "/organizations/id/enabled_connections", None, 1) @@ -27,7 +35,10 @@ def test_organizations_enabledConnections_get() -> None: """Test get endpoint with WireMock""" test_id = "organizations.enabled_connections.get.0" client = get_client(test_id) - client.organizations.enabled_connections.get(id="id", connection_id="connectionId") + client.organizations.enabled_connections.get( + id="id", + connection_id="connectionId", + ) verify_request_count(test_id, "GET", "/organizations/id/enabled_connections/connectionId", None, 1) @@ -35,7 +46,10 @@ def test_organizations_enabledConnections_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.enabled_connections.delete.0" client = get_client(test_id) - client.organizations.enabled_connections.delete(id="id", connection_id="connectionId") + client.organizations.enabled_connections.delete( + id="id", + connection_id="connectionId", + ) verify_request_count(test_id, "DELETE", "/organizations/id/enabled_connections/connectionId", None, 1) @@ -43,5 +57,8 @@ def test_organizations_enabledConnections_update() -> None: """Test update endpoint with WireMock""" test_id = "organizations.enabled_connections.update.0" client = get_client(test_id) - client.organizations.enabled_connections.update(id="id", connection_id="connectionId") + client.organizations.enabled_connections.update( + id="id", + connection_id="connectionId", + ) verify_request_count(test_id, "PATCH", "/organizations/id/enabled_connections/connectionId", None, 1) diff --git a/tests/wire/test_organizations_invitations.py b/tests/wire/test_organizations_invitations.py index d884364b..c02fa1da 100644 --- a/tests/wire/test_organizations_invitations.py +++ b/tests/wire/test_organizations_invitations.py @@ -1,12 +1,20 @@ from .conftest import get_client, verify_request_count +from auth0.management import OrganizationInvitationInvitee, OrganizationInvitationInviter + def test_organizations_invitations_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.invitations.list_.0" client = get_client(test_id) client.organizations.invitations.list( - id="id", page=1, per_page=1, include_totals=True, fields="fields", include_fields=True, sort="sort" + id="id", + page=1, + per_page=1, + include_totals=True, + fields="fields", + include_fields=True, + sort="sort", ) verify_request_count( test_id, @@ -29,7 +37,14 @@ def test_organizations_invitations_create() -> None: test_id = "organizations.invitations.create.0" client = get_client(test_id) client.organizations.invitations.create( - id="id", inviter={"name": "name"}, invitee={"email": "email"}, client_id="client_id" + id="id", + inviter=OrganizationInvitationInviter( + name="name", + ), + invitee=OrganizationInvitationInvitee( + email="email", + ), + client_id="client_id", ) verify_request_count(test_id, "POST", "/organizations/id/invitations", None, 1) @@ -38,7 +53,12 @@ def test_organizations_invitations_get() -> None: """Test get endpoint with WireMock""" test_id = "organizations.invitations.get.0" client = get_client(test_id) - client.organizations.invitations.get(id="id", invitation_id="invitation_id", fields="fields", include_fields=True) + client.organizations.invitations.get( + id="id", + invitation_id="invitation_id", + fields="fields", + include_fields=True, + ) verify_request_count( test_id, "GET", "/organizations/id/invitations/invitation_id", {"fields": "fields", "include_fields": "true"}, 1 ) @@ -48,5 +68,8 @@ def test_organizations_invitations_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.invitations.delete.0" client = get_client(test_id) - client.organizations.invitations.delete(id="id", invitation_id="invitation_id") + client.organizations.invitations.delete( + id="id", + invitation_id="invitation_id", + ) verify_request_count(test_id, "DELETE", "/organizations/id/invitations/invitation_id", None, 1) diff --git a/tests/wire/test_organizations_members.py b/tests/wire/test_organizations_members.py index 9ba3d19d..85dbc510 100644 --- a/tests/wire/test_organizations_members.py +++ b/tests/wire/test_organizations_members.py @@ -5,7 +5,13 @@ def test_organizations_members_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.members.list_.0" client = get_client(test_id) - client.organizations.members.list(id="id", from_="from", take=1, fields="fields", include_fields=True) + client.organizations.members.list( + id="id", + from_="from", + take=1, + fields="fields", + include_fields=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +25,10 @@ def test_organizations_members_create() -> None: """Test create endpoint with WireMock""" test_id = "organizations.members.create.0" client = get_client(test_id) - client.organizations.members.create(id="id", members=["members"]) + client.organizations.members.create( + id="id", + members=["members"], + ) verify_request_count(test_id, "POST", "/organizations/id/members", None, 1) @@ -27,5 +36,8 @@ def test_organizations_members_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.members.delete.0" client = get_client(test_id) - client.organizations.members.delete(id="id", members=["members"]) + client.organizations.members.delete( + id="id", + members=["members"], + ) verify_request_count(test_id, "DELETE", "/organizations/id/members", None, 1) diff --git a/tests/wire/test_organizations_members_roles.py b/tests/wire/test_organizations_members_roles.py index 4ef2489a..69e2da22 100644 --- a/tests/wire/test_organizations_members_roles.py +++ b/tests/wire/test_organizations_members_roles.py @@ -5,7 +5,13 @@ def test_organizations_members_roles_list_() -> None: """Test list endpoint with WireMock""" test_id = "organizations.members.roles.list_.0" client = get_client(test_id) - client.organizations.members.roles.list(id="id", user_id="user_id", page=1, per_page=1, include_totals=True) + client.organizations.members.roles.list( + id="id", + user_id="user_id", + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +25,11 @@ def test_organizations_members_roles_assign() -> None: """Test assign endpoint with WireMock""" test_id = "organizations.members.roles.assign.0" client = get_client(test_id) - client.organizations.members.roles.assign(id="id", user_id="user_id", roles=["roles"]) + client.organizations.members.roles.assign( + id="id", + user_id="user_id", + roles=["roles"], + ) verify_request_count(test_id, "POST", "/organizations/id/members/user_id/roles", None, 1) @@ -27,5 +37,9 @@ def test_organizations_members_roles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "organizations.members.roles.delete.0" client = get_client(test_id) - client.organizations.members.roles.delete(id="id", user_id="user_id", roles=["roles"]) + client.organizations.members.roles.delete( + id="id", + user_id="user_id", + roles=["roles"], + ) verify_request_count(test_id, "DELETE", "/organizations/id/members/user_id/roles", None, 1) diff --git a/tests/wire/test_prompts_customText.py b/tests/wire/test_prompts_customText.py index d539b6da..97a48a67 100644 --- a/tests/wire/test_prompts_customText.py +++ b/tests/wire/test_prompts_customText.py @@ -5,7 +5,10 @@ def test_prompts_customText_get() -> None: """Test get endpoint with WireMock""" test_id = "prompts.custom_text.get.0" client = get_client(test_id) - client.prompts.custom_text.get(prompt="login", language="am") + client.prompts.custom_text.get( + prompt="login", + language="am", + ) verify_request_count(test_id, "GET", "/prompts/login/custom-text/am", None, 1) @@ -13,5 +16,9 @@ def test_prompts_customText_set_() -> None: """Test set endpoint with WireMock""" test_id = "prompts.custom_text.set_.0" client = get_client(test_id) - client.prompts.custom_text.set(prompt="login", language="am", request={"key": "value"}) + client.prompts.custom_text.set( + prompt="login", + language="am", + request={"key": "value"}, + ) verify_request_count(test_id, "PUT", "/prompts/login/custom-text/am", None, 1) diff --git a/tests/wire/test_prompts_partials.py b/tests/wire/test_prompts_partials.py index af7f75a9..43fe6665 100644 --- a/tests/wire/test_prompts_partials.py +++ b/tests/wire/test_prompts_partials.py @@ -5,7 +5,9 @@ def test_prompts_partials_get() -> None: """Test get endpoint with WireMock""" test_id = "prompts.partials.get.0" client = get_client(test_id) - client.prompts.partials.get(prompt="login") + client.prompts.partials.get( + prompt="login", + ) verify_request_count(test_id, "GET", "/prompts/login/partials", None, 1) @@ -13,5 +15,8 @@ def test_prompts_partials_set_() -> None: """Test set endpoint with WireMock""" test_id = "prompts.partials.set_.0" client = get_client(test_id) - client.prompts.partials.set(prompt="login", request={"key": "value"}) + client.prompts.partials.set( + prompt="login", + request={"key": "value"}, + ) verify_request_count(test_id, "PUT", "/prompts/login/partials", None, 1) diff --git a/tests/wire/test_prompts_rendering.py b/tests/wire/test_prompts_rendering.py index b02bc16d..92915437 100644 --- a/tests/wire/test_prompts_rendering.py +++ b/tests/wire/test_prompts_rendering.py @@ -1,5 +1,7 @@ from .conftest import get_client, verify_request_count +from auth0.management import AculConfigsItem + def test_prompts_rendering_list_() -> None: """Test list endpoint with WireMock""" @@ -37,7 +39,14 @@ def test_prompts_rendering_bulk_update() -> None: """Test bulkUpdate endpoint with WireMock""" test_id = "prompts.rendering.bulk_update.0" client = get_client(test_id) - client.prompts.rendering.bulk_update(configs=[{"prompt": "login", "screen": "login"}]) + client.prompts.rendering.bulk_update( + configs=[ + AculConfigsItem( + prompt="login", + screen="login", + ) + ], + ) verify_request_count(test_id, "PATCH", "/prompts/rendering", None, 1) @@ -45,7 +54,10 @@ def test_prompts_rendering_get() -> None: """Test get endpoint with WireMock""" test_id = "prompts.rendering.get.0" client = get_client(test_id) - client.prompts.rendering.get(prompt="login", screen="login") + client.prompts.rendering.get( + prompt="login", + screen="login", + ) verify_request_count(test_id, "GET", "/prompts/login/screen/login/rendering", None, 1) @@ -53,5 +65,8 @@ def test_prompts_rendering_update() -> None: """Test update endpoint with WireMock""" test_id = "prompts.rendering.update.0" client = get_client(test_id) - client.prompts.rendering.update(prompt="login", screen="login") + client.prompts.rendering.update( + prompt="login", + screen="login", + ) verify_request_count(test_id, "PATCH", "/prompts/login/screen/login/rendering", None, 1) diff --git a/tests/wire/test_refreshTokens.py b/tests/wire/test_refreshTokens.py index 3fabb826..7734fa06 100644 --- a/tests/wire/test_refreshTokens.py +++ b/tests/wire/test_refreshTokens.py @@ -6,7 +6,12 @@ def test_refreshTokens_list_() -> None: test_id = "refresh_tokens.list_.0" client = get_client(test_id) client.refresh_tokens.list( - user_id="user_id", client_id="client_id", from_="from", take=1, fields="fields", include_fields=True + user_id="user_id", + client_id="client_id", + from_="from", + take=1, + fields="fields", + include_fields=True, ) verify_request_count( test_id, @@ -28,7 +33,9 @@ def test_refreshTokens_get() -> None: """Test get endpoint with WireMock""" test_id = "refresh_tokens.get.0" client = get_client(test_id) - client.refresh_tokens.get(id="id") + client.refresh_tokens.get( + id="id", + ) verify_request_count(test_id, "GET", "/refresh-tokens/id", None, 1) @@ -36,7 +43,9 @@ def test_refreshTokens_delete() -> None: """Test delete endpoint with WireMock""" test_id = "refresh_tokens.delete.0" client = get_client(test_id) - client.refresh_tokens.delete(id="id") + client.refresh_tokens.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/refresh-tokens/id", None, 1) @@ -44,5 +53,7 @@ def test_refreshTokens_update() -> None: """Test update endpoint with WireMock""" test_id = "refresh_tokens.update.0" client = get_client(test_id) - client.refresh_tokens.update(id="id") + client.refresh_tokens.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/refresh-tokens/id", None, 1) diff --git a/tests/wire/test_resourceServers.py b/tests/wire/test_resourceServers.py index 49810dcf..7007f2b8 100644 --- a/tests/wire/test_resourceServers.py +++ b/tests/wire/test_resourceServers.py @@ -5,7 +5,12 @@ def test_resourceServers_list_() -> None: """Test list endpoint with WireMock""" test_id = "resource_servers.list_.0" client = get_client(test_id) - client.resource_servers.list(page=1, per_page=1, include_totals=True, include_fields=True) + client.resource_servers.list( + page=1, + per_page=1, + include_totals=True, + include_fields=True, + ) verify_request_count( test_id, "GET", @@ -19,7 +24,9 @@ def test_resourceServers_create() -> None: """Test create endpoint with WireMock""" test_id = "resource_servers.create.0" client = get_client(test_id) - client.resource_servers.create(identifier="identifier") + client.resource_servers.create( + identifier="identifier", + ) verify_request_count(test_id, "POST", "/resource-servers", None, 1) @@ -27,7 +34,10 @@ def test_resourceServers_get() -> None: """Test get endpoint with WireMock""" test_id = "resource_servers.get.0" client = get_client(test_id) - client.resource_servers.get(id="id", include_fields=True) + client.resource_servers.get( + id="id", + include_fields=True, + ) verify_request_count(test_id, "GET", "/resource-servers/id", {"include_fields": "true"}, 1) @@ -35,7 +45,9 @@ def test_resourceServers_delete() -> None: """Test delete endpoint with WireMock""" test_id = "resource_servers.delete.0" client = get_client(test_id) - client.resource_servers.delete(id="id") + client.resource_servers.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/resource-servers/id", None, 1) @@ -43,5 +55,7 @@ def test_resourceServers_update() -> None: """Test update endpoint with WireMock""" test_id = "resource_servers.update.0" client = get_client(test_id) - client.resource_servers.update(id="id") + client.resource_servers.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/resource-servers/id", None, 1) diff --git a/tests/wire/test_riskAssessments_settings.py b/tests/wire/test_riskAssessments_settings.py index d749ccfd..ba85006c 100644 --- a/tests/wire/test_riskAssessments_settings.py +++ b/tests/wire/test_riskAssessments_settings.py @@ -13,5 +13,7 @@ def test_riskAssessments_settings_update() -> None: """Test update endpoint with WireMock""" test_id = "risk_assessments.settings.update.0" client = get_client(test_id) - client.risk_assessments.settings.update(enabled=True) + client.risk_assessments.settings.update( + enabled=True, + ) verify_request_count(test_id, "PATCH", "/risk-assessments/settings", None, 1) diff --git a/tests/wire/test_riskAssessments_settings_newDevice.py b/tests/wire/test_riskAssessments_settings_newDevice.py index 347e392e..4dbbaf66 100644 --- a/tests/wire/test_riskAssessments_settings_newDevice.py +++ b/tests/wire/test_riskAssessments_settings_newDevice.py @@ -13,5 +13,7 @@ def test_riskAssessments_settings_newDevice_update() -> None: """Test update endpoint with WireMock""" test_id = "risk_assessments.settings.new_device.update.0" client = get_client(test_id) - client.risk_assessments.settings.new_device.update(remember_for=1) + client.risk_assessments.settings.new_device.update( + remember_for=1, + ) verify_request_count(test_id, "PATCH", "/risk-assessments/settings/new-device", None, 1) diff --git a/tests/wire/test_roles.py b/tests/wire/test_roles.py index 2a774484..4dc57659 100644 --- a/tests/wire/test_roles.py +++ b/tests/wire/test_roles.py @@ -5,7 +5,12 @@ def test_roles_list_() -> None: """Test list endpoint with WireMock""" test_id = "roles.list_.0" client = get_client(test_id) - client.roles.list(per_page=1, page=1, include_totals=True, name_filter="name_filter") + client.roles.list( + per_page=1, + page=1, + include_totals=True, + name_filter="name_filter", + ) verify_request_count( test_id, "GET", @@ -19,7 +24,9 @@ def test_roles_create() -> None: """Test create endpoint with WireMock""" test_id = "roles.create.0" client = get_client(test_id) - client.roles.create(name="name") + client.roles.create( + name="name", + ) verify_request_count(test_id, "POST", "/roles", None, 1) @@ -27,7 +34,9 @@ def test_roles_get() -> None: """Test get endpoint with WireMock""" test_id = "roles.get.0" client = get_client(test_id) - client.roles.get(id="id") + client.roles.get( + id="id", + ) verify_request_count(test_id, "GET", "/roles/id", None, 1) @@ -35,7 +44,9 @@ def test_roles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "roles.delete.0" client = get_client(test_id) - client.roles.delete(id="id") + client.roles.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/roles/id", None, 1) @@ -43,5 +54,7 @@ def test_roles_update() -> None: """Test update endpoint with WireMock""" test_id = "roles.update.0" client = get_client(test_id) - client.roles.update(id="id") + client.roles.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/roles/id", None, 1) diff --git a/tests/wire/test_roles_permissions.py b/tests/wire/test_roles_permissions.py index 80026cc3..fd8214e1 100644 --- a/tests/wire/test_roles_permissions.py +++ b/tests/wire/test_roles_permissions.py @@ -1,11 +1,18 @@ from .conftest import get_client, verify_request_count +from auth0.management import PermissionRequestPayload + def test_roles_permissions_list_() -> None: """Test list endpoint with WireMock""" test_id = "roles.permissions.list_.0" client = get_client(test_id) - client.roles.permissions.list(id="id", per_page=1, page=1, include_totals=True) + client.roles.permissions.list( + id="id", + per_page=1, + page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/roles/id/permissions", {"per_page": "1", "page": "1", "include_totals": "true"}, 1 ) @@ -18,7 +25,10 @@ def test_roles_permissions_add() -> None: client.roles.permissions.add( id="id", permissions=[ - {"resource_server_identifier": "resource_server_identifier", "permission_name": "permission_name"} + PermissionRequestPayload( + resource_server_identifier="resource_server_identifier", + permission_name="permission_name", + ) ], ) verify_request_count(test_id, "POST", "/roles/id/permissions", None, 1) @@ -31,7 +41,10 @@ def test_roles_permissions_delete() -> None: client.roles.permissions.delete( id="id", permissions=[ - {"resource_server_identifier": "resource_server_identifier", "permission_name": "permission_name"} + PermissionRequestPayload( + resource_server_identifier="resource_server_identifier", + permission_name="permission_name", + ) ], ) verify_request_count(test_id, "DELETE", "/roles/id/permissions", None, 1) diff --git a/tests/wire/test_roles_users.py b/tests/wire/test_roles_users.py index 2c360c35..3a117043 100644 --- a/tests/wire/test_roles_users.py +++ b/tests/wire/test_roles_users.py @@ -5,7 +5,11 @@ def test_roles_users_list_() -> None: """Test list endpoint with WireMock""" test_id = "roles.users.list_.0" client = get_client(test_id) - client.roles.users.list(id="id", from_="from", take=1) + client.roles.users.list( + id="id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/roles/id/users", {"from": "from", "take": "1"}, 1) @@ -13,5 +17,8 @@ def test_roles_users_assign() -> None: """Test assign endpoint with WireMock""" test_id = "roles.users.assign.0" client = get_client(test_id) - client.roles.users.assign(id="id", users=["users"]) + client.roles.users.assign( + id="id", + users=["users"], + ) verify_request_count(test_id, "POST", "/roles/id/users", None, 1) diff --git a/tests/wire/test_rules.py b/tests/wire/test_rules.py index e0f2766f..99f5d84d 100644 --- a/tests/wire/test_rules.py +++ b/tests/wire/test_rules.py @@ -5,7 +5,14 @@ def test_rules_list_() -> None: """Test list endpoint with WireMock""" test_id = "rules.list_.0" client = get_client(test_id) - client.rules.list(page=1, per_page=1, include_totals=True, enabled=True, fields="fields", include_fields=True) + client.rules.list( + page=1, + per_page=1, + include_totals=True, + enabled=True, + fields="fields", + include_fields=True, + ) verify_request_count( test_id, "GET", @@ -26,7 +33,10 @@ def test_rules_create() -> None: """Test create endpoint with WireMock""" test_id = "rules.create.0" client = get_client(test_id) - client.rules.create(name="name", script="script") + client.rules.create( + name="name", + script="script", + ) verify_request_count(test_id, "POST", "/rules", None, 1) @@ -34,7 +44,11 @@ def test_rules_get() -> None: """Test get endpoint with WireMock""" test_id = "rules.get.0" client = get_client(test_id) - client.rules.get(id="id", fields="fields", include_fields=True) + client.rules.get( + id="id", + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/rules/id", {"fields": "fields", "include_fields": "true"}, 1) @@ -42,7 +56,9 @@ def test_rules_delete() -> None: """Test delete endpoint with WireMock""" test_id = "rules.delete.0" client = get_client(test_id) - client.rules.delete(id="id") + client.rules.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/rules/id", None, 1) @@ -50,5 +66,7 @@ def test_rules_update() -> None: """Test update endpoint with WireMock""" test_id = "rules.update.0" client = get_client(test_id) - client.rules.update(id="id") + client.rules.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/rules/id", None, 1) diff --git a/tests/wire/test_rulesConfigs.py b/tests/wire/test_rulesConfigs.py index 02717723..e732be79 100644 --- a/tests/wire/test_rulesConfigs.py +++ b/tests/wire/test_rulesConfigs.py @@ -13,7 +13,10 @@ def test_rulesConfigs_set_() -> None: """Test set endpoint with WireMock""" test_id = "rules_configs.set_.0" client = get_client(test_id) - client.rules_configs.set(key="key", value="value") + client.rules_configs.set( + key="key", + value="value", + ) verify_request_count(test_id, "PUT", "/rules-configs/key", None, 1) @@ -21,5 +24,7 @@ def test_rulesConfigs_delete() -> None: """Test delete endpoint with WireMock""" test_id = "rules_configs.delete.0" client = get_client(test_id) - client.rules_configs.delete(key="key") + client.rules_configs.delete( + key="key", + ) verify_request_count(test_id, "DELETE", "/rules-configs/key", None, 1) diff --git a/tests/wire/test_selfServiceProfiles.py b/tests/wire/test_selfServiceProfiles.py index 1d232f1b..ac183bde 100644 --- a/tests/wire/test_selfServiceProfiles.py +++ b/tests/wire/test_selfServiceProfiles.py @@ -5,7 +5,11 @@ def test_selfServiceProfiles_list_() -> None: """Test list endpoint with WireMock""" test_id = "self_service_profiles.list_.0" client = get_client(test_id) - client.self_service_profiles.list(page=1, per_page=1, include_totals=True) + client.self_service_profiles.list( + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/self-service-profiles", {"page": "1", "per_page": "1", "include_totals": "true"}, 1 ) @@ -15,7 +19,9 @@ def test_selfServiceProfiles_create() -> None: """Test create endpoint with WireMock""" test_id = "self_service_profiles.create.0" client = get_client(test_id) - client.self_service_profiles.create(name="name") + client.self_service_profiles.create( + name="name", + ) verify_request_count(test_id, "POST", "/self-service-profiles", None, 1) @@ -23,7 +29,9 @@ def test_selfServiceProfiles_get() -> None: """Test get endpoint with WireMock""" test_id = "self_service_profiles.get.0" client = get_client(test_id) - client.self_service_profiles.get(id="id") + client.self_service_profiles.get( + id="id", + ) verify_request_count(test_id, "GET", "/self-service-profiles/id", None, 1) @@ -31,7 +39,9 @@ def test_selfServiceProfiles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "self_service_profiles.delete.0" client = get_client(test_id) - client.self_service_profiles.delete(id="id") + client.self_service_profiles.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/self-service-profiles/id", None, 1) @@ -39,5 +49,7 @@ def test_selfServiceProfiles_update() -> None: """Test update endpoint with WireMock""" test_id = "self_service_profiles.update.0" client = get_client(test_id) - client.self_service_profiles.update(id="id") + client.self_service_profiles.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/self-service-profiles/id", None, 1) diff --git a/tests/wire/test_selfServiceProfiles_customText.py b/tests/wire/test_selfServiceProfiles_customText.py index 69f875ff..b84167b4 100644 --- a/tests/wire/test_selfServiceProfiles_customText.py +++ b/tests/wire/test_selfServiceProfiles_customText.py @@ -5,7 +5,11 @@ def test_selfServiceProfiles_customText_list_() -> None: """Test list endpoint with WireMock""" test_id = "self_service_profiles.custom_text.list_.0" client = get_client(test_id) - client.self_service_profiles.custom_text.list(id="id", language="en", page="get-started") + client.self_service_profiles.custom_text.list( + id="id", + language="en", + page="get-started", + ) verify_request_count(test_id, "GET", "/self-service-profiles/id/custom-text/en/get-started", None, 1) @@ -13,5 +17,10 @@ def test_selfServiceProfiles_customText_set_() -> None: """Test set endpoint with WireMock""" test_id = "self_service_profiles.custom_text.set_.0" client = get_client(test_id) - client.self_service_profiles.custom_text.set(id="id", language="en", page="get-started", request={"key": "value"}) + client.self_service_profiles.custom_text.set( + id="id", + language="en", + page="get-started", + request={"key": "value"}, + ) verify_request_count(test_id, "PUT", "/self-service-profiles/id/custom-text/en/get-started", None, 1) diff --git a/tests/wire/test_selfServiceProfiles_ssoTicket.py b/tests/wire/test_selfServiceProfiles_ssoTicket.py index c71ebacf..e17e0eb8 100644 --- a/tests/wire/test_selfServiceProfiles_ssoTicket.py +++ b/tests/wire/test_selfServiceProfiles_ssoTicket.py @@ -5,7 +5,9 @@ def test_selfServiceProfiles_ssoTicket_create() -> None: """Test create endpoint with WireMock""" test_id = "self_service_profiles.sso_ticket.create.0" client = get_client(test_id) - client.self_service_profiles.sso_ticket.create(id="id") + client.self_service_profiles.sso_ticket.create( + id="id", + ) verify_request_count(test_id, "POST", "/self-service-profiles/id/sso-ticket", None, 1) @@ -13,5 +15,8 @@ def test_selfServiceProfiles_ssoTicket_revoke() -> None: """Test revoke endpoint with WireMock""" test_id = "self_service_profiles.sso_ticket.revoke.0" client = get_client(test_id) - client.self_service_profiles.sso_ticket.revoke(profile_id="profileId", id="id") + client.self_service_profiles.sso_ticket.revoke( + profile_id="profileId", + id="id", + ) verify_request_count(test_id, "POST", "/self-service-profiles/profileId/sso-ticket/id/revoke", None, 1) diff --git a/tests/wire/test_sessions.py b/tests/wire/test_sessions.py index 3e0b29a2..a547f607 100644 --- a/tests/wire/test_sessions.py +++ b/tests/wire/test_sessions.py @@ -5,7 +5,9 @@ def test_sessions_get() -> None: """Test get endpoint with WireMock""" test_id = "sessions.get.0" client = get_client(test_id) - client.sessions.get(id="id") + client.sessions.get( + id="id", + ) verify_request_count(test_id, "GET", "/sessions/id", None, 1) @@ -13,7 +15,9 @@ def test_sessions_delete() -> None: """Test delete endpoint with WireMock""" test_id = "sessions.delete.0" client = get_client(test_id) - client.sessions.delete(id="id") + client.sessions.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/sessions/id", None, 1) @@ -21,7 +25,9 @@ def test_sessions_update() -> None: """Test update endpoint with WireMock""" test_id = "sessions.update.0" client = get_client(test_id) - client.sessions.update(id="id") + client.sessions.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/sessions/id", None, 1) @@ -29,5 +35,7 @@ def test_sessions_revoke() -> None: """Test revoke endpoint with WireMock""" test_id = "sessions.revoke.0" client = get_client(test_id) - client.sessions.revoke(id="id") + client.sessions.revoke( + id="id", + ) verify_request_count(test_id, "POST", "/sessions/id/revoke", None, 1) diff --git a/tests/wire/test_stats.py b/tests/wire/test_stats.py index e2cf0692..f36e070b 100644 --- a/tests/wire/test_stats.py +++ b/tests/wire/test_stats.py @@ -13,5 +13,8 @@ def test_stats_get_daily() -> None: """Test getDaily endpoint with WireMock""" test_id = "stats.get_daily.0" client = get_client(test_id) - client.stats.get_daily(from_="from", to="to") + client.stats.get_daily( + from_="from", + to="to", + ) verify_request_count(test_id, "GET", "/stats/daily", {"from": "from", "to": "to"}, 1) diff --git a/tests/wire/test_supplementalSignals.py b/tests/wire/test_supplementalSignals.py index f486be10..8a1c0a47 100644 --- a/tests/wire/test_supplementalSignals.py +++ b/tests/wire/test_supplementalSignals.py @@ -13,5 +13,7 @@ def test_supplementalSignals_patch() -> None: """Test patch endpoint with WireMock""" test_id = "supplemental_signals.patch.0" client = get_client(test_id) - client.supplemental_signals.patch(akamai_enabled=True) + client.supplemental_signals.patch( + akamai_enabled=True, + ) verify_request_count(test_id, "PATCH", "/supplemental-signals", None, 1) diff --git a/tests/wire/test_tenants_settings.py b/tests/wire/test_tenants_settings.py index b54284f1..4f00d2a2 100644 --- a/tests/wire/test_tenants_settings.py +++ b/tests/wire/test_tenants_settings.py @@ -5,7 +5,10 @@ def test_tenants_settings_get() -> None: """Test get endpoint with WireMock""" test_id = "tenants.settings.get.0" client = get_client(test_id) - client.tenants.settings.get(fields="fields", include_fields=True) + client.tenants.settings.get( + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/tenants/settings", {"fields": "fields", "include_fields": "true"}, 1) diff --git a/tests/wire/test_tickets.py b/tests/wire/test_tickets.py index 73fc2fc2..b92bfb16 100644 --- a/tests/wire/test_tickets.py +++ b/tests/wire/test_tickets.py @@ -5,7 +5,9 @@ def test_tickets_verify_email() -> None: """Test verifyEmail endpoint with WireMock""" test_id = "tickets.verify_email.0" client = get_client(test_id) - client.tickets.verify_email(user_id="user_id") + client.tickets.verify_email( + user_id="user_id", + ) verify_request_count(test_id, "POST", "/tickets/email-verification", None, 1) diff --git a/tests/wire/test_tokenExchangeProfiles.py b/tests/wire/test_tokenExchangeProfiles.py index 66658ec8..6156438e 100644 --- a/tests/wire/test_tokenExchangeProfiles.py +++ b/tests/wire/test_tokenExchangeProfiles.py @@ -5,7 +5,10 @@ def test_tokenExchangeProfiles_list_() -> None: """Test list endpoint with WireMock""" test_id = "token_exchange_profiles.list_.0" client = get_client(test_id) - client.token_exchange_profiles.list(from_="from", take=1) + client.token_exchange_profiles.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/token-exchange-profiles", {"from": "from", "take": "1"}, 1) @@ -14,7 +17,10 @@ def test_tokenExchangeProfiles_create() -> None: test_id = "token_exchange_profiles.create.0" client = get_client(test_id) client.token_exchange_profiles.create( - name="name", subject_token_type="subject_token_type", action_id="action_id", type="custom_authentication" + name="name", + subject_token_type="subject_token_type", + action_id="action_id", + type="custom_authentication", ) verify_request_count(test_id, "POST", "/token-exchange-profiles", None, 1) @@ -23,7 +29,9 @@ def test_tokenExchangeProfiles_get() -> None: """Test get endpoint with WireMock""" test_id = "token_exchange_profiles.get.0" client = get_client(test_id) - client.token_exchange_profiles.get(id="id") + client.token_exchange_profiles.get( + id="id", + ) verify_request_count(test_id, "GET", "/token-exchange-profiles/id", None, 1) @@ -31,7 +39,9 @@ def test_tokenExchangeProfiles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "token_exchange_profiles.delete.0" client = get_client(test_id) - client.token_exchange_profiles.delete(id="id") + client.token_exchange_profiles.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/token-exchange-profiles/id", None, 1) @@ -39,5 +49,7 @@ def test_tokenExchangeProfiles_update() -> None: """Test update endpoint with WireMock""" test_id = "token_exchange_profiles.update.0" client = get_client(test_id) - client.token_exchange_profiles.update(id="id") + client.token_exchange_profiles.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/token-exchange-profiles/id", None, 1) diff --git a/tests/wire/test_userAttributeProfiles.py b/tests/wire/test_userAttributeProfiles.py index beefb9c0..17a2b391 100644 --- a/tests/wire/test_userAttributeProfiles.py +++ b/tests/wire/test_userAttributeProfiles.py @@ -1,11 +1,16 @@ from .conftest import get_client, verify_request_count +from auth0.management import UserAttributeProfileUserAttributeAdditionalProperties + def test_userAttributeProfiles_list_() -> None: """Test list endpoint with WireMock""" test_id = "user_attribute_profiles.list_.0" client = get_client(test_id) - client.user_attribute_profiles.list(from_="from", take=1) + client.user_attribute_profiles.list( + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/user-attribute-profiles", {"from": "from", "take": "1"}, 1) @@ -16,12 +21,12 @@ def test_userAttributeProfiles_create() -> None: client.user_attribute_profiles.create( name="name", user_attributes={ - "key": { - "description": "description", - "label": "label", - "profile_required": True, - "auth_0_mapping": "auth0_mapping", - } + "key": UserAttributeProfileUserAttributeAdditionalProperties( + description="description", + label="label", + profile_required=True, + auth_0_mapping="auth0_mapping", + ) }, ) verify_request_count(test_id, "POST", "/user-attribute-profiles", None, 1) @@ -39,7 +44,9 @@ def test_userAttributeProfiles_get_template() -> None: """Test getTemplate endpoint with WireMock""" test_id = "user_attribute_profiles.get_template.0" client = get_client(test_id) - client.user_attribute_profiles.get_template(id="id") + client.user_attribute_profiles.get_template( + id="id", + ) verify_request_count(test_id, "GET", "/user-attribute-profiles/templates/id", None, 1) @@ -47,7 +54,9 @@ def test_userAttributeProfiles_get() -> None: """Test get endpoint with WireMock""" test_id = "user_attribute_profiles.get.0" client = get_client(test_id) - client.user_attribute_profiles.get(id="id") + client.user_attribute_profiles.get( + id="id", + ) verify_request_count(test_id, "GET", "/user-attribute-profiles/id", None, 1) @@ -55,7 +64,9 @@ def test_userAttributeProfiles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "user_attribute_profiles.delete.0" client = get_client(test_id) - client.user_attribute_profiles.delete(id="id") + client.user_attribute_profiles.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/user-attribute-profiles/id", None, 1) @@ -63,5 +74,7 @@ def test_userAttributeProfiles_update() -> None: """Test update endpoint with WireMock""" test_id = "user_attribute_profiles.update.0" client = get_client(test_id) - client.user_attribute_profiles.update(id="id") + client.user_attribute_profiles.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/user-attribute-profiles/id", None, 1) diff --git a/tests/wire/test_userBlocks.py b/tests/wire/test_userBlocks.py index 57b00498..37271275 100644 --- a/tests/wire/test_userBlocks.py +++ b/tests/wire/test_userBlocks.py @@ -5,7 +5,10 @@ def test_userBlocks_list_by_identifier() -> None: """Test listByIdentifier endpoint with WireMock""" test_id = "user_blocks.list_by_identifier.0" client = get_client(test_id) - client.user_blocks.list_by_identifier(identifier="identifier", consider_brute_force_enablement=True) + client.user_blocks.list_by_identifier( + identifier="identifier", + consider_brute_force_enablement=True, + ) verify_request_count( test_id, "GET", "/user-blocks", {"identifier": "identifier", "consider_brute_force_enablement": "true"}, 1 ) @@ -15,7 +18,9 @@ def test_userBlocks_delete_by_identifier() -> None: """Test deleteByIdentifier endpoint with WireMock""" test_id = "user_blocks.delete_by_identifier.0" client = get_client(test_id) - client.user_blocks.delete_by_identifier(identifier="identifier") + client.user_blocks.delete_by_identifier( + identifier="identifier", + ) verify_request_count(test_id, "DELETE", "/user-blocks", {"identifier": "identifier"}, 1) @@ -23,7 +28,10 @@ def test_userBlocks_list_() -> None: """Test list endpoint with WireMock""" test_id = "user_blocks.list_.0" client = get_client(test_id) - client.user_blocks.list(id="id", consider_brute_force_enablement=True) + client.user_blocks.list( + id="id", + consider_brute_force_enablement=True, + ) verify_request_count(test_id, "GET", "/user-blocks/id", {"consider_brute_force_enablement": "true"}, 1) @@ -31,5 +39,7 @@ def test_userBlocks_delete() -> None: """Test delete endpoint with WireMock""" test_id = "user_blocks.delete.0" client = get_client(test_id) - client.user_blocks.delete(id="id") + client.user_blocks.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/user-blocks/id", None, 1) diff --git a/tests/wire/test_userGrants.py b/tests/wire/test_userGrants.py index f1cb4f60..0cf9f48e 100644 --- a/tests/wire/test_userGrants.py +++ b/tests/wire/test_userGrants.py @@ -6,7 +6,12 @@ def test_userGrants_list_() -> None: test_id = "user_grants.list_.0" client = get_client(test_id) client.user_grants.list( - per_page=1, page=1, include_totals=True, user_id="user_id", client_id="client_id", audience="audience" + per_page=1, + page=1, + include_totals=True, + user_id="user_id", + client_id="client_id", + audience="audience", ) verify_request_count( test_id, @@ -28,7 +33,9 @@ def test_userGrants_delete_by_user_id() -> None: """Test deleteByUserId endpoint with WireMock""" test_id = "user_grants.delete_by_user_id.0" client = get_client(test_id) - client.user_grants.delete_by_user_id(user_id="user_id") + client.user_grants.delete_by_user_id( + user_id="user_id", + ) verify_request_count(test_id, "DELETE", "/grants", {"user_id": "user_id"}, 1) @@ -36,5 +43,7 @@ def test_userGrants_delete() -> None: """Test delete endpoint with WireMock""" test_id = "user_grants.delete.0" client = get_client(test_id) - client.user_grants.delete(id="id") + client.user_grants.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/grants/id", None, 1) diff --git a/tests/wire/test_users.py b/tests/wire/test_users.py index cce535cc..1c42f3e7 100644 --- a/tests/wire/test_users.py +++ b/tests/wire/test_users.py @@ -41,7 +41,9 @@ def test_users_create() -> None: """Test create endpoint with WireMock""" test_id = "users.create.0" client = get_client(test_id) - client.users.create(connection="connection") + client.users.create( + connection="connection", + ) verify_request_count(test_id, "POST", "/users", None, 1) @@ -49,7 +51,11 @@ def test_users_list_users_by_email() -> None: """Test listUsersByEmail endpoint with WireMock""" test_id = "users.list_users_by_email.0" client = get_client(test_id) - client.users.list_users_by_email(fields="fields", include_fields=True, email="email") + client.users.list_users_by_email( + fields="fields", + include_fields=True, + email="email", + ) verify_request_count( test_id, "GET", "/users-by-email", {"fields": "fields", "include_fields": "true", "email": "email"}, 1 ) @@ -59,7 +65,11 @@ def test_users_get() -> None: """Test get endpoint with WireMock""" test_id = "users.get.0" client = get_client(test_id) - client.users.get(id="id", fields="fields", include_fields=True) + client.users.get( + id="id", + fields="fields", + include_fields=True, + ) verify_request_count(test_id, "GET", "/users/id", {"fields": "fields", "include_fields": "true"}, 1) @@ -67,7 +77,9 @@ def test_users_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.delete.0" client = get_client(test_id) - client.users.delete(id="id") + client.users.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/users/id", None, 1) @@ -75,7 +87,9 @@ def test_users_update() -> None: """Test update endpoint with WireMock""" test_id = "users.update.0" client = get_client(test_id) - client.users.update(id="id") + client.users.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/users/id", None, 1) @@ -83,7 +97,9 @@ def test_users_regenerate_recovery_code() -> None: """Test regenerateRecoveryCode endpoint with WireMock""" test_id = "users.regenerate_recovery_code.0" client = get_client(test_id) - client.users.regenerate_recovery_code(id="id") + client.users.regenerate_recovery_code( + id="id", + ) verify_request_count(test_id, "POST", "/users/id/recovery-code-regeneration", None, 1) @@ -91,5 +107,7 @@ def test_users_revoke_access() -> None: """Test revokeAccess endpoint with WireMock""" test_id = "users.revoke_access.0" client = get_client(test_id) - client.users.revoke_access(id="id") + client.users.revoke_access( + id="id", + ) verify_request_count(test_id, "POST", "/users/id/revoke-access", None, 1) diff --git a/tests/wire/test_users_authenticationMethods.py b/tests/wire/test_users_authenticationMethods.py index 3db14a1c..8631d572 100644 --- a/tests/wire/test_users_authenticationMethods.py +++ b/tests/wire/test_users_authenticationMethods.py @@ -1,11 +1,18 @@ from .conftest import get_client, verify_request_count +from auth0.management import SetUserAuthenticationMethods + def test_users_authenticationMethods_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.authentication_methods.list_.0" client = get_client(test_id) - client.users.authentication_methods.list(id="id", page=1, per_page=1, include_totals=True) + client.users.authentication_methods.list( + id="id", + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/users/id/authentication-methods", {"page": "1", "per_page": "1", "include_totals": "true"}, 1 ) @@ -15,7 +22,10 @@ def test_users_authenticationMethods_create() -> None: """Test create endpoint with WireMock""" test_id = "users.authentication_methods.create.0" client = get_client(test_id) - client.users.authentication_methods.create(id="id", type="phone") + client.users.authentication_methods.create( + id="id", + type="phone", + ) verify_request_count(test_id, "POST", "/users/id/authentication-methods", None, 1) @@ -23,7 +33,14 @@ def test_users_authenticationMethods_set_() -> None: """Test set endpoint with WireMock""" test_id = "users.authentication_methods.set_.0" client = get_client(test_id) - client.users.authentication_methods.set(id="id", request=[{"type": "phone"}]) + client.users.authentication_methods.set( + id="id", + request=[ + SetUserAuthenticationMethods( + type="phone", + ) + ], + ) verify_request_count(test_id, "PUT", "/users/id/authentication-methods", None, 1) @@ -31,7 +48,9 @@ def test_users_authenticationMethods_delete_all() -> None: """Test deleteAll endpoint with WireMock""" test_id = "users.authentication_methods.delete_all.0" client = get_client(test_id) - client.users.authentication_methods.delete_all(id="id") + client.users.authentication_methods.delete_all( + id="id", + ) verify_request_count(test_id, "DELETE", "/users/id/authentication-methods", None, 1) @@ -39,7 +58,10 @@ def test_users_authenticationMethods_get() -> None: """Test get endpoint with WireMock""" test_id = "users.authentication_methods.get.0" client = get_client(test_id) - client.users.authentication_methods.get(id="id", authentication_method_id="authentication_method_id") + client.users.authentication_methods.get( + id="id", + authentication_method_id="authentication_method_id", + ) verify_request_count(test_id, "GET", "/users/id/authentication-methods/authentication_method_id", None, 1) @@ -47,7 +69,10 @@ def test_users_authenticationMethods_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.authentication_methods.delete.0" client = get_client(test_id) - client.users.authentication_methods.delete(id="id", authentication_method_id="authentication_method_id") + client.users.authentication_methods.delete( + id="id", + authentication_method_id="authentication_method_id", + ) verify_request_count(test_id, "DELETE", "/users/id/authentication-methods/authentication_method_id", None, 1) @@ -55,5 +80,8 @@ def test_users_authenticationMethods_update() -> None: """Test update endpoint with WireMock""" test_id = "users.authentication_methods.update.0" client = get_client(test_id) - client.users.authentication_methods.update(id="id", authentication_method_id="authentication_method_id") + client.users.authentication_methods.update( + id="id", + authentication_method_id="authentication_method_id", + ) verify_request_count(test_id, "PATCH", "/users/id/authentication-methods/authentication_method_id", None, 1) diff --git a/tests/wire/test_users_authenticators.py b/tests/wire/test_users_authenticators.py index 1e8925d1..84def5b3 100644 --- a/tests/wire/test_users_authenticators.py +++ b/tests/wire/test_users_authenticators.py @@ -5,5 +5,7 @@ def test_users_authenticators_delete_all() -> None: """Test deleteAll endpoint with WireMock""" test_id = "users.authenticators.delete_all.0" client = get_client(test_id) - client.users.authenticators.delete_all(id="id") + client.users.authenticators.delete_all( + id="id", + ) verify_request_count(test_id, "DELETE", "/users/id/authenticators", None, 1) diff --git a/tests/wire/test_users_connectedAccounts.py b/tests/wire/test_users_connectedAccounts.py index 83b18a0c..df0f062e 100644 --- a/tests/wire/test_users_connectedAccounts.py +++ b/tests/wire/test_users_connectedAccounts.py @@ -5,5 +5,9 @@ def test_users_connectedAccounts_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.connected_accounts.list_.0" client = get_client(test_id) - client.users.connected_accounts.list(id="id", from_="from", take=1) + client.users.connected_accounts.list( + id="id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/users/id/connected-accounts", {"from": "from", "take": "1"}, 1) diff --git a/tests/wire/test_users_enrollments.py b/tests/wire/test_users_enrollments.py index 5a0b6cb1..650f2626 100644 --- a/tests/wire/test_users_enrollments.py +++ b/tests/wire/test_users_enrollments.py @@ -5,5 +5,7 @@ def test_users_enrollments_get() -> None: """Test get endpoint with WireMock""" test_id = "users.enrollments.get.0" client = get_client(test_id) - client.users.enrollments.get(id="id") + client.users.enrollments.get( + id="id", + ) verify_request_count(test_id, "GET", "/users/id/enrollments", None, 1) diff --git a/tests/wire/test_users_federatedConnectionsTokensets.py b/tests/wire/test_users_federatedConnectionsTokensets.py index ca5a013e..56adbeec 100644 --- a/tests/wire/test_users_federatedConnectionsTokensets.py +++ b/tests/wire/test_users_federatedConnectionsTokensets.py @@ -5,7 +5,9 @@ def test_users_federatedConnectionsTokensets_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.federated_connections_tokensets.list_.0" client = get_client(test_id) - client.users.federated_connections_tokensets.list(id="id") + client.users.federated_connections_tokensets.list( + id="id", + ) verify_request_count(test_id, "GET", "/users/id/federated-connections-tokensets", None, 1) @@ -13,5 +15,8 @@ def test_users_federatedConnectionsTokensets_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.federated_connections_tokensets.delete.0" client = get_client(test_id) - client.users.federated_connections_tokensets.delete(id="id", tokenset_id="tokenset_id") + client.users.federated_connections_tokensets.delete( + id="id", + tokenset_id="tokenset_id", + ) verify_request_count(test_id, "DELETE", "/users/id/federated-connections-tokensets/tokenset_id", None, 1) diff --git a/tests/wire/test_users_groups.py b/tests/wire/test_users_groups.py index 0ca81622..16eab6f7 100644 --- a/tests/wire/test_users_groups.py +++ b/tests/wire/test_users_groups.py @@ -5,7 +5,13 @@ def test_users_groups_get() -> None: """Test get endpoint with WireMock""" test_id = "users.groups.get.0" client = get_client(test_id) - client.users.groups.get(id="id", fields="fields", include_fields=True, from_="from", take=1) + client.users.groups.get( + id="id", + fields="fields", + include_fields=True, + from_="from", + take=1, + ) verify_request_count( test_id, "GET", diff --git a/tests/wire/test_users_identities.py b/tests/wire/test_users_identities.py index 8e28f266..e28c75d1 100644 --- a/tests/wire/test_users_identities.py +++ b/tests/wire/test_users_identities.py @@ -5,7 +5,9 @@ def test_users_identities_link() -> None: """Test link endpoint with WireMock""" test_id = "users.identities.link.0" client = get_client(test_id) - client.users.identities.link(id="id") + client.users.identities.link( + id="id", + ) verify_request_count(test_id, "POST", "/users/id/identities", None, 1) @@ -13,5 +15,9 @@ def test_users_identities_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.identities.delete.0" client = get_client(test_id) - client.users.identities.delete(id="id", provider="ad", user_id="user_id") + client.users.identities.delete( + id="id", + provider="ad", + user_id="user_id", + ) verify_request_count(test_id, "DELETE", "/users/id/identities/ad/user_id", None, 1) diff --git a/tests/wire/test_users_logs.py b/tests/wire/test_users_logs.py index 1e0d4cc3..93537ed3 100644 --- a/tests/wire/test_users_logs.py +++ b/tests/wire/test_users_logs.py @@ -5,7 +5,13 @@ def test_users_logs_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.logs.list_.0" client = get_client(test_id) - client.users.logs.list(id="id", page=1, per_page=1, sort="sort", include_totals=True) + client.users.logs.list( + id="id", + page=1, + per_page=1, + sort="sort", + include_totals=True, + ) verify_request_count( test_id, "GET", "/users/id/logs", {"page": "1", "per_page": "1", "sort": "sort", "include_totals": "true"}, 1 ) diff --git a/tests/wire/test_users_multifactor.py b/tests/wire/test_users_multifactor.py index dec34425..92736cb3 100644 --- a/tests/wire/test_users_multifactor.py +++ b/tests/wire/test_users_multifactor.py @@ -5,7 +5,9 @@ def test_users_multifactor_invalidate_remember_browser() -> None: """Test invalidateRememberBrowser endpoint with WireMock""" test_id = "users.multifactor.invalidate_remember_browser.0" client = get_client(test_id) - client.users.multifactor.invalidate_remember_browser(id="id") + client.users.multifactor.invalidate_remember_browser( + id="id", + ) verify_request_count(test_id, "POST", "/users/id/multifactor/actions/invalidate-remember-browser", None, 1) @@ -13,5 +15,8 @@ def test_users_multifactor_delete_provider() -> None: """Test deleteProvider endpoint with WireMock""" test_id = "users.multifactor.delete_provider.0" client = get_client(test_id) - client.users.multifactor.delete_provider(id="id", provider="duo") + client.users.multifactor.delete_provider( + id="id", + provider="duo", + ) verify_request_count(test_id, "DELETE", "/users/id/multifactor/duo", None, 1) diff --git a/tests/wire/test_users_organizations.py b/tests/wire/test_users_organizations.py index b9f64999..abae7813 100644 --- a/tests/wire/test_users_organizations.py +++ b/tests/wire/test_users_organizations.py @@ -5,7 +5,12 @@ def test_users_organizations_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.organizations.list_.0" client = get_client(test_id) - client.users.organizations.list(id="id", page=1, per_page=1, include_totals=True) + client.users.organizations.list( + id="id", + page=1, + per_page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/users/id/organizations", {"page": "1", "per_page": "1", "include_totals": "true"}, 1 ) diff --git a/tests/wire/test_users_permissions.py b/tests/wire/test_users_permissions.py index d1608ff7..ffef5f26 100644 --- a/tests/wire/test_users_permissions.py +++ b/tests/wire/test_users_permissions.py @@ -1,11 +1,18 @@ from .conftest import get_client, verify_request_count +from auth0.management import PermissionRequestPayload + def test_users_permissions_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.permissions.list_.0" client = get_client(test_id) - client.users.permissions.list(id="id", per_page=1, page=1, include_totals=True) + client.users.permissions.list( + id="id", + per_page=1, + page=1, + include_totals=True, + ) verify_request_count( test_id, "GET", "/users/id/permissions", {"per_page": "1", "page": "1", "include_totals": "true"}, 1 ) @@ -18,7 +25,10 @@ def test_users_permissions_create() -> None: client.users.permissions.create( id="id", permissions=[ - {"resource_server_identifier": "resource_server_identifier", "permission_name": "permission_name"} + PermissionRequestPayload( + resource_server_identifier="resource_server_identifier", + permission_name="permission_name", + ) ], ) verify_request_count(test_id, "POST", "/users/id/permissions", None, 1) @@ -31,7 +41,10 @@ def test_users_permissions_delete() -> None: client.users.permissions.delete( id="id", permissions=[ - {"resource_server_identifier": "resource_server_identifier", "permission_name": "permission_name"} + PermissionRequestPayload( + resource_server_identifier="resource_server_identifier", + permission_name="permission_name", + ) ], ) verify_request_count(test_id, "DELETE", "/users/id/permissions", None, 1) diff --git a/tests/wire/test_users_refreshToken.py b/tests/wire/test_users_refreshToken.py index 2eafa8ae..80468283 100644 --- a/tests/wire/test_users_refreshToken.py +++ b/tests/wire/test_users_refreshToken.py @@ -5,7 +5,11 @@ def test_users_refreshToken_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.refresh_token.list_.0" client = get_client(test_id) - client.users.refresh_token.list(user_id="user_id", from_="from", take=1) + client.users.refresh_token.list( + user_id="user_id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/users/user_id/refresh-tokens", {"from": "from", "take": "1"}, 1) @@ -13,5 +17,7 @@ def test_users_refreshToken_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.refresh_token.delete.0" client = get_client(test_id) - client.users.refresh_token.delete(user_id="user_id") + client.users.refresh_token.delete( + user_id="user_id", + ) verify_request_count(test_id, "DELETE", "/users/user_id/refresh-tokens", None, 1) diff --git a/tests/wire/test_users_riskAssessments.py b/tests/wire/test_users_riskAssessments.py index 477e9e43..f841d257 100644 --- a/tests/wire/test_users_riskAssessments.py +++ b/tests/wire/test_users_riskAssessments.py @@ -5,5 +5,9 @@ def test_users_riskAssessments_clear() -> None: """Test clear endpoint with WireMock""" test_id = "users.risk_assessments.clear.0" client = get_client(test_id) - client.users.risk_assessments.clear(id="id", connection="connection", assessors=["new-device"]) + client.users.risk_assessments.clear( + id="id", + connection="connection", + assessors=["new-device"], + ) verify_request_count(test_id, "POST", "/users/id/risk-assessments/clear", None, 1) diff --git a/tests/wire/test_users_roles.py b/tests/wire/test_users_roles.py index 8204e68c..7730d838 100644 --- a/tests/wire/test_users_roles.py +++ b/tests/wire/test_users_roles.py @@ -5,7 +5,12 @@ def test_users_roles_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.roles.list_.0" client = get_client(test_id) - client.users.roles.list(id="id", per_page=1, page=1, include_totals=True) + client.users.roles.list( + id="id", + per_page=1, + page=1, + include_totals=True, + ) verify_request_count(test_id, "GET", "/users/id/roles", {"per_page": "1", "page": "1", "include_totals": "true"}, 1) @@ -13,7 +18,10 @@ def test_users_roles_assign() -> None: """Test assign endpoint with WireMock""" test_id = "users.roles.assign.0" client = get_client(test_id) - client.users.roles.assign(id="id", roles=["roles"]) + client.users.roles.assign( + id="id", + roles=["roles"], + ) verify_request_count(test_id, "POST", "/users/id/roles", None, 1) @@ -21,5 +29,8 @@ def test_users_roles_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.roles.delete.0" client = get_client(test_id) - client.users.roles.delete(id="id", roles=["roles"]) + client.users.roles.delete( + id="id", + roles=["roles"], + ) verify_request_count(test_id, "DELETE", "/users/id/roles", None, 1) diff --git a/tests/wire/test_users_sessions.py b/tests/wire/test_users_sessions.py index 091ba235..0184176f 100644 --- a/tests/wire/test_users_sessions.py +++ b/tests/wire/test_users_sessions.py @@ -5,7 +5,11 @@ def test_users_sessions_list_() -> None: """Test list endpoint with WireMock""" test_id = "users.sessions.list_.0" client = get_client(test_id) - client.users.sessions.list(user_id="user_id", from_="from", take=1) + client.users.sessions.list( + user_id="user_id", + from_="from", + take=1, + ) verify_request_count(test_id, "GET", "/users/user_id/sessions", {"from": "from", "take": "1"}, 1) @@ -13,5 +17,7 @@ def test_users_sessions_delete() -> None: """Test delete endpoint with WireMock""" test_id = "users.sessions.delete.0" client = get_client(test_id) - client.users.sessions.delete(user_id="user_id") + client.users.sessions.delete( + user_id="user_id", + ) verify_request_count(test_id, "DELETE", "/users/user_id/sessions", None, 1) diff --git a/tests/wire/test_verifiableCredentials_verification_templates.py b/tests/wire/test_verifiableCredentials_verification_templates.py index 3e2c71f5..fd59f20c 100644 --- a/tests/wire/test_verifiableCredentials_verification_templates.py +++ b/tests/wire/test_verifiableCredentials_verification_templates.py @@ -1,11 +1,16 @@ from .conftest import get_client, verify_request_count +from auth0.management import MdlPresentationProperties, MdlPresentationRequest, MdlPresentationRequestProperties + def test_verifiableCredentials_verification_templates_list_() -> None: """Test list endpoint with WireMock""" test_id = "verifiable_credentials.verification.templates.list_.0" client = get_client(test_id) - client.verifiable_credentials.verification.templates.list(from_="from", take=1) + client.verifiable_credentials.verification.templates.list( + from_="from", + take=1, + ) verify_request_count( test_id, "GET", "/verifiable-credentials/verification/templates", {"from": "from", "take": "1"}, 1 ) @@ -19,7 +24,11 @@ def test_verifiableCredentials_verification_templates_create() -> None: name="name", type="type", dialect="dialect", - presentation={"org_iso_18013_5_1_m_dl": {"org_iso_18013_5_1": {}}}, + presentation=MdlPresentationRequest( + org_iso_18013_5_1_m_dl=MdlPresentationRequestProperties( + org_iso_18013_5_1=MdlPresentationProperties(), + ), + ), well_known_trusted_issuers="well_known_trusted_issuers", ) verify_request_count(test_id, "POST", "/verifiable-credentials/verification/templates", None, 1) @@ -29,7 +38,9 @@ def test_verifiableCredentials_verification_templates_get() -> None: """Test get endpoint with WireMock""" test_id = "verifiable_credentials.verification.templates.get.0" client = get_client(test_id) - client.verifiable_credentials.verification.templates.get(id="id") + client.verifiable_credentials.verification.templates.get( + id="id", + ) verify_request_count(test_id, "GET", "/verifiable-credentials/verification/templates/id", None, 1) @@ -37,7 +48,9 @@ def test_verifiableCredentials_verification_templates_delete() -> None: """Test delete endpoint with WireMock""" test_id = "verifiable_credentials.verification.templates.delete.0" client = get_client(test_id) - client.verifiable_credentials.verification.templates.delete(id="id") + client.verifiable_credentials.verification.templates.delete( + id="id", + ) verify_request_count(test_id, "DELETE", "/verifiable-credentials/verification/templates/id", None, 1) @@ -45,5 +58,7 @@ def test_verifiableCredentials_verification_templates_update() -> None: """Test update endpoint with WireMock""" test_id = "verifiable_credentials.verification.templates.update.0" client = get_client(test_id) - client.verifiable_credentials.verification.templates.update(id="id") + client.verifiable_credentials.verification.templates.update( + id="id", + ) verify_request_count(test_id, "PATCH", "/verifiable-credentials/verification/templates/id", None, 1) diff --git a/wiremock/wiremock-mappings.json b/wiremock/wiremock-mappings.json index 9ca74b05..b2da0ed9 100644 --- a/wiremock/wiremock-mappings.json +++ b/wiremock/wiremock-mappings.json @@ -1 +1,14847 @@ -{"mappings":[{"id":"33519415-78d5-4e20-b7ed-c0f6609b6e90","name":"Get actions - default","request":{"urlPathTemplate":"/actions/actions","method":"GET"},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"actions\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"installed_integration_id\": \"installed_integration_id\",\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33519415-78d5-4e20-b7ed-c0f6609b6e90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","name":"Create an action - default","request":{"urlPathTemplate":"/actions/actions","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9919a572-ff14-4914-88b8-acd7f6acc41d","name":"Get an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9919a572-ff14-4914-88b8-acd7f6acc41d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bb73e26-2243-414b-80fc-fcf53169d4fe","name":"Delete an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1bb73e26-2243-414b-80fc-fcf53169d4fe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2679764d-6f00-495e-b8fb-210d140167ba","name":"Update an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2679764d-6f00-495e-b8fb-210d140167ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bde5116-17ac-4ea2-be52-e584711a6b70","name":"Deploy an action - default","request":{"urlPathTemplate":"/actions/actions/{id}/deploy","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bde5116-17ac-4ea2-be52-e584711a6b70","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ebf627bb-6f85-4597-a454-0c654c35202c","name":"Test an Action - default","request":{"urlPathTemplate":"/actions/actions/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"payload\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"ebf627bb-6f85-4597-a454-0c654c35202c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f76d290-6b70-4f62-abc8-3760917fe787","name":"Get branding settings - default","request":{"urlPathTemplate":"/branding","method":"GET"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f76d290-6b70-4f62-abc8-3760917fe787","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9ca9e729-0745-457c-828d-37f7c8ab1698","name":"Update branding settings - default","request":{"urlPathTemplate":"/branding","method":"PATCH"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9ca9e729-0745-457c-828d-37f7c8ab1698","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5dbe0859-fbb5-4eb1-a803-8132e840e762","name":"Get client grants - default","request":{"urlPathTemplate":"/client-grants","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5dbe0859-fbb5-4eb1-a803-8132e840e762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"006f7f26-5002-4b98-a65f-39f8aee8e968","name":"Create client grant - default","request":{"urlPathTemplate":"/client-grants","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"006f7f26-5002-4b98-a65f-39f8aee8e968","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","name":"Get client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"00010fe3-8553-4cd6-9b9a-68aad031054f","name":"Delete client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"00010fe3-8553-4cd6-9b9a-68aad031054f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","name":"Update client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e9057410-f073-4b5b-83dc-dc4d5625ef27","name":"Get clients - default","request":{"urlPathTemplate":"/clients","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"clients\": [\n {\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"grant_types\": [\n \"grant_types\"\n ],\n \"signing_keys\": [\n {}\n ],\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\"\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {}\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9057410-f073-4b5b-83dc-dc4d5625ef27","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","name":"Create a client - default","request":{"urlPathTemplate":"/clients","method":"POST"},"response":{"status":201,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b8d4879d-c044-46cf-9b84-f94f05858081","name":"Preview and validate Client ID Metadata Document - default","request":{"urlPathTemplate":"/clients/cimd/preview","method":"POST"},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"errors\": [\n \"errors\"\n ],\n \"validation\": {\n \"valid\": true,\n \"violations\": [\n \"violations\"\n ],\n \"warnings\": [\n \"warnings\"\n ]\n },\n \"mapped_fields\": {\n \"external_client_id\": \"external_client_id\",\n \"name\": \"name\",\n \"app_type\": \"app_type\",\n \"callbacks\": [\n \"callbacks\"\n ],\n \"logo_uri\": \"logo_uri\",\n \"description\": \"description\",\n \"grant_types\": [\n \"grant_types\"\n ],\n \"token_endpoint_auth_method\": \"token_endpoint_auth_method\",\n \"jwks_uri\": \"jwks_uri\",\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"credential_type\": \"credential_type\",\n \"kid\": \"kid\",\n \"alg\": \"alg\"\n }\n ]\n }\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b8d4879d-c044-46cf-9b84-f94f05858081","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"89ded3bf-7977-43f9-93dc-2f65f3dbc0fe","name":"Register or update a CIMD client via metadata URI - default","request":{"urlPathTemplate":"/clients/cimd/register","method":"POST"},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"mapped_fields\": {\n \"external_client_id\": \"external_client_id\",\n \"name\": \"name\",\n \"app_type\": \"app_type\",\n \"callbacks\": [\n \"callbacks\"\n ],\n \"logo_uri\": \"logo_uri\",\n \"description\": \"description\",\n \"grant_types\": [\n \"grant_types\"\n ],\n \"token_endpoint_auth_method\": \"token_endpoint_auth_method\",\n \"jwks_uri\": \"jwks_uri\",\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"credential_type\": \"credential_type\",\n \"kid\": \"kid\",\n \"alg\": \"alg\"\n }\n ]\n }\n }\n },\n \"validation\": {\n \"valid\": true,\n \"violations\": [\n \"violations\"\n ],\n \"warnings\": [\n \"warnings\"\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"89ded3bf-7977-43f9-93dc-2f65f3dbc0fe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","name":"Get client by ID - default","request":{"urlPathTemplate":"/clients/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"814f5054-4723-45e8-8d89-5a7da08db0d8","name":"Delete a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"814f5054-4723-45e8-8d89-5a7da08db0d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e5dc6c-c84f-4128-b87a-50876b601f77","name":"Update a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e5dc6c-c84f-4128-b87a-50876b601f77","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","name":"Rotate a client secret - default","request":{"urlPathTemplate":"/clients/{id}/rotate-secret","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"af1dc5c5-16af-447c-8374-e80a178ce120","name":"Get Connection Profiles - default","request":{"urlPathTemplate":"/connection-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connection_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"af1dc5c5-16af-447c-8374-e80a178ce120","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","name":"Create a connection profile - default","request":{"urlPathTemplate":"/connection-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d6f52e7-dd90-4579-a469-761793294ec5","name":"Get Connection Profile Templates - default","request":{"urlPathTemplate":"/connection-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"connection_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d6f52e7-dd90-4579-a469-761793294ec5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","name":"Get Connection Profile Template - default","request":{"urlPathTemplate":"/connection-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","name":"Get Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","name":"Delete Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77f167dc-e4c6-478a-b74f-0e1385df797c","name":"Modify a Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"77f167dc-e4c6-478a-b74f-0e1385df797c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","name":"Get all connections - default","request":{"urlPathTemplate":"/connections","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bfae8759-4528-462e-9a50-239cbd75f902","name":"Create a connection - default","request":{"urlPathTemplate":"/connections","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"bfae8759-4528-462e-9a50-239cbd75f902","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","name":"Get a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e55d516f-7f79-4796-8adf-e0032183c04c","name":"Delete a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e55d516f-7f79-4796-8adf-e0032183c04c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"aa701672-a67f-47fc-9cfd-3d68353d9846","name":"Update a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"aa701672-a67f-47fc-9cfd-3d68353d9846","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6e5db857-6ab6-4406-a83f-fb4332f72b48","name":"Check connection status - default","request":{"urlPathTemplate":"/connections/{id}/status","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6e5db857-6ab6-4406-a83f-fb4332f72b48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65f529d-2be4-4dc7-81c0-6d696834184e","name":"Get custom domains configurations - default","request":{"urlPathTemplate":"/custom-domains","method":"GET"},"response":{"status":200,"body":"[\n {\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c65f529d-2be4-4dc7-81c0-6d696834184e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d2917b20-da7e-4962-a75f-362f99682cf9","name":"Configure a new custom domain - default","request":{"urlPathTemplate":"/custom-domains","method":"POST"},"response":{"status":201,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2917b20-da7e-4962-a75f-362f99682cf9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3d8672c6-5dc1-4542-a4d4-d8538c1fcb62","name":"Get the default domain - default","request":{"urlPathTemplate":"/custom-domains/default","method":"GET"},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3d8672c6-5dc1-4542-a4d4-d8538c1fcb62","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9234f676-54a6-42a5-b92b-9d5b98462b82","name":"Update the default custom domain for the tenant - default","request":{"urlPathTemplate":"/custom-domains/default","method":"PATCH"},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9234f676-54a6-42a5-b92b-9d5b98462b82","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d56d6773-eda9-4b8a-9193-025d27feecb9","name":"Get custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d56d6773-eda9-4b8a-9193-025d27feecb9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","name":"Delete custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","name":"Update custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","name":"Test a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"success\": true,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"43d540a8-528e-44db-9bda-83cf1ef8a54d","name":"Verify a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/verify","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"cname_api_key\": \"cname_api_key\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"43d540a8-528e-44db-9bda-83cf1ef8a54d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cfcb7751-7a75-45bf-b39f-29bac41590da","name":"Retrieve device credentials - default","request":{"urlPathTemplate":"/device-credentials","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"device_credentials\": [\n {\n \"id\": \"id\",\n \"device_name\": \"device_name\",\n \"device_id\": \"device_id\",\n \"type\": \"public_key\",\n \"user_id\": \"user_id\",\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"cfcb7751-7a75-45bf-b39f-29bac41590da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","name":"Create a device public key credential - default","request":{"urlPathTemplate":"/device-credentials","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","name":"Delete a device credential - default","request":{"urlPathTemplate":"/device-credentials/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"27d925db-b0e4-4cad-bf10-75440adb5dea","name":"Create an email template - default","request":{"urlPathTemplate":"/email-templates","method":"POST"},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"27d925db-b0e4-4cad-bf10-75440adb5dea","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e41992b1-8cf3-4611-9179-334debfd831a","name":"Get an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"GET","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e41992b1-8cf3-4611-9179-334debfd831a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","name":"Update an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PUT","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","name":"Patch an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PATCH","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fe7f4b8-58ff-4442-9339-c48f5185600f","name":"Get event streams - default","request":{"urlPathTemplate":"/event-streams","method":"GET"},"response":{"status":200,"body":"{\n \"eventStreams\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {}\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0fe7f4b8-58ff-4442-9339-c48f5185600f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","name":"Create an event stream - default","request":{"urlPathTemplate":"/event-streams","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"85d4a52f-7433-408c-a7cc-30776d9ed641","name":"Get an event stream by ID - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"85d4a52f-7433-408c-a7cc-30776d9ed641","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4812fcc9-8f28-4732-96d4-8adb072fa78a","name":"Delete an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4812fcc9-8f28-4732-96d4-8adb072fa78a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","name":"Update an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4ba115c6-e86b-4427-9ce9-8468a24916b0","name":"Send a test event to an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4ba115c6-e86b-4427-9ce9-8468a24916b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9bee2213-71c4-41f8-9350-d50ede2f6c53","name":"Get flows - default","request":{"urlPathTemplate":"/flows","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"flows\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9bee2213-71c4-41f8-9350-d50ede2f6c53","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","name":"Create a flow - default","request":{"urlPathTemplate":"/flows","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1eccebc1-db7b-4349-8fae-45c8537e9880","name":"Get a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1eccebc1-db7b-4349-8fae-45c8537e9880","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","name":"Delete a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fc07198a-b41e-4537-aec6-1226e9691c86","name":"Update a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fc07198a-b41e-4537-aec6-1226e9691c86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bf65872-e8cf-4987-becb-bb082f08419f","name":"Get forms - default","request":{"urlPathTemplate":"/forms","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"forms\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bf65872-e8cf-4987-becb-bb082f08419f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","name":"Create a form - default","request":{"urlPathTemplate":"/forms","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf329d0-420d-4f08-aec1-df5f12d67762","name":"Get a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bf329d0-420d-4f08-aec1-df5f12d67762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","name":"Delete a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"944b211b-eacb-4acc-8f40-a3463ae62f37","name":"Update a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"944b211b-eacb-4acc-8f40-a3463ae62f37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"800693b3-6319-4d73-997d-7899f5d8b842","name":"Get grants - default","request":{"urlPathTemplate":"/grants","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"grants\": [\n {\n \"id\": \"id\",\n \"clientID\": \"clientID\",\n \"user_id\": \"user_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"800693b3-6319-4d73-997d-7899f5d8b842","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","name":"Delete a grant by user_id - default","request":{"urlPathTemplate":"/grants","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","name":"Delete a grant by id - default","request":{"urlPathTemplate":"/grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","name":"Get all Groups - default","request":{"urlPathTemplate":"/groups","method":"GET"},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"871b57bd-a1f8-4a23-8337-5872e46fc987","name":"Get a Group - default","request":{"urlPathTemplate":"/groups/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"871b57bd-a1f8-4a23-8337-5872e46fc987","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8cbbad9c-deff-4a46-bd84-189922d9d131","name":"Delete a Group - default","request":{"urlPathTemplate":"/groups/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8cbbad9c-deff-4a46-bd84-189922d9d131","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e59d144-ec26-4602-a30e-51471fa41a83","name":"Get hooks - default","request":{"urlPathTemplate":"/hooks","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"hooks\": [\n {\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e59d144-ec26-4602-a30e-51471fa41a83","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","name":"Create a hook - default","request":{"urlPathTemplate":"/hooks","method":"POST"},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f14ce249-5900-4b4f-acd6-a9fa7255d829","name":"Get a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f14ce249-5900-4b4f-acd6-a9fa7255d829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","name":"Delete a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b56e935-667b-4af8-be86-94a3aa61008d","name":"Update a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b56e935-667b-4af8-be86-94a3aa61008d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdce95c-c559-471a-985a-45682f16bc5a","name":"Get a job - default","request":{"urlPathTemplate":"/jobs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"location\": \"location\",\n \"percentage_done\": 1,\n \"time_left_seconds\": 1,\n \"format\": \"json\",\n \"status_details\": \"status_details\",\n \"summary\": {\n \"failed\": 1,\n \"updated\": 1,\n \"inserted\": 1,\n \"total\": 1\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdce95c-c559-471a-985a-45682f16bc5a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","name":"Get log streams - default","request":{"urlPathTemplate":"/log-streams","method":"GET"},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {}\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3cac6a38-0d9f-40e0-983f-439cbedfa617","name":"Create a log stream - default","request":{"urlPathTemplate":"/log-streams","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cac6a38-0d9f-40e0-983f-439cbedfa617","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","name":"Get log stream by ID - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9fb04f8d-0fba-4891-8126-013d70d871aa","name":"Delete log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9fb04f8d-0fba-4891-8126-013d70d871aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8d10acdd-e185-496c-98c4-c91d469e6ed2","name":"Update a log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"8d10acdd-e185-496c-98c4-c91d469e6ed2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","name":"Search log events - default","request":{"urlPathTemplate":"/logs","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b10cc251-b48a-429a-a136-810cdb7290fc","name":"Get a log event by id - default","request":{"urlPathTemplate":"/logs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\",\n \"security_context\": {\n \"ja3\": \"ja3\",\n \"ja4\": \"ja4\"\n },\n \"location_info\": {\n \"country_code\": \"country_code\",\n \"country_code3\": \"country_code3\",\n \"country_name\": \"country_name\",\n \"city_name\": \"city_name\",\n \"latitude\": 1.1,\n \"longitude\": 1.1,\n \"time_zone\": \"time_zone\",\n \"continent_code\": \"continent_code\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b10cc251-b48a-429a-a136-810cdb7290fc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858e0070-39b1-460a-a2d5-53d0a5c3524a","name":"Get all access control list entries for a tenant - default","request":{"urlPathTemplate":"/network-acls","method":"GET"},"response":{"status":200,"body":"{\n \"network_acls\": [\n {\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {},\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"858e0070-39b1-460a-a2d5-53d0a5c3524a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f8a963bf-a53b-445d-b1d7-e21a4b253957","name":"Create Access Control List - default","request":{"urlPathTemplate":"/network-acls","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f8a963bf-a53b-445d-b1d7-e21a4b253957","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","name":"Get a specific access control list entry for a tenant - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b26d23ea-edcd-4512-a319-51a6e98131a0","name":"Update Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b26d23ea-edcd-4512-a319-51a6e98131a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","name":"Delete Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80648d37-b6ab-4ab4-ba80-17f00933453d","name":"Partial Update for an Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"80648d37-b6ab-4ab4-ba80-17f00933453d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4016e68-1c58-4a5c-b698-27ca350b937c","name":"Get organizations - default","request":{"urlPathTemplate":"/organizations","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a4016e68-1c58-4a5c-b698-27ca350b937c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"61349de2-c20a-4002-822b-9ed84e87ca1f","name":"Create an Organization - default","request":{"urlPathTemplate":"/organizations","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"61349de2-c20a-4002-822b-9ed84e87ca1f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dabd338a-8798-40ba-aaa0-8ce9b262b711","name":"Get organization by name - default","request":{"urlPathTemplate":"/organizations/name/{name}","method":"GET","pathParameters":{"name":{"equalTo":"name"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"dabd338a-8798-40ba-aaa0-8ce9b262b711","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da7fe10b-f528-48cf-b4e0-8d769617a66c","name":"Get organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"da7fe10b-f528-48cf-b4e0-8d769617a66c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"82031fa8-9043-489a-aa84-46bae3772393","name":"Delete organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"82031fa8-9043-489a-aa84-46bae3772393","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","name":"Modify an Organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","name":"Get prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"GET"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","name":"Update prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"PATCH"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1be8f43f-0f7e-4335-879a-b48d21ecfac6","name":"Get refresh tokens - default","request":{"urlPathTemplate":"/refresh-tokens","method":"GET"},"response":{"status":200,"body":"{\n \"refresh_tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1be8f43f-0f7e-4335-879a-b48d21ecfac6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6a045b19-b94d-495c-b30c-c1de79efc46f","name":"Get a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6a045b19-b94d-495c-b30c-c1de79efc46f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","name":"Delete a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7ea8e845-2337-4fbc-9632-246f4befb072","name":"Update a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ea8e845-2337-4fbc-9632-246f4befb072","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","name":"Get resource servers - default","request":{"urlPathTemplate":"/resource-servers","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"resource_servers\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"alg\": \"RSA-OAEP-256\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true\n },\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"47aa9a64-a544-47e0-9817-a2fe54866219","name":"Create a resource server - default","request":{"urlPathTemplate":"/resource-servers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47aa9a64-a544-47e0-9817-a2fe54866219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da399a32-c9a2-481c-9995-fc402c47f72a","name":"Get a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"da399a32-c9a2-481c-9995-fc402c47f72a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","name":"Delete a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","name":"Update a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","name":"Get roles - default","request":{"urlPathTemplate":"/roles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","name":"Create a role - default","request":{"urlPathTemplate":"/roles","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","name":"Get a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","name":"Delete a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb25cab0-ca38-4950-ba80-98504d41bb20","name":"Update a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb25cab0-ca38-4950-ba80-98504d41bb20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"551dd253-310d-4f66-ab80-e07988490a37","name":"Get rules - default","request":{"urlPathTemplate":"/rules","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"rules\": [\n {\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"551dd253-310d-4f66-ab80-e07988490a37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","name":"Create a rule - default","request":{"urlPathTemplate":"/rules","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6bd903b2-17f8-4021-9cae-4c1141223c95","name":"Get a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6bd903b2-17f8-4021-9cae-4c1141223c95","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6110c86e-027f-441b-bb72-e5b0e6096803","name":"Delete a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6110c86e-027f-441b-bb72-e5b0e6096803","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3033effa-f1f9-4988-8752-203075bb6aec","name":"Update a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3033effa-f1f9-4988-8752-203075bb6aec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","name":"Retrieve config variable keys for rules (get_rules-configs) - default","request":{"urlPathTemplate":"/rules-configs","method":"GET"},"response":{"status":200,"body":"[\n {\n \"key\": \"key\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f90321dc-6914-4101-8af1-743cafaa62d7","name":"Set rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"PUT","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"{\n \"key\": \"key\",\n \"value\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f90321dc-6914-4101-8af1-743cafaa62d7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4e06c73c-ffd7-4b88-9857-99801c652707","name":"Delete rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"DELETE","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4e06c73c-ffd7-4b88-9857-99801c652707","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","name":"Get self-service profiles - default","request":{"urlPathTemplate":"/self-service-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"self_service_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","name":"Create a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"19739c76-9199-492a-bd18-730f773b6ffb","name":"Get a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"19739c76-9199-492a-bd18-730f773b6ffb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","name":"Delete a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","name":"Update a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3eff16ca-bc50-43ac-9373-249bdaf18766","name":"Get session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3eff16ca-bc50-43ac-9373-249bdaf18766","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","name":"Delete session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","name":"Update session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","name":"Revokes a session - default","request":{"urlPathTemplate":"/sessions/{id}/revoke","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","name":"Get active users count - default","request":{"urlPathTemplate":"/stats/active-users","method":"GET"},"response":{"status":200,"body":"1.1","headers":{"Content-Type":"application/json"}},"uuid":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","name":"Get daily stats - default","request":{"urlPathTemplate":"/stats/daily","method":"GET"},"response":{"status":200,"body":"[\n {\n \"date\": \"date\",\n \"logins\": 1,\n \"signups\": 1,\n \"leaked_passwords\": 1,\n \"updated_at\": \"updated_at\",\n \"created_at\": \"created_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"818f5cc7-86b3-4568-8861-9d114c5669ef","name":"Get the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"GET"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"818f5cc7-86b3-4568-8861-9d114c5669ef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","name":"Update the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"PATCH"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b479979-e975-4c68-b8fd-ca081dfcbca7","name":"Create an email verification ticket - default","request":{"urlPathTemplate":"/tickets/email-verification","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b479979-e975-4c68-b8fd-ca081dfcbca7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","name":"Create a password change ticket - default","request":{"urlPathTemplate":"/tickets/password-change","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","name":"Get token exchange profiles - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"token_exchange_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","name":"Create a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4594d614-c499-48ab-9fee-e1d4df134a89","name":"Get a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4594d614-c499-48ab-9fee-e1d4df134a89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","name":"Delete a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","name":"Update an existing token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","name":"Get User Attribute Profiles - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"user_attribute_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","name":"Post User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5a222f5e-5188-4dff-ae26-46d41f56c061","name":"Get User Attribute Profile Templates - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"user_attribute_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5a222f5e-5188-4dff-ae26-46d41f56c061","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","name":"Get User Attribute Profile Template - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b09540c6-726c-42e3-b5e8-dbc7182c2147","name":"Get User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b09540c6-726c-42e3-b5e8-dbc7182c2147","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","name":"Delete User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e6307a7-6f62-4b1f-a02b-e6414927a286","name":"Modify a user attribute profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e6307a7-6f62-4b1f-a02b-e6414927a286","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","name":"Get blocks by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"GET"},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","name":"Unblock by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2565899-4c2a-4b6b-93b5-caecdbadc782","name":"Get a user's blocks - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2565899-4c2a-4b6b-93b5-caecdbadc782","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b3f82ebe-f646-4a06-9770-8ece4e55d861","name":"Unblock a user - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b3f82ebe-f646-4a06-9770-8ece4e55d861","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8b4e8914-5be6-4e9b-896f-0b72752d9671","name":"List or Search Users - default","request":{"urlPathTemplate":"/users","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8b4e8914-5be6-4e9b-896f-0b72752d9671","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","name":"Create a User - default","request":{"urlPathTemplate":"/users","method":"POST"},"response":{"status":201,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","name":"Search Users by Email - default","request":{"urlPathTemplate":"/users-by-email","method":"GET"},"response":{"status":200,"body":"[\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9fc639a9-4bc3-4dab-909f-41947203684a","name":"Get a User - default","request":{"urlPathTemplate":"/users/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9fc639a9-4bc3-4dab-909f-41947203684a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"265181b3-7abf-472b-99f2-d2e6eb47b27e","name":"Delete a User - default","request":{"urlPathTemplate":"/users/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"265181b3-7abf-472b-99f2-d2e6eb47b27e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","name":"Update a User - default","request":{"urlPathTemplate":"/users/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"365cef77-10c1-4fea-9b15-317ad7a38e99","name":"Generate New Multi-factor Authentication (MFA) Recovery Code - default","request":{"urlPathTemplate":"/users/{id}/recovery-code-regeneration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"recovery_code\": \"recovery_code\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"365cef77-10c1-4fea-9b15-317ad7a38e99","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a562240d-132f-4adc-a0f6-763101460526","name":"Revokes selected resources from a user - default","request":{"urlPathTemplate":"/users/{id}/revoke-access","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a562240d-132f-4adc-a0f6-763101460526","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","name":"Get an action's versions - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"versions\": [\n {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33c0cb30-ca1f-4477-9078-8647e82f975f","name":"Get a specific version of an action - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33c0cb30-ca1f-4477-9078-8647e82f975f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"746fbf5a-cee7-4302-ad86-14035a3912f7","name":"Roll back to a previous action version - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}/deploy","method":"POST","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"746fbf5a-cee7-4302-ad86-14035a3912f7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"822dd98d-546e-46d8-a976-8f2c97028432","name":"Get an execution - default","request":{"urlPathTemplate":"/actions/executions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"status\": \"unspecified\",\n \"results\": [\n {\n \"action_name\": \"action_name\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"822dd98d-546e-46d8-a976-8f2c97028432","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8abc8ed4-7895-434f-a43b-613d4101d6bc","name":"List Actions Modules - default","request":{"urlPathTemplate":"/actions/modules","method":"GET"},"response":{"status":200,"body":"{\n \"modules\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"8abc8ed4-7895-434f-a43b-613d4101d6bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3e5b836f-105d-4d50-a185-5cd051f4db56","name":"Create a new Actions Module - default","request":{"urlPathTemplate":"/actions/modules","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3e5b836f-105d-4d50-a185-5cd051f4db56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","name":"Get a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"613a56ac-b303-417b-bbfe-d8ceda21db89","name":"Delete a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"613a56ac-b303-417b-bbfe-d8ceda21db89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","name":"Update a specific Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"989d944b-6872-44fc-957b-87900af162f6","name":"List all actions using an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/actions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"actions\": [\n {\n \"action_id\": \"action_id\",\n \"action_name\": \"action_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1,\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ]\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"989d944b-6872-44fc-957b-87900af162f6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","name":"Rollback an Actions Module to a previous version - default","request":{"urlPathTemplate":"/actions/modules/{id}/rollback","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6c96303-6883-4084-989f-2dbadb13c1d9","name":"Get triggers - default","request":{"urlPathTemplate":"/actions/triggers","method":"GET"},"response":{"status":200,"body":"{\n \"triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6c96303-6883-4084-989f-2dbadb13c1d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","name":"List all versions of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"versions\": [\n {\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {}\n ],\n \"dependencies\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f2ae0322-48cb-47bb-a197-e4607ede713a","name":"Create a new version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f2ae0322-48cb-47bb-a197-e4607ede713a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"29f3eb37-e484-460b-a662-6e196927da74","name":"Get a specific version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions/{versionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"versionId":{"equalTo":"versionId"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"29f3eb37-e484-460b-a662-6e196927da74","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","name":"Get trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"GET","pathParameters":{"triggerId":{"equalTo":"post-login"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"677bf282-a2a0-4bc7-a065-b5de9e248673","name":"Update trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"PATCH","pathParameters":{"triggerId":{"equalTo":"post-login"}}},"response":{"status":200,"body":"{\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"677bf282-a2a0-4bc7-a065-b5de9e248673","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858c0df0-350f-4619-8960-6f774c0f234a","name":"Check if an IP address is blocked - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"858c0df0-350f-4619-8960-6f774c0f234a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","name":"Remove the blocked IP address - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80b1e16c-5284-48f9-9802-ff189fca3b63","name":"Get Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"GET"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"80b1e16c-5284-48f9-9802-ff189fca3b63","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bf92fa51-631d-42ef-bf27-8161f3bcab37","name":"Update Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf92fa51-631d-42ef-bf27-8161f3bcab37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","name":"Get Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7f0c04d7-e36a-49ce-af70-af9df4825f56","name":"Update Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"7f0c04d7-e36a-49ce-af70-af9df4825f56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","name":"Get Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","name":"Update Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","name":"Get the CAPTCHA configuration for a tenant - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"GET"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","name":"Partial Update for CAPTCHA Configuration - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"PATCH"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","name":"Get Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","name":"Update Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bdf661b2-3819-41c2-98f8-4b9137f67189","name":"Get template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"GET"},"response":{"status":200,"body":"{\n \"body\": \"body\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bdf661b2-3819-41c2-98f8-4b9137f67189","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"44f5b8dc-7d64-47a1-8889-79cda94f7809","name":"Set template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"PUT"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"44f5b8dc-7d64-47a1-8889-79cda94f7809","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","name":"Delete template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c7a5627-a851-4881-9e60-689c81a3122b","name":"Create branding theme - default","request":{"urlPathTemplate":"/branding/themes","method":"POST"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c7a5627-a851-4881-9e60-689c81a3122b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"91d16fa4-7e8b-4de2-aa78-061a5267295b","name":"Get default branding theme - default","request":{"urlPathTemplate":"/branding/themes/default","method":"GET"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"91d16fa4-7e8b-4de2-aa78-061a5267295b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f102da1c-5323-41ec-b320-888d05f069b8","name":"Get branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"GET","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f102da1c-5323-41ec-b320-888d05f069b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"215eeb29-68c9-4243-857e-d87a7c62795f","name":"Delete branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"DELETE","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"215eeb29-68c9-4243-857e-d87a7c62795f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dbbd929-7e98-438f-8310-2500cb90f70c","name":"Update branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"PATCH","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2dbbd929-7e98-438f-8310-2500cb90f70c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"520b4b30-1317-42da-89bf-a0491d1694b6","name":"Get a list of phone providers - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"GET"},"response":{"status":200,"body":"{\n \"providers\": [\n {\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"520b4b30-1317-42da-89bf-a0491d1694b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","name":"Configure the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8c639058-4844-47c5-8ad8-c0ccd33399bb","name":"Get a phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8c639058-4844-47c5-8ad8-c0ccd33399bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a6175428-056a-47f4-b776-4dcf8260822c","name":"Deletes a Phone Provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a6175428-056a-47f4-b776-4dcf8260822c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"95edda2c-d9d9-4854-9130-044ebb441bd7","name":"Update the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"95edda2c-d9d9-4854-9130-044ebb441bd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eced0fdd-3915-430a-8c28-1161ab6a3313","name":"Send a test phone notification for the configured provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"code\": 1.1,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"eced0fdd-3915-430a-8c28-1161ab6a3313","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","name":"Get a list of phone notification templates - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"templates\": [\n {\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {},\n \"type\": \"otp_verify\",\n \"disabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"300d3eb8-52bc-4001-8af4-a0594f4242d9","name":"Create a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"300d3eb8-52bc-4001-8af4-a0594f4242d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","name":"Get a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","name":"Delete a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e4c517e-f1d0-4252-bfea-7b6342825fba","name":"Update a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e4c517e-f1d0-4252-bfea-7b6342825fba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","name":"Resets a phone notification template values - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/reset","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"x\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"x\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"x\",\n \"body\": {\n \"text\": \"x\",\n \"voice\": \"x\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d9ba799-020f-40db-86d6-08de485ad618","name":"Send a test phone notification for the configured template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d9ba799-020f-40db-86d6-08de485ad618","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","name":"Get the organizations associated to a client grant - default","request":{"urlPathTemplate":"/client-grants/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"318739d6-2060-4406-9548-e1dca9fc9306","name":"Get client credentials - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"318739d6-2060-4406-9548-e1dca9fc9306","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","name":"Create a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"POST","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"84fb49da-5fa4-4f09-8176-cf14ff179829","name":"Get client credential details - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"84fb49da-5fa4-4f09-8176-cf14ff179829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ac24c006-0300-485b-b881-9bfd0a38c4aa","name":"Delete a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"DELETE","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ac24c006-0300-485b-b881-9bfd0a38c4aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c820cce1-37c3-4aa6-8700-119563b70d23","name":"Update a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"PATCH","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c820cce1-37c3-4aa6-8700-119563b70d23","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","name":"Get enabled connections for a client - default","request":{"urlPathTemplate":"/clients/{id}/connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","name":"Get a list of directory provisioning configurations - default","request":{"urlPathTemplate":"/connections-directory-provisionings","method":"GET"},"response":{"status":200,"body":"{\n \"directory_provisionings\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","name":"Get a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3cfd3977-6fa4-44df-bdf3-78fee867315a","name":"Create a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cfd3977-6fa4-44df-bdf3-78fee867315a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","name":"Delete a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","name":"Patch a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"181a029d-c4d1-4386-8c0d-4e517aea7579","name":"Get a connection's default directory provisioning attribute mapping - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"181a029d-c4d1-4386-8c0d-4e517aea7579","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9821e94c-1529-464c-911e-9b351dbc15bd","name":"Get a list of SCIM configurations - default","request":{"urlPathTemplate":"/connections-scim-configurations","method":"GET"},"response":{"status":200,"body":"{\n \"scim_configurations\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9821e94c-1529-464c-911e-9b351dbc15bd","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","name":"Get a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"45f92e80-8b92-4937-b29b-76fac22cf624","name":"Create a SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"45f92e80-8b92-4937-b29b-76fac22cf624","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9239c3d-f534-4c1d-a05e-64c0785f569a","name":"Delete a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9239c3d-f534-4c1d-a05e-64c0785f569a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d298cb6d-3c6a-4510-a78c-556fad17fd65","name":"Patch a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d298cb6d-3c6a-4510-a78c-556fad17fd65","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","name":"Get a connection's default SCIM mapping - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cda0987-d608-47ba-b465-245ecfaabb90","name":"Get enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cda0987-d608-47ba-b465-245ecfaabb90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","name":"Update enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf72570e-1315-4eaa-8145-3f400d3eccf0","name":"Get connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"bf72570e-1315-4eaa-8145-3f400d3eccf0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"faa363d9-1b22-41f6-a15a-6b53ce1566f2","name":"Create connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"faa363d9-1b22-41f6-a15a-6b53ce1566f2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","name":"Rotate connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys/rotate","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"next\": true,\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","name":"Delete a connection user - default","request":{"urlPathTemplate":"/connections/{id}/users","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"175c0550-405b-4cd6-b498-6501a695ed33","name":"Request an on-demand synchronization of the directory - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/synchronizations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"synchronization_id\": \"synchronization_id\",\n \"status\": \"status\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"175c0550-405b-4cd6-b498-6501a695ed33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58eab082-4eda-42df-9764-ed787b38df1e","name":"Get a connection's SCIM tokens - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"token_id\": \"token_id\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\",\n \"last_used_at\": \"last_used_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"58eab082-4eda-42df-9764-ed787b38df1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b55da7ed-453d-4799-b895-796f72020abb","name":"Create a SCIM Token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"token_id\": \"token_id\",\n \"token\": \"token\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b55da7ed-453d-4799-b895-796f72020abb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","name":"Delete a connection's SCIM token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens/{tokenId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenId":{"equalTo":"tokenId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","name":"Get email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"GET"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d1a0f535-378f-4200-865f-23ca6cf50b9d","name":"Configure email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d1a0f535-378f-4200-865f-23ca6cf50b9d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","name":"Delete email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36f2813e-a299-41fd-a6d6-54938ea37a15","name":"Update email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"PATCH"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"36f2813e-a299-41fd-a6d6-54938ea37a15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c3751490-b492-4376-9596-bd7d6f5e8443","name":"Get this event stream's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c3751490-b492-4376-9596-bd7d6f5e8443","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"93fa5cb1-a92c-4b20-8483-814c91175496","name":"Get a specific event's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries/{event_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"93fa5cb1-a92c-4b20-8483-814c91175496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"25856d60-9bad-4777-b7f2-7b5e2656b133","name":"Redeliver failed events - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"date_from\": \"2024-01-15T09:30:00Z\",\n \"date_to\": \"2024-01-15T09:30:00Z\",\n \"statuses\": [\n \"failed\"\n ],\n \"event_types\": [\n \"user.created\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"25856d60-9bad-4777-b7f2-7b5e2656b133","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","name":"Redeliver a single failed event by ID - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver/{event_id}","method":"POST","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"62d121a4-93bc-4281-8659-06708ac8d781","name":"Get flow executions - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"executions\": [\n {\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"62d121a4-93bc-4281-8659-06708ac8d781","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","name":"Get a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"debug\": {\n \"key\": \"value\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","name":"Delete a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"DELETE","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","name":"Get Flows Vault connection list - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b56d64da-174f-4d7e-86e7-3240fb1a8174","name":"Create a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b56d64da-174f-4d7e-86e7-3240fb1a8174","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","name":"Get a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","name":"Delete a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cdbf8062-2c13-4861-9280-e1ef2af24823","name":"Update a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cdbf8062-2c13-4861-9280-e1ef2af24823","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","name":"Get Group Members - default","request":{"urlPathTemplate":"/groups/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"members\": [\n {\n \"id\": \"id\",\n \"member_type\": \"user\",\n \"type\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a2982e98-d69b-4815-a50d-57f1267374d8","name":"Create a multi-factor authentication enrollment ticket - default","request":{"urlPathTemplate":"/guardian/enrollments/ticket","method":"POST"},"response":{"status":200,"body":"{\n \"ticket_id\": \"ticket_id\",\n \"ticket_url\": \"ticket_url\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a2982e98-d69b-4815-a50d-57f1267374d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"029d8a45-40e7-4697-b2da-a0c12a4d3895","name":"Get a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"status\": \"pending\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"enrolled_at\": \"enrolled_at\",\n \"last_auth\": \"last_auth\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"029d8a45-40e7-4697-b2da-a0c12a4d3895","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","name":"Delete a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12377456-a682-4cdc-b63d-41a188b3ce32","name":"Get Factors and multi-factor authentication details - default","request":{"urlPathTemplate":"/guardian/factors","method":"GET"},"response":{"status":200,"body":"[\n {\n \"enabled\": true,\n \"trial_expired\": true,\n \"name\": \"push-notification\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"12377456-a682-4cdc-b63d-41a188b3ce32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"93c9905e-4981-4cb3-a7b0-026dab1704d6","name":"Update multi-factor authentication type - default","request":{"urlPathTemplate":"/guardian/factors/{name}","method":"PUT","pathParameters":{"name":{"equalTo":"push-notification"}}},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"93c9905e-4981-4cb3-a7b0-026dab1704d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e47dd04a-f3a3-409a-a301-7732f16f3bec","name":"Get multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"GET"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"e47dd04a-f3a3-409a-a301-7732f16f3bec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8ee26dda-4638-4269-9b14-59f2907ef28b","name":"Update multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"PUT"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"8ee26dda-4638-4269-9b14-59f2907ef28b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ed435b3e-66b6-47b0-882f-08d926944cad","name":"Get Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"GET"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ed435b3e-66b6-47b0-882f-08d926944cad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92b96146-6175-4994-87af-ac137f73595d","name":"Update the Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"PUT"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"92b96146-6175-4994-87af-ac137f73595d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bd1421c2-3dbe-4603-b96c-02e53872498b","name":"Get Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bd1421c2-3dbe-4603-b96c-02e53872498b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","name":"Update Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5c310715-a914-4928-9142-141be90dd71e","name":"Get phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5c310715-a914-4928-9142-141be90dd71e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"555dfcb1-93af-4dcf-8241-1114028c32b4","name":"Update phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"555dfcb1-93af-4dcf-8241-1114028c32b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","name":"Get Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","name":"Update Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","name":"Get APNS push notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"GET"},"response":{"status":200,"body":"{\n \"bundle_id\": \"bundle_id\",\n \"sandbox\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","name":"Update APNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PUT"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","name":"Update APNs provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PATCH"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2a5a732a-4ffa-4f42-8454-448f5735b2f3","name":"Overwrite FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2a5a732a-4ffa-4f42-8454-448f5735b2f3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","name":"Updates FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"712dc55b-7135-4196-89c9-281072bf1983","name":"Overwrite FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"712dc55b-7135-4196-89c9-281072bf1983","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de696b9c-3ffb-4bc8-adde-131913ca6338","name":"Updates FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"de696b9c-3ffb-4bc8-adde-131913ca6338","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03df5fb-b6e0-4345-9c83-e920d88114c9","name":"Get AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"GET"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03df5fb-b6e0-4345-9c83-e920d88114c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e2945e05-5067-4c32-b82b-483fff53cfc3","name":"Configure AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PUT"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e2945e05-5067-4c32-b82b-483fff53cfc3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","name":"Update AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PATCH"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0496348c-7357-4623-8514-fb741a753c75","name":"Get push notification provider - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0496348c-7357-4623-8514-fb741a753c75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7285a311-6499-4a95-a8cc-6701a6997bf5","name":"Update Push Notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7285a311-6499-4a95-a8cc-6701a6997bf5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e8ca19da-0184-44a0-868c-f020f73cbcbe","name":"Get Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e8ca19da-0184-44a0-868c-f020f73cbcbe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","name":"Update Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","name":"Get SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"69919759-0017-4dd6-8df8-a40088848ddb","name":"Update SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"69919759-0017-4dd6-8df8-a40088848ddb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1731b364-a171-42f2-8475-62bdb634879d","name":"Get SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1731b364-a171-42f2-8475-62bdb634879d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","name":"Update SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47cb059e-e754-4e4c-804b-52d84dd12162","name":"Get DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"GET"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47cb059e-e754-4e4c-804b-52d84dd12162","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"0bc934b5-9b7a-4a4d-9ffe-54d5473d5f62","name":"Set the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PUT"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bc934b5-9b7a-4a4d-9ffe-54d5473d5f62","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38a5aa65-75f0-471c-ab5e-10b544359b3c","name":"Update the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38a5aa65-75f0-471c-ab5e-10b544359b3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","name":"Get hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","name":"Add hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1e6e250b-ded1-4ca6-831a-83d54b71295e","name":"Delete hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1e6e250b-ded1-4ca6-831a-83d54b71295e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"81e2c92a-69de-446b-82c8-7f320f9e1060","name":"Update hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"81e2c92a-69de-446b-82c8-7f320f9e1060","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a93c6324-dab3-4581-8117-74e0dc2c05b3","name":"Create export users job - default","request":{"urlPathTemplate":"/jobs/users-exports","method":"POST"},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"format\": \"json\",\n \"limit\": 1,\n \"fields\": [\n {\n \"name\": \"name\",\n \"export_as\": \"export_as\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a93c6324-dab3-4581-8117-74e0dc2c05b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","name":"Create import users job - default","request":{"urlPathTemplate":"/jobs/users-imports","method":"POST"},"response":{"status":202,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"external_id\": \"external_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","name":"Send an email address verification email - default","request":{"urlPathTemplate":"/jobs/verification-email","method":"POST"},"response":{"status":201,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ddcb674-4117-4538-98e8-5723fdb083e8","name":"Get job error details - default","request":{"urlPathTemplate":"/jobs/{id}/errors","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"user\": {\n \"key\": \"value\"\n },\n \"errors\": [\n {}\n ]\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1ddcb674-4117-4538-98e8-5723fdb083e8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"70e1c2da-e7db-401a-b166-be0b5da6139c","name":"Get custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"GET"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"70e1c2da-e7db-401a-b166-be0b5da6139c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3b40098d-d649-4030-bc12-31606e807e15","name":"Create or replace custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"PUT"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3b40098d-d649-4030-bc12-31606e807e15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","name":"Delete custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c09166ed-9d73-4607-92f6-ae884592a5e5","name":"Get all encryption keys - default","request":{"urlPathTemplate":"/keys/encryption","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1,\n \"limit\": 1,\n \"total\": 1,\n \"keys\": [\n {\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c09166ed-9d73-4607-92f6-ae884592a5e5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","name":"Create the new encryption key - default","request":{"urlPathTemplate":"/keys/encryption","method":"POST"},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"974880c1-1ef6-4001-a614-aa43c37b4420","name":"Rekey the key hierarchy - default","request":{"urlPathTemplate":"/keys/encryption/rekey","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"974880c1-1ef6-4001-a614-aa43c37b4420","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77bab061-9dae-4268-84d0-0b63e263f1ab","name":"Get the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"77bab061-9dae-4268-84d0-0b63e263f1ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86a3fc30-c02a-4c36-ac4c-7900289870b8","name":"Import the encryption key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"86a3fc30-c02a-4c36-ac4c-7900289870b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","name":"Delete the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"DELETE","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","name":"Create the public wrapping key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}/wrapping-key","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"public_key\": \"public_key\",\n \"algorithm\": \"CKM_RSA_AES_KEY_WRAP\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bde50a3-a51e-41b4-9018-8f46bd597774","name":"Get all Application Signing Keys - default","request":{"urlPathTemplate":"/keys/signing","method":"GET"},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1bde50a3-a51e-41b4-9018-8f46bd597774","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e9d4827d-c55c-4b09-a761-24a551052257","name":"Rotate the Application Signing Key - default","request":{"urlPathTemplate":"/keys/signing/rotate","method":"POST"},"response":{"status":201,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9d4827d-c55c-4b09-a761-24a551052257","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","name":"Get an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","name":"Revoke an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}/revoke","method":"PUT","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bd5c630-fb83-4b4e-a903-67268e3218e0","name":"Get client grants associated to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bd5c630-fb83-4b4e-a903-67268e3218e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","name":"Associate a client grant with an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","name":"Remove a client grant from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants/{grant_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"grant_id":{"equalTo":"grant_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4c65b7b7-43a0-4437-b96f-7f47fdad6550","name":"Get connections associated with an organization - default","request":{"urlPathTemplate":"/organizations/{id}/connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"4c65b7b7-43a0-4437-b96f-7f47fdad6550","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de944d33-99f5-481d-9810-4aa2473950cc","name":"Adds a connection to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/connections","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"de944d33-99f5-481d-9810-4aa2473950cc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ac4ecac7-55a4-49de-b0d5-639975924208","name":"Get a specific connection associated with an organization - default","request":{"urlPathTemplate":"/organizations/{id}/connections/{connection_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"connection_id":{"equalTo":"connection_id"}}},"response":{"status":200,"body":"{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"ac4ecac7-55a4-49de-b0d5-639975924208","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dea1d6a9-c8e5-43e2-b22c-b1008e34c6f1","name":"Delete a connection from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/connections/{connection_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"connection_id":{"equalTo":"connection_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"dea1d6a9-c8e5-43e2-b22c-b1008e34c6f1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"98e911b3-5c83-4a51-9fdc-6b4a18bac7c0","name":"Update a connection for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/connections/{connection_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"connection_id":{"equalTo":"connection_id"}}},"response":{"status":200,"body":"{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"98e911b3-5c83-4a51-9fdc-6b4a18bac7c0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2edde951-0b04-4e05-9389-658b85c37299","name":"Retrieve all organization discovery domains - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"domains\": [\n {\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2edde951-0b04-4e05-9389-658b85c37299","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","name":"Create an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","name":"Retrieve an organization discovery domain by domain name - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/name/{discovery_domain}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain":{"equalTo":"discovery_domain"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","name":"Retrieve an organization discovery domain by ID - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"803a298e-d6f6-4370-8e03-37d06547eeef","name":"Delete an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"803a298e-d6f6-4370-8e03-37d06547eeef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fca95551-032d-44de-a3cf-849f98ec2177","name":"Update an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fca95551-032d-44de-a3cf-849f98ec2177","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","name":"Get connections enabled for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c311c287-5333-41bd-819e-e813c541ed66","name":"Add connections to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c311c287-5333-41bd-819e-e813c541ed66","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","name":"Get an enabled connection for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0dc9106a-150c-40d8-9000-176bd6350a98","name":"Delete connections from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0dc9106a-150c-40d8-9000-176bd6350a98","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9a371d52-abea-44dc-a464-f04f63a601b0","name":"Update the Connection of an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9a371d52-abea-44dc-a464-f04f63a601b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7fb2e068-8caf-4234-aa52-3b51c9f37300","name":"Get invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"invitations\": [\n {\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7fb2e068-8caf-4234-aa52-3b51c9f37300","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"49ad8742-5d95-4969-87cf-09427959682f","name":"Create invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"49ad8742-5d95-4969-87cf-09427959682f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2bf04456-d49c-45d6-aedf-19598f4c6df8","name":"Get a specific invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2bf04456-d49c-45d6-aedf-19598f4c6df8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1a1c3283-fac9-4185-bcb8-3a9053a43163","name":"Delete an invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1a1c3283-fac9-4185-bcb8-3a9053a43163","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","name":"Get members who belong to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"members\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\",\n \"roles\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8536454b-53b8-4272-8829-062f2cb9092d","name":"Add members to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8536454b-53b8-4272-8829-062f2cb9092d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"71dcfc22-87b0-4591-921b-7d7088bd16ae","name":"Delete members from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"71dcfc22-87b0-4591-921b-7d7088bd16ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c099b94-dfed-4bf8-b370-25ceade844b1","name":"Get user roles assigned to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c099b94-dfed-4bf8-b370-25ceade844b1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","name":"Assign user roles to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"245dc825-fc94-49ca-9547-a4b30ac4485a","name":"Delete user roles from an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"245dc825-fc94-49ca-9547-a4b30ac4485a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","name":"Get render setting configurations for all screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"GET"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d0abb404-e603-4992-9c65-19a5766a9462","name":"Update render settings for multiple screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"PATCH"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"prompt\": \"login\",\n \"screen\": \"login\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d0abb404-e603-4992-9c65-19a5766a9462","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","name":"Get render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"248d2934-0ee0-434c-a9a5-df7501ef901c","name":"Update render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"PATCH","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"248d2934-0ee0-434c-a9a5-df7501ef901c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cd54de8-b246-4b0a-863b-f5fa0184e206","name":"Get custom text for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cd54de8-b246-4b0a-863b-f5fa0184e206","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bff89979-efc7-413e-8aaf-a45d84f1793b","name":"Set custom text for a specific prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"bff89979-efc7-413e-8aaf-a45d84f1793b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","name":"Get partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"GET","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9517422-8a42-4204-8156-cda9b385f017","name":"Set partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9517422-8a42-4204-8156-cda9b385f017","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb391545-5076-433d-8b32-b19ed3d73939","name":"Get risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"cb391545-5076-433d-8b32-b19ed3d73939","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8018c245-2f30-469f-992f-dc1668cccd75","name":"Update risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"8018c245-2f30-469f-992f-dc1668cccd75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","name":"Get new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"GET"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","name":"Update new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"PATCH"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf10686c-2651-4040-8299-93e4bbc9834d","name":"Get permissions granted by role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf10686c-2651-4040-8299-93e4bbc9834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"23e27895-e8da-4c4d-bec9-94df0205eb5c","name":"Associate permissions with a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"23e27895-e8da-4c4d-bec9-94df0205eb5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","name":"Remove permissions from a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c87640fd-900b-400f-93f0-9ccb6702a609","name":"Get a role's users - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c87640fd-900b-400f-93f0-9ccb6702a609","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","name":"Assign users to a role - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6173c4f-82c6-420c-a40d-889a713cb3e7","name":"Get custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6173c4f-82c6-420c-a40d-889a713cb3e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"52a78cce-bea7-4f10-be84-5b860989a20e","name":"Set custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"PUT","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"52a78cce-bea7-4f10-be84-5b860989a20e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","name":"Create an SSO access ticket to initiate the Self Service SSO Flow - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/sso-ticket","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","name":"Revoke an SSO access ticket - default","request":{"urlPathTemplate":"/self-service-profiles/{profileId}/sso-ticket/{id}/revoke","method":"POST","pathParameters":{"profileId":{"equalTo":"profileId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12199f5c-a53a-4405-8a5f-a83867b89865","name":"Get tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"GET"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"12199f5c-a53a-4405-8a5f-a83867b89865","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","name":"Update tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","name":"Get a list of authentication methods - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"authenticators\": [\n {\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a786d309-f573-4722-9c1a-4336dcb2ca34","name":"Creates an authentication method for a given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a786d309-f573-4722-9c1a-4336dcb2ca34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de90147a-4c08-43b0-9e64-3c7afab7fe48","name":"Update all authentication methods by replacing them with the given ones - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"de90147a-4c08-43b0-9e64-3c7afab7fe48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","name":"Delete all authentication methods for the given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","name":"Get an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"add53361-2a24-44ea-93fe-fd31b9981468","name":"Delete an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"add53361-2a24-44ea-93fe-fd31b9981468","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","name":"Update an authentication method - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"59e259ee-3764-496e-9875-949a218233be","name":"Delete All Authenticators - default","request":{"urlPathTemplate":"/users/{id}/authenticators","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"59e259ee-3764-496e-9875-949a218233be","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","name":"Get a User's Connected Accounts - default","request":{"urlPathTemplate":"/users/{id}/connected-accounts","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connected_accounts\": [\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"strategy\": \"strategy\",\n \"access_type\": \"offline\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b12cc020-548e-4219-bf5f-7896e003fa92","name":"Get the First Confirmed Multi-factor Authentication (MFA) Enrollment - default","request":{"urlPathTemplate":"/users/{id}/enrollments","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"status\": \"pending\",\n \"type\": \"type\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"auth_method\": \"authenticator\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"b12cc020-548e-4219-bf5f-7896e003fa92","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7df16d6a-51ec-415e-a605-f161474b5a60","name":"Get tokensets for a user - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"scope\": \"scope\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"issued_at\": \"2024-01-15T09:30:00Z\",\n \"last_used_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"7df16d6a-51ec-415e-a605-f161474b5a60","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","name":"Deletes a tokenset for federated connections by id. - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets/{tokenset_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenset_id":{"equalTo":"tokenset_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","name":"Get user's groups - default","request":{"urlPathTemplate":"/users/{id}/groups","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"membership_created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0333210f-005f-4731-9928-1487697620ba","name":"Link a User Account - default","request":{"urlPathTemplate":"/users/{id}/identities","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n },\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0333210f-005f-4731-9928-1487697620ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","name":"Unlink a User Identity - default","request":{"urlPathTemplate":"/users/{id}/identities/{provider}/{user_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"ad"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","name":"Get user's log events - default","request":{"urlPathTemplate":"/users/{id}/logs","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4ab10fb-07fa-43d6-97f0-2f777308b563","name":"Invalidate All Remembered Browsers for Multi-factor Authentication (MFA) - default","request":{"urlPathTemplate":"/users/{id}/multifactor/actions/invalidate-remember-browser","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b4ab10fb-07fa-43d6-97f0-2f777308b563","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86847e95-c858-46df-b005-c0f0392ae95c","name":"Delete a User's Multi-factor Provider - default","request":{"urlPathTemplate":"/users/{id}/multifactor/{provider}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"duo"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"86847e95-c858-46df-b005-c0f0392ae95c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","name":"List user's organizations - default","request":{"urlPathTemplate":"/users/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58cc0983-45ee-47d2-8a5c-b6e215c83942","name":"Get a User's Permissions - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"58cc0983-45ee-47d2-8a5c-b6e215c83942","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"812e845d-b47e-41b3-ad6b-edf602577cc4","name":"Assign Permissions to a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"812e845d-b47e-41b3-ad6b-edf602577cc4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6829e581-25db-4d58-99ad-1fd675c362f1","name":"Remove Permissions from a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6829e581-25db-4d58-99ad-1fd675c362f1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf944f2-8c7e-474c-82eb-9e21bb625219","name":"Clear risk assessment assessors for a specific user - default","request":{"urlPathTemplate":"/users/{id}/risk-assessments/clear","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0bf944f2-8c7e-474c-82eb-9e21bb625219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96a14af0-6c21-49ec-af86-512e672dd464","name":"Get a user's roles - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"96a14af0-6c21-49ec-af86-512e672dd464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcc9270b-77f1-4374-b64e-ce2381665996","name":"Assign roles to a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcc9270b-77f1-4374-b64e-ce2381665996","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c727015f-123f-4f98-9b24-25828361a4ab","name":"Removes roles from a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c727015f-123f-4f98-9b24-25828361a4ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"28b46c14-5cc3-42ad-8808-0072fb3249ba","name":"Get refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"28b46c14-5cc3-42ad-8808-0072fb3249ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1f25d8aa-36f6-4ba8-9865-27c99731105f","name":"Delete refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1f25d8aa-36f6-4ba8-9865-27c99731105f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","name":"Get sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"sessions\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"clients\": [\n {}\n ],\n \"session_metadata\": {\n \"key\": \"value\"\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0691684c-d746-4411-aa18-4de52a90a463","name":"Delete sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0691684c-d746-4411-aa18-4de52a90a463","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7424dc01-51cd-4cc9-b47d-082a7931e487","name":"List verifiable credentials template for tenant. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"templates\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7424dc01-51cd-4cc9-b47d-082a7931e487","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"65b53386-72a6-4ac3-afba-c41377b10e93","name":"Create a verifiable credential template. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"65b53386-72a6-4ac3-afba-c41377b10e93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bac80375-0249-4659-a3d4-3cad535b4a20","name":"Get a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bac80375-0249-4659-a3d4-3cad535b4a20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","name":"Delete a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9934fba5-6f64-4698-89dd-6123d0878561","name":"Update a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9934fba5-6f64-4698-89dd-6123d0878561","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}}],"meta":{"total":402}} \ No newline at end of file +{ + "mappings": [ + { + "id": "33519415-78d5-4e20-b7ed-c0f6609b6e90", + "name": "Get actions - default", + "request": { + "urlPathTemplate": "/actions/actions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "triggerId": { + "equalTo": "post-login" + }, + "actionName": { + "equalTo": "actionName" + }, + "deployed": { + "equalTo": "true" + }, + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "installed": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"actions\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"installed_integration_id\": \"installed_integration_id\",\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {}\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "33519415-78d5-4e20-b7ed-c0f6609b6e90", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "0af03b66-13d2-4fbe-a736-0f9dae1a89da", + "name": "Create an action - default", + "request": { + "urlPathTemplate": "/actions/actions", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0af03b66-13d2-4fbe-a736-0f9dae1a89da", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9919a572-ff14-4914-88b8-acd7f6acc41d", + "name": "Get an action - default", + "request": { + "urlPathTemplate": "/actions/actions/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9919a572-ff14-4914-88b8-acd7f6acc41d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1bb73e26-2243-414b-80fc-fcf53169d4fe", + "name": "Delete an action - default", + "request": { + "urlPathTemplate": "/actions/actions/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "force": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1bb73e26-2243-414b-80fc-fcf53169d4fe", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2679764d-6f00-495e-b8fb-210d140167ba", + "name": "Update an action - default", + "request": { + "urlPathTemplate": "/actions/actions/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"post-login\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2679764d-6f00-495e-b8fb-210d140167ba", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0bde5116-17ac-4ea2-be52-e584711a6b70", + "name": "Deploy an action - default", + "request": { + "urlPathTemplate": "/actions/actions/{id}/deploy", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0bde5116-17ac-4ea2-be52-e584711a6b70", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ebf627bb-6f85-4597-a454-0c654c35202c", + "name": "Test an Action - default", + "request": { + "urlPathTemplate": "/actions/actions/{id}/test", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"payload\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ebf627bb-6f85-4597-a454-0c654c35202c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0f76d290-6b70-4f62-abc8-3760917fe787", + "name": "Get branding settings - default", + "request": { + "urlPathTemplate": "/branding", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0f76d290-6b70-4f62-abc8-3760917fe787", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "9ca9e729-0745-457c-828d-37f7c8ab1698", + "name": "Update branding settings - default", + "request": { + "urlPathTemplate": "/branding", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9ca9e729-0745-457c-828d-37f7c8ab1698", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5dbe0859-fbb5-4eb1-a803-8132e840e762", + "name": "Get client grants - default", + "request": { + "urlPathTemplate": "/client-grants", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "audience": { + "equalTo": "audience" + }, + "client_id": { + "equalTo": "client_id" + }, + "allow_any_organization": { + "equalTo": "true" + }, + "subject_type": { + "equalTo": "client" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5dbe0859-fbb5-4eb1-a803-8132e840e762", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "006f7f26-5002-4b98-a65f-39f8aee8e968", + "name": "Create client grant - default", + "request": { + "urlPathTemplate": "/client-grants", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "006f7f26-5002-4b98-a65f-39f8aee8e968", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37", + "name": "Get client grant - default", + "request": { + "urlPathTemplate": "/client-grants/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "00010fe3-8553-4cd6-9b9a-68aad031054f", + "name": "Delete client grant - default", + "request": { + "urlPathTemplate": "/client-grants/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "00010fe3-8553-4cd6-9b9a-68aad031054f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d4a5deb2-fef3-4f0d-84ab-d78760e07405", + "name": "Update client grant - default", + "request": { + "urlPathTemplate": "/client-grants/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d4a5deb2-fef3-4f0d-84ab-d78760e07405", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e9057410-f073-4b5b-83dc-dc4d5625ef27", + "name": "Get clients - default", + "request": { + "urlPathTemplate": "/clients", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "is_global": { + "equalTo": "true" + }, + "is_first_party": { + "equalTo": "true" + }, + "app_type": { + "equalTo": "app_type" + }, + "external_client_id": { + "equalTo": "external_client_id" + }, + "q": { + "equalTo": "q" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"clients\": [\n {\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"grant_types\": [\n \"grant_types\"\n ],\n \"signing_keys\": [\n {}\n ],\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\"\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {}\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e9057410-f073-4b5b-83dc-dc4d5625ef27", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6", + "name": "Create a client - default", + "request": { + "urlPathTemplate": "/clients", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b8d4879d-c044-46cf-9b84-f94f05858081", + "name": "Preview and validate Client ID Metadata Document - default", + "request": { + "urlPathTemplate": "/clients/cimd/preview", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"client_id\": \"client_id\",\n \"errors\": [\n \"errors\"\n ],\n \"validation\": {\n \"valid\": true,\n \"violations\": [\n \"violations\"\n ],\n \"warnings\": [\n \"warnings\"\n ]\n },\n \"mapped_fields\": {\n \"external_client_id\": \"external_client_id\",\n \"name\": \"name\",\n \"app_type\": \"app_type\",\n \"callbacks\": [\n \"callbacks\"\n ],\n \"logo_uri\": \"logo_uri\",\n \"description\": \"description\",\n \"grant_types\": [\n \"grant_types\"\n ],\n \"token_endpoint_auth_method\": \"token_endpoint_auth_method\",\n \"jwks_uri\": \"jwks_uri\",\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"credential_type\": \"credential_type\",\n \"kid\": \"kid\",\n \"alg\": \"alg\"\n }\n ]\n }\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b8d4879d-c044-46cf-9b84-f94f05858081", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "89ded3bf-7977-43f9-93dc-2f65f3dbc0fe", + "name": "Register or update a CIMD client via metadata URI - default", + "request": { + "urlPathTemplate": "/clients/cimd/register", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"client_id\": \"client_id\",\n \"mapped_fields\": {\n \"external_client_id\": \"external_client_id\",\n \"name\": \"name\",\n \"app_type\": \"app_type\",\n \"callbacks\": [\n \"callbacks\"\n ],\n \"logo_uri\": \"logo_uri\",\n \"description\": \"description\",\n \"grant_types\": [\n \"grant_types\"\n ],\n \"token_endpoint_auth_method\": \"token_endpoint_auth_method\",\n \"jwks_uri\": \"jwks_uri\",\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"credential_type\": \"credential_type\",\n \"kid\": \"kid\",\n \"alg\": \"alg\"\n }\n ]\n }\n }\n },\n \"validation\": {\n \"valid\": true,\n \"violations\": [\n \"violations\"\n ],\n \"warnings\": [\n \"warnings\"\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "89ded3bf-7977-43f9-93dc-2f65f3dbc0fe", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "12071cdc-1adc-4b32-8601-2cd12aa19c0c", + "name": "Get client by ID - default", + "request": { + "urlPathTemplate": "/clients/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "12071cdc-1adc-4b32-8601-2cd12aa19c0c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "814f5054-4723-45e8-8d89-5a7da08db0d8", + "name": "Delete a client - default", + "request": { + "urlPathTemplate": "/clients/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "814f5054-4723-45e8-8d89-5a7da08db0d8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b4e5dc6c-c84f-4128-b87a-50876b601f77", + "name": "Update a client - default", + "request": { + "urlPathTemplate": "/clients/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b4e5dc6c-c84f-4128-b87a-50876b601f77", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3dbf1f11-9054-4a8d-b670-96640f3ba9a5", + "name": "Rotate a client secret - default", + "request": { + "urlPathTemplate": "/clients/{id}/rotate-secret", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ],\n \"external_metadata_type\": \"cimd\",\n \"external_metadata_created_by\": \"admin\",\n \"external_client_id\": \"external_client_id\",\n \"jwks_uri\": \"jwks_uri\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3dbf1f11-9054-4a8d-b670-96640f3ba9a5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "af1dc5c5-16af-447c-8374-e80a178ce120", + "name": "Get Connection Profiles - default", + "request": { + "urlPathTemplate": "/connection-profiles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"connection_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "af1dc5c5-16af-447c-8374-e80a178ce120", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947", + "name": "Create a connection profile - default", + "request": { + "urlPathTemplate": "/connection-profiles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0d6f52e7-dd90-4579-a469-761793294ec5", + "name": "Get Connection Profile Templates - default", + "request": { + "urlPathTemplate": "/connection-profiles/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0d6f52e7-dd90-4579-a469-761793294ec5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "4e7a3895-5c6c-41cc-b32f-4303e2a973d9", + "name": "Get Connection Profile Template - default", + "request": { + "urlPathTemplate": "/connection-profiles/templates/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4e7a3895-5c6c-41cc-b32f-4303e2a973d9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d5fff7c1-6be8-487e-a8b2-45fa4f4713d9", + "name": "Get Connection Profile - default", + "request": { + "urlPathTemplate": "/connection-profiles/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d5fff7c1-6be8-487e-a8b2-45fa4f4713d9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fcfdce88-b3c9-4a57-8c4b-672e88f0363c", + "name": "Delete Connection Profile - default", + "request": { + "urlPathTemplate": "/connection-profiles/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fcfdce88-b3c9-4a57-8c4b-672e88f0363c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "77f167dc-e4c6-478a-b74f-0e1385df797c", + "name": "Modify a Connection Profile - default", + "request": { + "urlPathTemplate": "/connection-profiles/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "77f167dc-e4c6-478a-b74f-0e1385df797c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "baf70a92-2b1e-4355-a67e-a94f22a92ab5", + "name": "Get all connections - default", + "request": { + "urlPathTemplate": "/connections", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "name": { + "equalTo": "name" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "baf70a92-2b1e-4355-a67e-a94f22a92ab5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "bfae8759-4528-462e-9a50-239cbd75f902", + "name": "Create a connection - default", + "request": { + "urlPathTemplate": "/connections", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bfae8759-4528-462e-9a50-239cbd75f902", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "eb9c1976-0ef9-4666-adde-d2059ed3c1a2", + "name": "Get a connection - default", + "request": { + "urlPathTemplate": "/connections/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "eb9c1976-0ef9-4666-adde-d2059ed3c1a2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e55d516f-7f79-4796-8adf-e0032183c04c", + "name": "Delete a connection - default", + "request": { + "urlPathTemplate": "/connections/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e55d516f-7f79-4796-8adf-e0032183c04c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "aa701672-a67f-47fc-9cfd-3d68353d9846", + "name": "Update a connection - default", + "request": { + "urlPathTemplate": "/connections/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "aa701672-a67f-47fc-9cfd-3d68353d9846", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6e5db857-6ab6-4406-a83f-fb4332f72b48", + "name": "Check connection status - default", + "request": { + "urlPathTemplate": "/connections/{id}/status", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6e5db857-6ab6-4406-a83f-fb4332f72b48", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c65f529d-2be4-4dc7-81c0-6d696834184e", + "name": "Get custom domains configurations - default", + "request": { + "urlPathTemplate": "/custom-domains", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "q": { + "equalTo": "q" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "sort": { + "equalTo": "sort" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c65f529d-2be4-4dc7-81c0-6d696834184e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "d2917b20-da7e-4962-a75f-362f99682cf9", + "name": "Configure a new custom domain - default", + "request": { + "urlPathTemplate": "/custom-domains", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d2917b20-da7e-4962-a75f-362f99682cf9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3d8672c6-5dc1-4542-a4d4-d8538c1fcb62", + "name": "Get the default domain - default", + "request": { + "urlPathTemplate": "/custom-domains/default", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3d8672c6-5dc1-4542-a4d4-d8538c1fcb62", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "9234f676-54a6-42a5-b92b-9d5b98462b82", + "name": "Update the default custom domain for the tenant - default", + "request": { + "urlPathTemplate": "/custom-domains/default", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9234f676-54a6-42a5-b92b-9d5b98462b82", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d56d6773-eda9-4b8a-9193-025d27feecb9", + "name": "Get custom domain configuration - default", + "request": { + "urlPathTemplate": "/custom-domains/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d56d6773-eda9-4b8a-9193-025d27feecb9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0d3570c3-79d1-49e1-85ca-aa706fb2834d", + "name": "Delete custom domain configuration - default", + "request": { + "urlPathTemplate": "/custom-domains/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0d3570c3-79d1-49e1-85ca-aa706fb2834d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "38539a1e-230b-4e70-b2f9-7ae0f252e1b6", + "name": "Update custom domain configuration - default", + "request": { + "urlPathTemplate": "/custom-domains/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "38539a1e-230b-4e70-b2f9-7ae0f252e1b6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c", + "name": "Test a custom domain - default", + "request": { + "urlPathTemplate": "/custom-domains/{id}/test", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"success\": true,\n \"message\": \"message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "43d540a8-528e-44db-9bda-83cf1ef8a54d", + "name": "Verify a custom domain - default", + "request": { + "urlPathTemplate": "/custom-domains/{id}/verify", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"cname_api_key\": \"cname_api_key\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "43d540a8-528e-44db-9bda-83cf1ef8a54d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cfcb7751-7a75-45bf-b39f-29bac41590da", + "name": "Retrieve device credentials - default", + "request": { + "urlPathTemplate": "/device-credentials", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "user_id": { + "equalTo": "user_id" + }, + "client_id": { + "equalTo": "client_id" + }, + "type": { + "equalTo": "public_key" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"device_credentials\": [\n {\n \"id\": \"id\",\n \"device_name\": \"device_name\",\n \"device_id\": \"device_id\",\n \"type\": \"public_key\",\n \"user_id\": \"user_id\",\n \"client_id\": \"client_id\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cfcb7751-7a75-45bf-b39f-29bac41590da", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "01818d23-c5cc-483a-90d7-5a5b11bf52e7", + "name": "Create a device public key credential - default", + "request": { + "urlPathTemplate": "/device-credentials", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "01818d23-c5cc-483a-90d7-5a5b11bf52e7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d2da3529-65a2-4a85-a6c8-c60a55a085ad", + "name": "Delete a device credential - default", + "request": { + "urlPathTemplate": "/device-credentials/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d2da3529-65a2-4a85-a6c8-c60a55a085ad", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "27d925db-b0e4-4cad-bf10-75440adb5dea", + "name": "Create an email template - default", + "request": { + "urlPathTemplate": "/email-templates", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "27d925db-b0e4-4cad-bf10-75440adb5dea", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e41992b1-8cf3-4611-9179-334debfd831a", + "name": "Get an email template - default", + "request": { + "urlPathTemplate": "/email-templates/{templateName}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "templateName": { + "equalTo": "verify_email" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e41992b1-8cf3-4611-9179-334debfd831a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4b7ee5d7-df46-44d7-8747-1db6f37bcda8", + "name": "Update an email template - default", + "request": { + "urlPathTemplate": "/email-templates/{templateName}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "templateName": { + "equalTo": "verify_email" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4b7ee5d7-df46-44d7-8747-1db6f37bcda8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1489d312-c6ca-4277-a1d2-01ce4c4fdad9", + "name": "Patch an email template - default", + "request": { + "urlPathTemplate": "/email-templates/{templateName}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "templateName": { + "equalTo": "verify_email" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1489d312-c6ca-4277-a1d2-01ce4c4fdad9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0fe7f4b8-58ff-4442-9339-c48f5185600f", + "name": "Get event streams - default", + "request": { + "urlPathTemplate": "/event-streams", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"eventStreams\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {}\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0fe7f4b8-58ff-4442-9339-c48f5185600f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "5b1a29bf-5c5c-45dd-a9fb-64f6944455e0", + "name": "Create an event stream - default", + "request": { + "urlPathTemplate": "/event-streams", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5b1a29bf-5c5c-45dd-a9fb-64f6944455e0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "85d4a52f-7433-408c-a7cc-30776d9ed641", + "name": "Get an event stream by ID - default", + "request": { + "urlPathTemplate": "/event-streams/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "85d4a52f-7433-408c-a7cc-30776d9ed641", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4812fcc9-8f28-4732-96d4-8adb072fa78a", + "name": "Delete an event stream - default", + "request": { + "urlPathTemplate": "/event-streams/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4812fcc9-8f28-4732-96d4-8adb072fa78a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "08468f05-d404-462e-8fdd-ce9dca3f4e3c", + "name": "Update an event stream - default", + "request": { + "urlPathTemplate": "/event-streams/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "08468f05-d404-462e-8fdd-ce9dca3f4e3c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4ba115c6-e86b-4427-9ce9-8468a24916b0", + "name": "Send a test event to an event stream - default", + "request": { + "urlPathTemplate": "/event-streams/{id}/test", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4ba115c6-e86b-4427-9ce9-8468a24916b0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9bee2213-71c4-41f8-9350-d50ede2f6c53", + "name": "Get flows - default", + "request": { + "urlPathTemplate": "/flows", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "synchronous": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"flows\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9bee2213-71c4-41f8-9350-d50ede2f6c53", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "6eb24c4a-01ad-47bc-bf9a-927970d1096e", + "name": "Create a flow - default", + "request": { + "urlPathTemplate": "/flows", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6eb24c4a-01ad-47bc-bf9a-927970d1096e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1eccebc1-db7b-4349-8fae-45c8537e9880", + "name": "Get a flow - default", + "request": { + "urlPathTemplate": "/flows/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1eccebc1-db7b-4349-8fae-45c8537e9880", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4dba8bf4-bec9-4e15-8591-752e9ac3644e", + "name": "Delete a flow - default", + "request": { + "urlPathTemplate": "/flows/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4dba8bf4-bec9-4e15-8591-752e9ac3644e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fc07198a-b41e-4537-aec6-1226e9691c86", + "name": "Update a flow - default", + "request": { + "urlPathTemplate": "/flows/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fc07198a-b41e-4537-aec6-1226e9691c86", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3bf65872-e8cf-4987-becb-bb082f08419f", + "name": "Get forms - default", + "request": { + "urlPathTemplate": "/forms", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"forms\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3bf65872-e8cf-4987-becb-bb082f08419f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "6255561a-7fa0-4557-a0e7-5d3a6f40b2a1", + "name": "Create a form - default", + "request": { + "urlPathTemplate": "/forms", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6255561a-7fa0-4557-a0e7-5d3a6f40b2a1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0bf329d0-420d-4f08-aec1-df5f12d67762", + "name": "Get a form - default", + "request": { + "urlPathTemplate": "/forms/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0bf329d0-420d-4f08-aec1-df5f12d67762", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c91995fc-fe8b-410c-9cbf-e13e1d538d1e", + "name": "Delete a form - default", + "request": { + "urlPathTemplate": "/forms/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c91995fc-fe8b-410c-9cbf-e13e1d538d1e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "944b211b-eacb-4acc-8f40-a3463ae62f37", + "name": "Update a form - default", + "request": { + "urlPathTemplate": "/forms/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "944b211b-eacb-4acc-8f40-a3463ae62f37", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "800693b3-6319-4d73-997d-7899f5d8b842", + "name": "Get grants - default", + "request": { + "urlPathTemplate": "/grants", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "per_page": { + "equalTo": "1" + }, + "page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "user_id": { + "equalTo": "user_id" + }, + "client_id": { + "equalTo": "client_id" + }, + "audience": { + "equalTo": "audience" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"grants\": [\n {\n \"id\": \"id\",\n \"clientID\": \"clientID\",\n \"user_id\": \"user_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "800693b3-6319-4d73-997d-7899f5d8b842", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "42d14bbf-3fda-4f6e-82c7-0511f2cc78b4", + "name": "Delete a grant by user_id - default", + "request": { + "urlPathTemplate": "/grants", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "42d14bbf-3fda-4f6e-82c7-0511f2cc78b4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0384a6d8-8b93-4c86-9b01-4a78b2056a0b", + "name": "Delete a grant by id - default", + "request": { + "urlPathTemplate": "/grants/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0384a6d8-8b93-4c86-9b01-4a78b2056a0b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "eef0d4e7-35b8-494e-9e36-bcdefebe33db", + "name": "Get all Groups - default", + "request": { + "urlPathTemplate": "/groups", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "connection_id": { + "equalTo": "connection_id" + }, + "name": { + "equalTo": "name" + }, + "external_id": { + "equalTo": "external_id" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "eef0d4e7-35b8-494e-9e36-bcdefebe33db", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "871b57bd-a1f8-4a23-8337-5872e46fc987", + "name": "Get a Group - default", + "request": { + "urlPathTemplate": "/groups/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "871b57bd-a1f8-4a23-8337-5872e46fc987", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8cbbad9c-deff-4a46-bd84-189922d9d131", + "name": "Delete a Group - default", + "request": { + "urlPathTemplate": "/groups/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8cbbad9c-deff-4a46-bd84-189922d9d131", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8e59d144-ec26-4602-a30e-51471fa41a83", + "name": "Get hooks - default", + "request": { + "urlPathTemplate": "/hooks", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "enabled": { + "equalTo": "true" + }, + "fields": { + "equalTo": "fields" + }, + "triggerId": { + "equalTo": "credentials-exchange" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"hooks\": [\n {\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8e59d144-ec26-4602-a30e-51471fa41a83", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b", + "name": "Create a hook - default", + "request": { + "urlPathTemplate": "/hooks", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f14ce249-5900-4b4f-acd6-a9fa7255d829", + "name": "Get a hook - default", + "request": { + "urlPathTemplate": "/hooks/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f14ce249-5900-4b4f-acd6-a9fa7255d829", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fff91330-4870-4c93-ac97-6d27a8f1fb9e", + "name": "Delete a hook - default", + "request": { + "urlPathTemplate": "/hooks/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fff91330-4870-4c93-ac97-6d27a8f1fb9e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5b56e935-667b-4af8-be86-94a3aa61008d", + "name": "Update a hook - default", + "request": { + "urlPathTemplate": "/hooks/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5b56e935-667b-4af8-be86-94a3aa61008d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fcdce95c-c559-471a-985a-45682f16bc5a", + "name": "Get a job - default", + "request": { + "urlPathTemplate": "/jobs/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"location\": \"location\",\n \"percentage_done\": 1,\n \"time_left_seconds\": 1,\n \"format\": \"json\",\n \"status_details\": \"status_details\",\n \"summary\": {\n \"failed\": 1,\n \"updated\": 1,\n \"inserted\": 1,\n \"total\": 1\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fcdce95c-c559-471a-985a-45682f16bc5a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44", + "name": "Get log streams - default", + "request": { + "urlPathTemplate": "/log-streams", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {}\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "3cac6a38-0d9f-40e0-983f-439cbedfa617", + "name": "Create a log stream - default", + "request": { + "urlPathTemplate": "/log-streams", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3cac6a38-0d9f-40e0-983f-439cbedfa617", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "046f0424-b1aa-49bc-bf20-db22d7a7bdf4", + "name": "Get log stream by ID - default", + "request": { + "urlPathTemplate": "/log-streams/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "046f0424-b1aa-49bc-bf20-db22d7a7bdf4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9fb04f8d-0fba-4891-8126-013d70d871aa", + "name": "Delete log stream - default", + "request": { + "urlPathTemplate": "/log-streams/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9fb04f8d-0fba-4891-8126-013d70d871aa", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8d10acdd-e185-496c-98c4-c91d469e6ed2", + "name": "Update a log stream - default", + "request": { + "urlPathTemplate": "/log-streams/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8d10acdd-e185-496c-98c4-c91d469e6ed2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132", + "name": "Search log events - default", + "request": { + "urlPathTemplate": "/logs", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "sort": { + "equalTo": "sort" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "include_totals": { + "equalTo": "true" + }, + "search": { + "equalTo": "search" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "b10cc251-b48a-429a-a136-810cdb7290fc", + "name": "Get a log event by id - default", + "request": { + "urlPathTemplate": "/logs/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\",\n \"security_context\": {\n \"ja3\": \"ja3\",\n \"ja4\": \"ja4\"\n },\n \"location_info\": {\n \"country_code\": \"country_code\",\n \"country_code3\": \"country_code3\",\n \"country_name\": \"country_name\",\n \"city_name\": \"city_name\",\n \"latitude\": 1.1,\n \"longitude\": 1.1,\n \"time_zone\": \"time_zone\",\n \"continent_code\": \"continent_code\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b10cc251-b48a-429a-a136-810cdb7290fc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "858e0070-39b1-460a-a2d5-53d0a5c3524a", + "name": "Get all access control list entries for a tenant - default", + "request": { + "urlPathTemplate": "/network-acls", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"network_acls\": [\n {\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {},\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "858e0070-39b1-460a-a2d5-53d0a5c3524a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "f8a963bf-a53b-445d-b1d7-e21a4b253957", + "name": "Create Access Control List - default", + "request": { + "urlPathTemplate": "/network-acls", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f8a963bf-a53b-445d-b1d7-e21a4b253957", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb", + "name": "Get a specific access control list entry for a tenant - default", + "request": { + "urlPathTemplate": "/network-acls/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b26d23ea-edcd-4512-a319-51a6e98131a0", + "name": "Update Access Control List - default", + "request": { + "urlPathTemplate": "/network-acls/{id}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b26d23ea-edcd-4512-a319-51a6e98131a0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6df7bc0d-d051-4e5f-8f62-608e9d028cc6", + "name": "Delete Access Control List - default", + "request": { + "urlPathTemplate": "/network-acls/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6df7bc0d-d051-4e5f-8f62-608e9d028cc6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "80648d37-b6ab-4ab4-ba80-17f00933453d", + "name": "Partial Update for an Access Control List - default", + "request": { + "urlPathTemplate": "/network-acls/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"auth0_managed\": [\n \"auth0_managed\"\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ],\n \"hostnames\": [\n \"hostnames\"\n ],\n \"connecting_ipv4_cidrs\": [\n \"connecting_ipv4_cidrs\"\n ],\n \"connecting_ipv6_cidrs\": [\n \"connecting_ipv6_cidrs\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "80648d37-b6ab-4ab4-ba80-17f00933453d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a4016e68-1c58-4a5c-b698-27ca350b937c", + "name": "Get organizations - default", + "request": { + "urlPathTemplate": "/organizations", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "sort": { + "equalTo": "sort" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a4016e68-1c58-4a5c-b698-27ca350b937c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "61349de2-c20a-4002-822b-9ed84e87ca1f", + "name": "Create an Organization - default", + "request": { + "urlPathTemplate": "/organizations", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "61349de2-c20a-4002-822b-9ed84e87ca1f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "dabd338a-8798-40ba-aaa0-8ce9b262b711", + "name": "Get organization by name - default", + "request": { + "urlPathTemplate": "/organizations/name/{name}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "name": { + "equalTo": "name" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "dabd338a-8798-40ba-aaa0-8ce9b262b711", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "da7fe10b-f528-48cf-b4e0-8d769617a66c", + "name": "Get organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "da7fe10b-f528-48cf-b4e0-8d769617a66c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "82031fa8-9043-489a-aa84-46bae3772393", + "name": "Delete organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "82031fa8-9043-489a-aa84-46bae3772393", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a", + "name": "Modify an Organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e", + "name": "Get prompt settings - default", + "request": { + "urlPathTemplate": "/prompts", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "170f5b5a-a3d8-415f-b2ab-64eb7e3b775b", + "name": "Update prompt settings - default", + "request": { + "urlPathTemplate": "/prompts", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "170f5b5a-a3d8-415f-b2ab-64eb7e3b775b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1be8f43f-0f7e-4335-879a-b48d21ecfac6", + "name": "Get refresh tokens - default", + "request": { + "urlPathTemplate": "/refresh-tokens", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "user_id": { + "equalTo": "user_id" + }, + "client_id": { + "equalTo": "client_id" + }, + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"refresh_tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1be8f43f-0f7e-4335-879a-b48d21ecfac6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "6a045b19-b94d-495c-b30c-c1de79efc46f", + "name": "Get a refresh token - default", + "request": { + "urlPathTemplate": "/refresh-tokens/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6a045b19-b94d-495c-b30c-c1de79efc46f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7", + "name": "Delete a refresh token - default", + "request": { + "urlPathTemplate": "/refresh-tokens/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7ea8e845-2337-4fbc-9632-246f4befb072", + "name": "Update a refresh token - default", + "request": { + "urlPathTemplate": "/refresh-tokens/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7ea8e845-2337-4fbc-9632-246f4befb072", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8e9d39f1-8389-4238-acc7-0c1fd5f97c1b", + "name": "Get resource servers - default", + "request": { + "urlPathTemplate": "/resource-servers", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"resource_servers\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"alg\": \"RSA-OAEP-256\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true\n },\n \"client_id\": \"client_id\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8e9d39f1-8389-4238-acc7-0c1fd5f97c1b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "47aa9a64-a544-47e0-9817-a2fe54866219", + "name": "Create a resource server - default", + "request": { + "urlPathTemplate": "/resource-servers", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "47aa9a64-a544-47e0-9817-a2fe54866219", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "da399a32-c9a2-481c-9995-fc402c47f72a", + "name": "Get a resource server - default", + "request": { + "urlPathTemplate": "/resource-servers/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "da399a32-c9a2-481c-9995-fc402c47f72a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f46b0f05-ce0a-4b6a-9004-650a8a9d14da", + "name": "Delete a resource server - default", + "request": { + "urlPathTemplate": "/resource-servers/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f46b0f05-ce0a-4b6a-9004-650a8a9d14da", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7", + "name": "Update a resource server - default", + "request": { + "urlPathTemplate": "/resource-servers/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"allow_online_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d64f1dab-8cae-47da-98e9-b16c1a5189dc", + "name": "Get roles - default", + "request": { + "urlPathTemplate": "/roles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "per_page": { + "equalTo": "1" + }, + "page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "name_filter": { + "equalTo": "name_filter" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d64f1dab-8cae-47da-98e9-b16c1a5189dc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "ddc91359-6806-4cf1-b143-e8d1bc363c3f", + "name": "Create a role - default", + "request": { + "urlPathTemplate": "/roles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ddc91359-6806-4cf1-b143-e8d1bc363c3f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "18803f36-8ee6-4051-9c5e-ab4a2a000ec7", + "name": "Get a role - default", + "request": { + "urlPathTemplate": "/roles/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "18803f36-8ee6-4051-9c5e-ab4a2a000ec7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "53428abe-f9c9-49e7-ada5-7cabecc6f0f5", + "name": "Delete a role - default", + "request": { + "urlPathTemplate": "/roles/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "53428abe-f9c9-49e7-ada5-7cabecc6f0f5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fb25cab0-ca38-4950-ba80-98504d41bb20", + "name": "Update a role - default", + "request": { + "urlPathTemplate": "/roles/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fb25cab0-ca38-4950-ba80-98504d41bb20", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "551dd253-310d-4f66-ab80-e07988490a37", + "name": "Get rules - default", + "request": { + "urlPathTemplate": "/rules", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "enabled": { + "equalTo": "true" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"rules\": [\n {\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "551dd253-310d-4f66-ab80-e07988490a37", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "6eba8e54-3d94-4b5a-9f90-34ea57895fb5", + "name": "Create a rule - default", + "request": { + "urlPathTemplate": "/rules", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6eba8e54-3d94-4b5a-9f90-34ea57895fb5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6bd903b2-17f8-4021-9cae-4c1141223c95", + "name": "Get a rule - default", + "request": { + "urlPathTemplate": "/rules/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6bd903b2-17f8-4021-9cae-4c1141223c95", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6110c86e-027f-441b-bb72-e5b0e6096803", + "name": "Delete a rule - default", + "request": { + "urlPathTemplate": "/rules/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6110c86e-027f-441b-bb72-e5b0e6096803", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3033effa-f1f9-4988-8752-203075bb6aec", + "name": "Update a rule - default", + "request": { + "urlPathTemplate": "/rules/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3033effa-f1f9-4988-8752-203075bb6aec", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3abfda6c-fc81-4be8-a87e-be80fcef8c2f", + "name": "Retrieve config variable keys for rules (get_rules-configs) - default", + "request": { + "urlPathTemplate": "/rules-configs", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"key\": \"key\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3abfda6c-fc81-4be8-a87e-be80fcef8c2f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "f90321dc-6914-4101-8af1-743cafaa62d7", + "name": "Set rules config for a given key - default", + "request": { + "urlPathTemplate": "/rules-configs/{key}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "key": { + "equalTo": "key" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"key\",\n \"value\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f90321dc-6914-4101-8af1-743cafaa62d7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4e06c73c-ffd7-4b88-9857-99801c652707", + "name": "Delete rules config for a given key - default", + "request": { + "urlPathTemplate": "/rules-configs/{key}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "key": { + "equalTo": "key" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4e06c73c-ffd7-4b88-9857-99801c652707", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "466bc78c-8022-4a7f-96e1-2a01c78c0b54", + "name": "Get self-service profiles - default", + "request": { + "urlPathTemplate": "/self-service-profiles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"self_service_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "466bc78c-8022-4a7f-96e1-2a01c78c0b54", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "bc8551be-c96c-4800-a5cc-dbbecc17b15b", + "name": "Create a self-service profile - default", + "request": { + "urlPathTemplate": "/self-service-profiles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bc8551be-c96c-4800-a5cc-dbbecc17b15b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "19739c76-9199-492a-bd18-730f773b6ffb", + "name": "Get a self-service profile by Id - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "19739c76-9199-492a-bd18-730f773b6ffb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5378d984-8d98-4586-9b4a-7dd9f2ef00af", + "name": "Delete a self-service profile by Id - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5378d984-8d98-4586-9b4a-7dd9f2ef00af", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d25c3782-1ef8-47b4-bf73-67a8f977fb17", + "name": "Update a self-service profile - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d25c3782-1ef8-47b4-bf73-67a8f977fb17", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3eff16ca-bc50-43ac-9373-249bdaf18766", + "name": "Get session - default", + "request": { + "urlPathTemplate": "/sessions/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3eff16ca-bc50-43ac-9373-249bdaf18766", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "046df2cc-1fd5-4ffb-bf25-97235e3418aa", + "name": "Delete session - default", + "request": { + "urlPathTemplate": "/sessions/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "046df2cc-1fd5-4ffb-bf25-97235e3418aa", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cde85d14-94e2-472f-93d0-ab0f6a1e29e6", + "name": "Update session - default", + "request": { + "urlPathTemplate": "/sessions/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cde85d14-94e2-472f-93d0-ab0f6a1e29e6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "eceb4045-ef5a-414d-a73f-ebbc3266db3b", + "name": "Revokes a session - default", + "request": { + "urlPathTemplate": "/sessions/{id}/revoke", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "eceb4045-ef5a-414d-a73f-ebbc3266db3b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "deb6f466-7529-4d43-9ae7-ec08cdee6fc8", + "name": "Get active users count - default", + "request": { + "urlPathTemplate": "/stats/active-users", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "1.1", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "deb6f466-7529-4d43-9ae7-ec08cdee6fc8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "a1c7c8b9-a534-46f2-ae35-eb70ca7628ae", + "name": "Get daily stats - default", + "request": { + "urlPathTemplate": "/stats/daily", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "to": { + "equalTo": "to" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"date\": \"date\",\n \"logins\": 1,\n \"signups\": 1,\n \"leaked_passwords\": 1,\n \"updated_at\": \"updated_at\",\n \"created_at\": \"created_at\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a1c7c8b9-a534-46f2-ae35-eb70ca7628ae", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "818f5cc7-86b3-4568-8861-9d114c5669ef", + "name": "Get the supplemental signals configuration for a tenant - default", + "request": { + "urlPathTemplate": "/supplemental-signals", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"akamai_enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "818f5cc7-86b3-4568-8861-9d114c5669ef", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "7ba85b66-eee6-4f11-b0e1-ae58fc016a79", + "name": "Update the supplemental signals configuration for a tenant - default", + "request": { + "urlPathTemplate": "/supplemental-signals", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"akamai_enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7ba85b66-eee6-4f11-b0e1-ae58fc016a79", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5b479979-e975-4c68-b8fd-ca081dfcbca7", + "name": "Create an email verification ticket - default", + "request": { + "urlPathTemplate": "/tickets/email-verification", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"ticket\": \"ticket\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5b479979-e975-4c68-b8fd-ca081dfcbca7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2b3107dc-9258-4e8c-bfb4-9f4d911eefec", + "name": "Create a password change ticket - default", + "request": { + "urlPathTemplate": "/tickets/password-change", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"ticket\": \"ticket\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2b3107dc-9258-4e8c-bfb4-9f4d911eefec", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "83be5ec3-d77b-4a3a-9e52-87f57af4d962", + "name": "Get token exchange profiles - default", + "request": { + "urlPathTemplate": "/token-exchange-profiles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"token_exchange_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "83be5ec3-d77b-4a3a-9e52-87f57af4d962", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "98e2d250-d01b-4580-a4b1-92e13a0b54b9", + "name": "Create a token exchange profile - default", + "request": { + "urlPathTemplate": "/token-exchange-profiles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "98e2d250-d01b-4580-a4b1-92e13a0b54b9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4594d614-c499-48ab-9fee-e1d4df134a89", + "name": "Get a token exchange profile - default", + "request": { + "urlPathTemplate": "/token-exchange-profiles/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4594d614-c499-48ab-9fee-e1d4df134a89", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "172477bd-43d7-47ae-8ec8-eeb2f403f89c", + "name": "Delete a token exchange profile - default", + "request": { + "urlPathTemplate": "/token-exchange-profiles/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "172477bd-43d7-47ae-8ec8-eeb2f403f89c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2d5941b9-03b1-47b9-ad3b-1466357ae3b0", + "name": "Update an existing token exchange profile - default", + "request": { + "urlPathTemplate": "/token-exchange-profiles/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2d5941b9-03b1-47b9-ad3b-1466357ae3b0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b4e9ccbb-5ef3-4c51-8149-56153dc787d4", + "name": "Get User Attribute Profiles - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"user_attribute_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b4e9ccbb-5ef3-4c51-8149-56153dc787d4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "d032e452-b3cb-4a7a-8906-bb80a76c6b8f", + "name": "Post User Attribute Profile - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d032e452-b3cb-4a7a-8906-bb80a76c6b8f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5a222f5e-5188-4dff-ae26-46d41f56c061", + "name": "Get User Attribute Profile Templates - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"user_attribute_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5a222f5e-5188-4dff-ae26-46d41f56c061", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "6672c8c9-01d1-4aae-9ade-20890bbff6b3", + "name": "Get User Attribute Profile Template - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles/templates/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6672c8c9-01d1-4aae-9ade-20890bbff6b3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b09540c6-726c-42e3-b5e8-dbc7182c2147", + "name": "Get User Attribute Profile - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b09540c6-726c-42e3-b5e8-dbc7182c2147", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ce0d7ce2-8b91-4791-be9b-2774f5efeec0", + "name": "Delete User Attribute Profile - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ce0d7ce2-8b91-4791-be9b-2774f5efeec0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2e6307a7-6f62-4b1f-a02b-e6414927a286", + "name": "Modify a user attribute profile - default", + "request": { + "urlPathTemplate": "/user-attribute-profiles/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2e6307a7-6f62-4b1f-a02b-e6414927a286", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2522dc7d-5aa2-4655-a7a9-24f79a2b8425", + "name": "Get blocks by identifier - default", + "request": { + "urlPathTemplate": "/user-blocks", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "identifier": { + "equalTo": "identifier" + }, + "consider_brute_force_enablement": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2522dc7d-5aa2-4655-a7a9-24f79a2b8425", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "049ee4c7-943e-481c-8ebf-dc6d21d5260c", + "name": "Unblock by identifier - default", + "request": { + "urlPathTemplate": "/user-blocks", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "identifier": { + "equalTo": "identifier" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "049ee4c7-943e-481c-8ebf-dc6d21d5260c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d2565899-4c2a-4b6b-93b5-caecdbadc782", + "name": "Get a user's blocks - default", + "request": { + "urlPathTemplate": "/user-blocks/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "consider_brute_force_enablement": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d2565899-4c2a-4b6b-93b5-caecdbadc782", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b3f82ebe-f646-4a06-9770-8ece4e55d861", + "name": "Unblock a user - default", + "request": { + "urlPathTemplate": "/user-blocks/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b3f82ebe-f646-4a06-9770-8ece4e55d861", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8b4e8914-5be6-4e9b-896f-0b72752d9671", + "name": "List or Search Users - default", + "request": { + "urlPathTemplate": "/users", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "sort": { + "equalTo": "sort" + }, + "connection": { + "equalTo": "connection" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "q": { + "equalTo": "q" + }, + "search_engine": { + "equalTo": "v1" + }, + "primary_order": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8b4e8914-5be6-4e9b-896f-0b72752d9671", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "4a8c54d7-9d2a-4a48-ad89-4b2481eed23a", + "name": "Create a User - default", + "request": { + "urlPathTemplate": "/users", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4a8c54d7-9d2a-4a48-ad89-4b2481eed23a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "414f2fd9-cbe8-4b07-b181-1bc4d03f38d6", + "name": "Search Users by Email - default", + "request": { + "urlPathTemplate": "/users-by-email", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "email": { + "equalTo": "email" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "414f2fd9-cbe8-4b07-b181-1bc4d03f38d6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "9fc639a9-4bc3-4dab-909f-41947203684a", + "name": "Get a User - default", + "request": { + "urlPathTemplate": "/users/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9fc639a9-4bc3-4dab-909f-41947203684a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "265181b3-7abf-472b-99f2-d2e6eb47b27e", + "name": "Delete a User - default", + "request": { + "urlPathTemplate": "/users/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "265181b3-7abf-472b-99f2-d2e6eb47b27e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c65910b9-fa24-4a35-87b7-3b8e611f2d5c", + "name": "Update a User - default", + "request": { + "urlPathTemplate": "/users/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c65910b9-fa24-4a35-87b7-3b8e611f2d5c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "365cef77-10c1-4fea-9b15-317ad7a38e99", + "name": "Generate New Multi-factor Authentication (MFA) Recovery Code - default", + "request": { + "urlPathTemplate": "/users/{id}/recovery-code-regeneration", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"recovery_code\": \"recovery_code\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "365cef77-10c1-4fea-9b15-317ad7a38e99", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a562240d-132f-4adc-a0f6-763101460526", + "name": "Revokes selected resources from a user - default", + "request": { + "urlPathTemplate": "/users/{id}/revoke-access", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a562240d-132f-4adc-a0f6-763101460526", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ccdc2dc5-d900-4938-9ae0-3a9466191ed1", + "name": "Get an action's versions - default", + "request": { + "urlPathTemplate": "/actions/actions/{actionId}/versions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "actionId": { + "equalTo": "actionId" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"versions\": [\n {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"modules\": [\n {}\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ccdc2dc5-d900-4938-9ae0-3a9466191ed1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "33c0cb30-ca1f-4477-9078-8647e82f975f", + "name": "Get a specific version of an action - default", + "request": { + "urlPathTemplate": "/actions/actions/{actionId}/versions/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "actionId": { + "equalTo": "actionId" + }, + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "33c0cb30-ca1f-4477-9078-8647e82f975f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "746fbf5a-cee7-4302-ad86-14035a3912f7", + "name": "Roll back to a previous action version - default", + "request": { + "urlPathTemplate": "/actions/actions/{actionId}/versions/{id}/deploy", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "actionId": { + "equalTo": "actionId" + }, + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "746fbf5a-cee7-4302-ad86-14035a3912f7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "822dd98d-546e-46d8-a976-8f2c97028432", + "name": "Get an execution - default", + "request": { + "urlPathTemplate": "/actions/executions/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"status\": \"unspecified\",\n \"results\": [\n {\n \"action_name\": \"action_name\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "822dd98d-546e-46d8-a976-8f2c97028432", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8abc8ed4-7895-434f-a43b-613d4101d6bc", + "name": "List Actions Modules - default", + "request": { + "urlPathTemplate": "/actions/modules", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"modules\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8abc8ed4-7895-434f-a43b-613d4101d6bc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "3e5b836f-105d-4d50-a185-5cd051f4db56", + "name": "Create a new Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3e5b836f-105d-4d50-a185-5cd051f4db56", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "51d32ec1-89e7-4db1-aae7-76445e9e0cd2", + "name": "Get a specific Actions Module by ID - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "51d32ec1-89e7-4db1-aae7-76445e9e0cd2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "613a56ac-b303-417b-bbfe-d8ceda21db89", + "name": "Delete a specific Actions Module by ID - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "613a56ac-b303-417b-bbfe-d8ceda21db89", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "33cfded9-118e-4c8a-b0a1-207b0f1ae202", + "name": "Update a specific Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "33cfded9-118e-4c8a-b0a1-207b0f1ae202", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "989d944b-6872-44fc-957b-87900af162f6", + "name": "List all actions using an Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}/actions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"actions\": [\n {\n \"action_id\": \"action_id\",\n \"action_name\": \"action_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1,\n \"supported_triggers\": [\n {\n \"id\": \"post-login\"\n }\n ]\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "989d944b-6872-44fc-957b-87900af162f6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d83ce3f7-bfbf-4999-97ba-7813c7fb466b", + "name": "Rollback an Actions Module to a previous version - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}/rollback", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d83ce3f7-bfbf-4999-97ba-7813c7fb466b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f6c96303-6883-4084-989f-2dbadb13c1d9", + "name": "Get triggers - default", + "request": { + "urlPathTemplate": "/actions/triggers", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"post-login\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f6c96303-6883-4084-989f-2dbadb13c1d9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "f9d3c975-0170-4fb7-977a-8b220d9f62bb", + "name": "List all versions of an Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}/versions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"versions\": [\n {\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {}\n ],\n \"dependencies\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f9d3c975-0170-4fb7-977a-8b220d9f62bb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f2ae0322-48cb-47bb-a197-e4607ede713a", + "name": "Create a new version of an Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}/versions", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f2ae0322-48cb-47bb-a197-e4607ede713a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "29f3eb37-e484-460b-a662-6e196927da74", + "name": "Get a specific version of an Actions Module - default", + "request": { + "urlPathTemplate": "/actions/modules/{id}/versions/{versionId}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "versionId": { + "equalTo": "versionId" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "29f3eb37-e484-460b-a662-6e196927da74", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "eb7071fc-50a8-4dc9-a79d-ce47e23d4637", + "name": "Get trigger bindings - default", + "request": { + "urlPathTemplate": "/actions/triggers/{triggerId}/bindings", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "triggerId": { + "equalTo": "post-login" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "eb7071fc-50a8-4dc9-a79d-ce47e23d4637", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "677bf282-a2a0-4bc7-a065-b5de9e248673", + "name": "Update trigger bindings - default", + "request": { + "urlPathTemplate": "/actions/triggers/{triggerId}/bindings", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "triggerId": { + "equalTo": "post-login" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"post-login\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "677bf282-a2a0-4bc7-a065-b5de9e248673", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "858c0df0-350f-4619-8960-6f774c0f234a", + "name": "Check if an IP address is blocked - default", + "request": { + "urlPathTemplate": "/anomaly/blocks/ips/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "858c0df0-350f-4619-8960-6f774c0f234a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3c386455-0d8c-4edf-a027-a4ac0ff2e391", + "name": "Remove the blocked IP address - default", + "request": { + "urlPathTemplate": "/anomaly/blocks/ips/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3c386455-0d8c-4edf-a027-a4ac0ff2e391", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "80b1e16c-5284-48f9-9802-ff189fca3b63", + "name": "Get Bot Detection settings - default", + "request": { + "urlPathTemplate": "/attack-protection/bot-detection", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "80b1e16c-5284-48f9-9802-ff189fca3b63", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "bf92fa51-631d-42ef-bf27-8161f3bcab37", + "name": "Update Bot Detection settings - default", + "request": { + "urlPathTemplate": "/attack-protection/bot-detection", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bf92fa51-631d-42ef-bf27-8161f3bcab37", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3ecb5fd3-5290-46e1-80da-bbdc282e2e86", + "name": "Get Breached Password Detection settings - default", + "request": { + "urlPathTemplate": "/attack-protection/breached-password-detection", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3ecb5fd3-5290-46e1-80da-bbdc282e2e86", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "7f0c04d7-e36a-49ce-af70-af9df4825f56", + "name": "Update Breached Password Detection settings - default", + "request": { + "urlPathTemplate": "/attack-protection/breached-password-detection", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7f0c04d7-e36a-49ce-af70-af9df4825f56", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7870c330-d1c9-4a9f-9745-40e1d8b2d0ac", + "name": "Get Brute-force settings - default", + "request": { + "urlPathTemplate": "/attack-protection/brute-force-protection", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7870c330-d1c9-4a9f-9745-40e1d8b2d0ac", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "23e440e9-0ef4-4ec5-96f3-0b4d84085d92", + "name": "Update Brute-force settings - default", + "request": { + "urlPathTemplate": "/attack-protection/brute-force-protection", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "23e440e9-0ef4-4ec5-96f3-0b4d84085d92", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34", + "name": "Get the CAPTCHA configuration for a tenant - default", + "request": { + "urlPathTemplate": "/attack-protection/captcha", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "c8a6243c-e0ad-49f2-8b47-405276a8ae5e", + "name": "Partial Update for CAPTCHA Configuration - default", + "request": { + "urlPathTemplate": "/attack-protection/captcha", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c8a6243c-e0ad-49f2-8b47-405276a8ae5e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a3ae14b8-1582-4cae-bb51-84b1d3b3fccf", + "name": "Get Suspicious IP Throttling settings - default", + "request": { + "urlPathTemplate": "/attack-protection/suspicious-ip-throttling", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a3ae14b8-1582-4cae-bb51-84b1d3b3fccf", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "119c9fe7-b349-4ad0-8846-3e6be6a9661e", + "name": "Update Suspicious IP Throttling settings - default", + "request": { + "urlPathTemplate": "/attack-protection/suspicious-ip-throttling", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "119c9fe7-b349-4ad0-8846-3e6be6a9661e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bdf661b2-3819-41c2-98f8-4b9137f67189", + "name": "Get template for New Universal Login Experience - default", + "request": { + "urlPathTemplate": "/branding/templates/universal-login", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"body\": \"body\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bdf661b2-3819-41c2-98f8-4b9137f67189", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "44f5b8dc-7d64-47a1-8889-79cda94f7809", + "name": "Set template for New Universal Login Experience - default", + "request": { + "urlPathTemplate": "/branding/templates/universal-login", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "44f5b8dc-7d64-47a1-8889-79cda94f7809", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c2b51bd9-187b-466d-8fe6-68a2eb02e00f", + "name": "Delete template for New Universal Login Experience - default", + "request": { + "urlPathTemplate": "/branding/templates/universal-login", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c2b51bd9-187b-466d-8fe6-68a2eb02e00f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2c7a5627-a851-4881-9e60-689c81a3122b", + "name": "Create branding theme - default", + "request": { + "urlPathTemplate": "/branding/themes", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2c7a5627-a851-4881-9e60-689c81a3122b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "91d16fa4-7e8b-4de2-aa78-061a5267295b", + "name": "Get default branding theme - default", + "request": { + "urlPathTemplate": "/branding/themes/default", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "91d16fa4-7e8b-4de2-aa78-061a5267295b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "f102da1c-5323-41ec-b320-888d05f069b8", + "name": "Get branding theme - default", + "request": { + "urlPathTemplate": "/branding/themes/{themeId}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "themeId": { + "equalTo": "themeId" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f102da1c-5323-41ec-b320-888d05f069b8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "215eeb29-68c9-4243-857e-d87a7c62795f", + "name": "Delete branding theme - default", + "request": { + "urlPathTemplate": "/branding/themes/{themeId}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "themeId": { + "equalTo": "themeId" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "215eeb29-68c9-4243-857e-d87a7c62795f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2dbbd929-7e98-438f-8310-2500cb90f70c", + "name": "Update branding theme - default", + "request": { + "urlPathTemplate": "/branding/themes/{themeId}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "themeId": { + "equalTo": "themeId" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2dbbd929-7e98-438f-8310-2500cb90f70c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "520b4b30-1317-42da-89bf-a0491d1694b6", + "name": "Get a list of phone providers - default", + "request": { + "urlPathTemplate": "/branding/phone/providers", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "disabled": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"providers\": [\n {\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "520b4b30-1317-42da-89bf-a0491d1694b6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "be5761ff-7af6-40ca-95bb-4fdc3bf8eb00", + "name": "Configure the phone provider - default", + "request": { + "urlPathTemplate": "/branding/phone/providers", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "be5761ff-7af6-40ca-95bb-4fdc3bf8eb00", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8c639058-4844-47c5-8ad8-c0ccd33399bb", + "name": "Get a phone provider - default", + "request": { + "urlPathTemplate": "/branding/phone/providers/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8c639058-4844-47c5-8ad8-c0ccd33399bb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a6175428-056a-47f4-b776-4dcf8260822c", + "name": "Deletes a Phone Provider - default", + "request": { + "urlPathTemplate": "/branding/phone/providers/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a6175428-056a-47f4-b776-4dcf8260822c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "95edda2c-d9d9-4854-9130-044ebb441bd7", + "name": "Update the phone provider - default", + "request": { + "urlPathTemplate": "/branding/phone/providers/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "95edda2c-d9d9-4854-9130-044ebb441bd7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "eced0fdd-3915-430a-8c28-1161ab6a3313", + "name": "Send a test phone notification for the configured provider - default", + "request": { + "urlPathTemplate": "/branding/phone/providers/{id}/try", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"code\": 1.1,\n \"message\": \"message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "eced0fdd-3915-430a-8c28-1161ab6a3313", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d", + "name": "Get a list of phone notification templates - default", + "request": { + "urlPathTemplate": "/branding/phone/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "disabled": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"templates\": [\n {\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {},\n \"type\": \"otp_verify\",\n \"disabled\": true\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "300d3eb8-52bc-4001-8af4-a0594f4242d9", + "name": "Create a phone notification template - default", + "request": { + "urlPathTemplate": "/branding/phone/templates", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "300d3eb8-52bc-4001-8af4-a0594f4242d9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "76aa966c-5fbe-4a23-a2a4-7cbf13eb043c", + "name": "Get a phone notification template - default", + "request": { + "urlPathTemplate": "/branding/phone/templates/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "76aa966c-5fbe-4a23-a2a4-7cbf13eb043c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "97c15733-1abd-4f5e-8eda-3dc1b372e0ec", + "name": "Delete a phone notification template - default", + "request": { + "urlPathTemplate": "/branding/phone/templates/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "97c15733-1abd-4f5e-8eda-3dc1b372e0ec", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2e4c517e-f1d0-4252-bfea-7b6342825fba", + "name": "Update a phone notification template - default", + "request": { + "urlPathTemplate": "/branding/phone/templates/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2e4c517e-f1d0-4252-bfea-7b6342825fba", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4", + "name": "Resets a phone notification template values - default", + "request": { + "urlPathTemplate": "/branding/phone/templates/{id}/reset", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"x\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"x\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"x\",\n \"body\": {\n \"text\": \"x\",\n \"voice\": \"x\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0d9ba799-020f-40db-86d6-08de485ad618", + "name": "Send a test phone notification for the configured template - default", + "request": { + "urlPathTemplate": "/branding/phone/templates/{id}/try", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"message\": \"message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0d9ba799-020f-40db-86d6-08de485ad618", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde", + "name": "Get the organizations associated to a client grant - default", + "request": { + "urlPathTemplate": "/client-grants/{id}/organizations", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "318739d6-2060-4406-9548-e1dca9fc9306", + "name": "Get client credentials - default", + "request": { + "urlPathTemplate": "/clients/{client_id}/credentials", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "client_id": { + "equalTo": "client_id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "318739d6-2060-4406-9548-e1dca9fc9306", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358", + "name": "Create a client credential - default", + "request": { + "urlPathTemplate": "/clients/{client_id}/credentials", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "client_id": { + "equalTo": "client_id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "84fb49da-5fa4-4f09-8176-cf14ff179829", + "name": "Get client credential details - default", + "request": { + "urlPathTemplate": "/clients/{client_id}/credentials/{credential_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "client_id": { + "equalTo": "client_id" + }, + "credential_id": { + "equalTo": "credential_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "84fb49da-5fa4-4f09-8176-cf14ff179829", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ac24c006-0300-485b-b881-9bfd0a38c4aa", + "name": "Delete a client credential - default", + "request": { + "urlPathTemplate": "/clients/{client_id}/credentials/{credential_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "client_id": { + "equalTo": "client_id" + }, + "credential_id": { + "equalTo": "credential_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ac24c006-0300-485b-b881-9bfd0a38c4aa", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c820cce1-37c3-4aa6-8700-119563b70d23", + "name": "Update a client credential - default", + "request": { + "urlPathTemplate": "/clients/{client_id}/credentials/{credential_id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "client_id": { + "equalTo": "client_id" + }, + "credential_id": { + "equalTo": "credential_id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c820cce1-37c3-4aa6-8700-119563b70d23", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "324ddd4f-5b97-4bf3-8c51-91ad2c931c47", + "name": "Get enabled connections for a client - default", + "request": { + "urlPathTemplate": "/clients/{id}/connections", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "324ddd4f-5b97-4bf3-8c51-91ad2c931c47", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7960ea97-24a9-4c8e-ad42-2dcb8c0215bc", + "name": "Get a list of directory provisioning configurations - default", + "request": { + "urlPathTemplate": "/connections-directory-provisionings", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"directory_provisionings\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7960ea97-24a9-4c8e-ad42-2dcb8c0215bc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "feeddf21-212e-4dbc-a0eb-4a922ec0341b", + "name": "Get a directory provisioning configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "feeddf21-212e-4dbc-a0eb-4a922ec0341b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3cfd3977-6fa4-44df-bdf3-78fee867315a", + "name": "Create a directory provisioning configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3cfd3977-6fa4-44df-bdf3-78fee867315a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2ee66349-1719-45a8-bbbc-65b8e4e783a3", + "name": "Delete a directory provisioning configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2ee66349-1719-45a8-bbbc-65b8e4e783a3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "738a6f0e-a176-48c6-ac5b-1bcc67bc8656", + "name": "Patch a directory provisioning configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"synchronize_groups\": \"all\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "738a6f0e-a176-48c6-ac5b-1bcc67bc8656", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "181a029d-c4d1-4386-8c0d-4e517aea7579", + "name": "Get a connection's default directory provisioning attribute mapping - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning/default-mapping", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "181a029d-c4d1-4386-8c0d-4e517aea7579", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9821e94c-1529-464c-911e-9b351dbc15bd", + "name": "Get a list of SCIM configurations - default", + "request": { + "urlPathTemplate": "/connections-scim-configurations", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"scim_configurations\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9821e94c-1529-464c-911e-9b351dbc15bd", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f", + "name": "Get a connection's SCIM configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "45f92e80-8b92-4937-b29b-76fac22cf624", + "name": "Create a SCIM configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "45f92e80-8b92-4937-b29b-76fac22cf624", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c9239c3d-f534-4c1d-a05e-64c0785f569a", + "name": "Delete a connection's SCIM configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c9239c3d-f534-4c1d-a05e-64c0785f569a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d298cb6d-3c6a-4510-a78c-556fad17fd65", + "name": "Patch a connection's SCIM configuration - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_on\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d298cb6d-3c6a-4510-a78c-556fad17fd65", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4cc31df0-e4df-450c-9fac-16b9c893e9fa", + "name": "Get a connection's default SCIM mapping - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration/default-mapping", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4cc31df0-e4df-450c-9fac-16b9c893e9fa", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4cda0987-d608-47ba-b465-245ecfaabb90", + "name": "Get enabled clients for a connection - default", + "request": { + "urlPathTemplate": "/connections/{id}/clients", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "take": { + "equalTo": "1" + }, + "from": { + "equalTo": "from" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4cda0987-d608-47ba-b465-245ecfaabb90", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0c56da15-4d9a-470c-9fcd-64f2c04dd3d3", + "name": "Update enabled clients for a connection - default", + "request": { + "urlPathTemplate": "/connections/{id}/clients", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0c56da15-4d9a-470c-9fcd-64f2c04dd3d3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bf72570e-1315-4eaa-8145-3f400d3eccf0", + "name": "Get connection keys - default", + "request": { + "urlPathTemplate": "/connections/{id}/keys", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bf72570e-1315-4eaa-8145-3f400d3eccf0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "faa363d9-1b22-41f6-a15a-6b53ce1566f2", + "name": "Create connection keys - default", + "request": { + "urlPathTemplate": "/connections/{id}/keys", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "faa363d9-1b22-41f6-a15a-6b53ce1566f2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b11a1483-99df-4d6a-ace7-cb55bf35ba34", + "name": "Rotate connection keys - default", + "request": { + "urlPathTemplate": "/connections/{id}/keys/rotate", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"next\": true,\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b11a1483-99df-4d6a-ace7-cb55bf35ba34", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1d0cb62f-340c-4168-bd90-0fa1ba032e3a", + "name": "Delete a connection user - default", + "request": { + "urlPathTemplate": "/connections/{id}/users", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "email": { + "equalTo": "email" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1d0cb62f-340c-4168-bd90-0fa1ba032e3a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "175c0550-405b-4cd6-b498-6501a695ed33", + "name": "Request an on-demand synchronization of the directory - default", + "request": { + "urlPathTemplate": "/connections/{id}/directory-provisioning/synchronizations", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"connection_id\": \"connection_id\",\n \"synchronization_id\": \"synchronization_id\",\n \"status\": \"status\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "175c0550-405b-4cd6-b498-6501a695ed33", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "58eab082-4eda-42df-9764-ed787b38df1e", + "name": "Get a connection's SCIM tokens - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration/tokens", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"token_id\": \"token_id\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\",\n \"last_used_at\": \"last_used_at\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "58eab082-4eda-42df-9764-ed787b38df1e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b55da7ed-453d-4799-b895-796f72020abb", + "name": "Create a SCIM Token - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration/tokens", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"token_id\": \"token_id\",\n \"token\": \"token\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b55da7ed-453d-4799-b895-796f72020abb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9", + "name": "Delete a connection's SCIM token - default", + "request": { + "urlPathTemplate": "/connections/{id}/scim-configuration/tokens/{tokenId}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "tokenId": { + "equalTo": "tokenId" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "53da06f4-1ed4-4e51-8bb8-0ce04e219464", + "name": "Get email provider - default", + "request": { + "urlPathTemplate": "/emails/provider", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "53da06f4-1ed4-4e51-8bb8-0ce04e219464", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "d1a0f535-378f-4200-865f-23ca6cf50b9d", + "name": "Configure email provider - default", + "request": { + "urlPathTemplate": "/emails/provider", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d1a0f535-378f-4200-865f-23ca6cf50b9d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a57ca053-0cf9-416a-9cb3-144e7c5bd4d5", + "name": "Delete email provider - default", + "request": { + "urlPathTemplate": "/emails/provider", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a57ca053-0cf9-416a-9cb3-144e7c5bd4d5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "36f2813e-a299-41fd-a6d6-54938ea37a15", + "name": "Update email provider - default", + "request": { + "urlPathTemplate": "/emails/provider", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "36f2813e-a299-41fd-a6d6-54938ea37a15", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c3751490-b492-4376-9596-bd7d6f5e8443", + "name": "Get this event stream's delivery history - default", + "request": { + "urlPathTemplate": "/event-streams/{id}/deliveries", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "statuses": { + "equalTo": "statuses" + }, + "event_types": { + "equalTo": "event_types" + }, + "date_from": { + "equalTo": "date_from" + }, + "date_to": { + "equalTo": "date_to" + }, + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c3751490-b492-4376-9596-bd7d6f5e8443", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "93fa5cb1-a92c-4b20-8483-814c91175496", + "name": "Get a specific event's delivery history - default", + "request": { + "urlPathTemplate": "/event-streams/{id}/deliveries/{event_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "event_id": { + "equalTo": "event_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "93fa5cb1-a92c-4b20-8483-814c91175496", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "25856d60-9bad-4777-b7f2-7b5e2656b133", + "name": "Redeliver failed events - default", + "request": { + "urlPathTemplate": "/event-streams/{id}/redeliver", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"date_from\": \"2024-01-15T09:30:00Z\",\n \"date_to\": \"2024-01-15T09:30:00Z\",\n \"statuses\": [\n \"failed\"\n ],\n \"event_types\": [\n \"user.created\"\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "25856d60-9bad-4777-b7f2-7b5e2656b133", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "05d8b619-8b8d-41ea-b60f-bea3298d5e33", + "name": "Redeliver a single failed event by ID - default", + "request": { + "urlPathTemplate": "/event-streams/{id}/redeliver/{event_id}", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "event_id": { + "equalTo": "event_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "05d8b619-8b8d-41ea-b60f-bea3298d5e33", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "62d121a4-93bc-4281-8659-06708ac8d781", + "name": "Get flow executions - default", + "request": { + "urlPathTemplate": "/flows/{flow_id}/executions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "flow_id": { + "equalTo": "flow_id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"executions\": [\n {\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "62d121a4-93bc-4281-8659-06708ac8d781", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3151ee0d-c1ca-45b6-9f72-5b4138b4b90d", + "name": "Get a flow execution - default", + "request": { + "urlPathTemplate": "/flows/{flow_id}/executions/{execution_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "flow_id": { + "equalTo": "flow_id" + }, + "execution_id": { + "equalTo": "execution_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"debug\": {\n \"key\": \"value\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3151ee0d-c1ca-45b6-9f72-5b4138b4b90d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5", + "name": "Delete a flow execution - default", + "request": { + "urlPathTemplate": "/flows/{flow_id}/executions/{execution_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "flow_id": { + "equalTo": "flow_id" + }, + "execution_id": { + "equalTo": "execution_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee", + "name": "Get Flows Vault connection list - default", + "request": { + "urlPathTemplate": "/flows/vault/connections", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "b56d64da-174f-4d7e-86e7-3240fb1a8174", + "name": "Create a Flows Vault connection - default", + "request": { + "urlPathTemplate": "/flows/vault/connections", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b56d64da-174f-4d7e-86e7-3240fb1a8174", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6cc30ec0-8e30-44ab-b033-e2db27abc3ac", + "name": "Get a Flows Vault connection - default", + "request": { + "urlPathTemplate": "/flows/vault/connections/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6cc30ec0-8e30-44ab-b033-e2db27abc3ac", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "97e2e46c-2af3-4cf0-b6df-e09cd0f4151a", + "name": "Delete a Flows Vault connection - default", + "request": { + "urlPathTemplate": "/flows/vault/connections/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "97e2e46c-2af3-4cf0-b6df-e09cd0f4151a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cdbf8062-2c13-4861-9280-e1ef2af24823", + "name": "Update a Flows Vault connection - default", + "request": { + "urlPathTemplate": "/flows/vault/connections/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cdbf8062-2c13-4861-9280-e1ef2af24823", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb", + "name": "Get Group Members - default", + "request": { + "urlPathTemplate": "/groups/{id}/members", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"members\": [\n {\n \"id\": \"id\",\n \"member_type\": \"user\",\n \"type\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a2982e98-d69b-4815-a50d-57f1267374d8", + "name": "Create a multi-factor authentication enrollment ticket - default", + "request": { + "urlPathTemplate": "/guardian/enrollments/ticket", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"ticket_id\": \"ticket_id\",\n \"ticket_url\": \"ticket_url\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a2982e98-d69b-4815-a50d-57f1267374d8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "029d8a45-40e7-4697-b2da-a0c12a4d3895", + "name": "Get a multi-factor authentication enrollment - default", + "request": { + "urlPathTemplate": "/guardian/enrollments/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"status\": \"pending\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"enrolled_at\": \"enrolled_at\",\n \"last_auth\": \"last_auth\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "029d8a45-40e7-4697-b2da-a0c12a4d3895", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d28abba4-f155-4fa4-ba9b-077e8ea016ad", + "name": "Delete a multi-factor authentication enrollment - default", + "request": { + "urlPathTemplate": "/guardian/enrollments/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d28abba4-f155-4fa4-ba9b-077e8ea016ad", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "12377456-a682-4cdc-b63d-41a188b3ce32", + "name": "Get Factors and multi-factor authentication details - default", + "request": { + "urlPathTemplate": "/guardian/factors", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"enabled\": true,\n \"trial_expired\": true,\n \"name\": \"push-notification\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "12377456-a682-4cdc-b63d-41a188b3ce32", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "93c9905e-4981-4cb3-a7b0-026dab1704d6", + "name": "Update multi-factor authentication type - default", + "request": { + "urlPathTemplate": "/guardian/factors/{name}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "name": { + "equalTo": "push-notification" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "93c9905e-4981-4cb3-a7b0-026dab1704d6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e47dd04a-f3a3-409a-a301-7732f16f3bec", + "name": "Get multi-factor authentication policies - default", + "request": { + "urlPathTemplate": "/guardian/policies", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n \"all-applications\"\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e47dd04a-f3a3-409a-a301-7732f16f3bec", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "8ee26dda-4638-4269-9b14-59f2907ef28b", + "name": "Update multi-factor authentication policies - default", + "request": { + "urlPathTemplate": "/guardian/policies", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n \"all-applications\"\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8ee26dda-4638-4269-9b14-59f2907ef28b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ed435b3e-66b6-47b0-882f-08d926944cad", + "name": "Get Enabled Phone Factors - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/message-types", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"message_types\": [\n \"sms\"\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ed435b3e-66b6-47b0-882f-08d926944cad", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "92b96146-6175-4994-87af-ac137f73595d", + "name": "Update the Enabled Phone Factors - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/message-types", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"message_types\": [\n \"sms\"\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "92b96146-6175-4994-87af-ac137f73595d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bd1421c2-3dbe-4603-b96c-02e53872498b", + "name": "Get Twilio configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/providers/twilio", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bd1421c2-3dbe-4603-b96c-02e53872498b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "92ac09b5-25bb-4b34-8fad-73bbd1a12984", + "name": "Update Twilio configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/providers/twilio", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "92ac09b5-25bb-4b34-8fad-73bbd1a12984", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "5c310715-a914-4928-9142-141be90dd71e", + "name": "Get phone provider configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/selected-provider", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"auth0\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "5c310715-a914-4928-9142-141be90dd71e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "555dfcb1-93af-4dcf-8241-1114028c32b4", + "name": "Update phone provider configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/selected-provider", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"auth0\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "555dfcb1-93af-4dcf-8241-1114028c32b4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0e83b2df-19bf-4909-b1c4-0522a7f929a3", + "name": "Get Enrollment and Verification Phone Templates - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0e83b2df-19bf-4909-b1c4-0522a7f929a3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "d55307be-4c05-42f6-888f-c5a6ee1d2ae2", + "name": "Update Enrollment and Verification Phone Templates - default", + "request": { + "urlPathTemplate": "/guardian/factors/phone/templates", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d55307be-4c05-42f6-888f-c5a6ee1d2ae2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "11ed0ad4-9dc8-48ea-bc9c-9824179b9f32", + "name": "Get APNS push notification configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/apns", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"bundle_id\": \"bundle_id\",\n \"sandbox\": true,\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "11ed0ad4-9dc8-48ea-bc9c-9824179b9f32", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "e3a3549b-eb87-4309-aa03-a9f08b1b17a7", + "name": "Update APNS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/apns", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e3a3549b-eb87-4309-aa03-a9f08b1b17a7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784", + "name": "Update APNs provider configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/apns", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2a5a732a-4ffa-4f42-8454-448f5735b2f3", + "name": "Overwrite FCM configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/fcm", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2a5a732a-4ffa-4f42-8454-448f5735b2f3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "96fb85cc-6ac7-4ec7-9234-6b2db38ea009", + "name": "Updates FCM configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/fcm", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "96fb85cc-6ac7-4ec7-9234-6b2db38ea009", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "712dc55b-7135-4196-89c9-281072bf1983", + "name": "Overwrite FCMV1 configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/fcmv1", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "712dc55b-7135-4196-89c9-281072bf1983", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "de696b9c-3ffb-4bc8-adde-131913ca6338", + "name": "Updates FCMV1 configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/fcmv1", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "de696b9c-3ffb-4bc8-adde-131913ca6338", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a03df5fb-b6e0-4345-9c83-e920d88114c9", + "name": "Get AWS SNS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/sns", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a03df5fb-b6e0-4345-9c83-e920d88114c9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "e2945e05-5067-4c32-b82b-483fff53cfc3", + "name": "Configure AWS SNS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/sns", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e2945e05-5067-4c32-b82b-483fff53cfc3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "79a10ee8-bacd-486b-b5f3-4f23e2382c4b", + "name": "Update AWS SNS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/providers/sns", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "79a10ee8-bacd-486b-b5f3-4f23e2382c4b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0496348c-7357-4623-8514-fb741a753c75", + "name": "Get push notification provider - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/selected-provider", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"guardian\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0496348c-7357-4623-8514-fb741a753c75", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "7285a311-6499-4a95-a8cc-6701a6997bf5", + "name": "Update Push Notification configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/push-notification/selected-provider", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"guardian\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7285a311-6499-4a95-a8cc-6701a6997bf5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e8ca19da-0184-44a0-868c-f020f73cbcbe", + "name": "Get Twilio SMS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/providers/twilio", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e8ca19da-0184-44a0-868c-f020f73cbcbe", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "8e51f842-c731-4fc6-9f28-42d20d05f8a7", + "name": "Update Twilio SMS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/providers/twilio", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8e51f842-c731-4fc6-9f28-42d20d05f8a7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a9bd6f03-210a-4eba-9f63-48eb355c59a5", + "name": "Get SMS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/selected-provider", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"auth0\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a9bd6f03-210a-4eba-9f63-48eb355c59a5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "69919759-0017-4dd6-8df8-a40088848ddb", + "name": "Update SMS configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/selected-provider", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"provider\": \"auth0\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "69919759-0017-4dd6-8df8-a40088848ddb", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1731b364-a171-42f2-8475-62bdb634879d", + "name": "Get SMS enrollment and verification templates - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1731b364-a171-42f2-8475-62bdb634879d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "2b0be931-6224-442e-92ca-1b5dfe5c06ba", + "name": "Update SMS enrollment and verification templates - default", + "request": { + "urlPathTemplate": "/guardian/factors/sms/templates", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2b0be931-6224-442e-92ca-1b5dfe5c06ba", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "47cb059e-e754-4e4c-804b-52d84dd12162", + "name": "Get DUO Configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/duo/settings", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "47cb059e-e754-4e4c-804b-52d84dd12162", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "0bc934b5-9b7a-4a4d-9ffe-54d5473d5f62", + "name": "Set the DUO Configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/duo/settings", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0bc934b5-9b7a-4a4d-9ffe-54d5473d5f62", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "38a5aa65-75f0-471c-ab5e-10b544359b3c", + "name": "Update the DUO Configuration - default", + "request": { + "urlPathTemplate": "/guardian/factors/duo/settings", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "38a5aa65-75f0-471c-ab5e-10b544359b3c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fcdfec44-0fb3-42b6-a292-48e9fb13271a", + "name": "Get hook secrets - default", + "request": { + "urlPathTemplate": "/hooks/{id}/secrets", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fcdfec44-0fb3-42b6-a292-48e9fb13271a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2", + "name": "Add hook secrets - default", + "request": { + "urlPathTemplate": "/hooks/{id}/secrets", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1e6e250b-ded1-4ca6-831a-83d54b71295e", + "name": "Delete hook secrets - default", + "request": { + "urlPathTemplate": "/hooks/{id}/secrets", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1e6e250b-ded1-4ca6-831a-83d54b71295e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "81e2c92a-69de-446b-82c8-7f320f9e1060", + "name": "Update hook secrets - default", + "request": { + "urlPathTemplate": "/hooks/{id}/secrets", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "81e2c92a-69de-446b-82c8-7f320f9e1060", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a93c6324-dab3-4581-8117-74e0dc2c05b3", + "name": "Create export users job - default", + "request": { + "urlPathTemplate": "/jobs/users-exports", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"format\": \"json\",\n \"limit\": 1,\n \"fields\": [\n {\n \"name\": \"name\",\n \"export_as\": \"export_as\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a93c6324-dab3-4581-8117-74e0dc2c05b3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "d7d59bf9-f846-4967-a50c-0d5e2daaf044", + "name": "Create import users job - default", + "request": { + "urlPathTemplate": "/jobs/users-imports", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 202, + "body": "{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"external_id\": \"external_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d7d59bf9-f846-4967-a50c-0d5e2daaf044", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1ec86184-b7ac-4cff-9fa1-e78fcdcaa954", + "name": "Send an email address verification email - default", + "request": { + "urlPathTemplate": "/jobs/verification-email", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1ec86184-b7ac-4cff-9fa1-e78fcdcaa954", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1ddcb674-4117-4538-98e8-5723fdb083e8", + "name": "Get job error details - default", + "request": { + "urlPathTemplate": "/jobs/{id}/errors", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"user\": {\n \"key\": \"value\"\n },\n \"errors\": [\n {}\n ]\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1ddcb674-4117-4538-98e8-5723fdb083e8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "70e1c2da-e7db-401a-b166-be0b5da6139c", + "name": "Get custom signing keys - default", + "request": { + "urlPathTemplate": "/keys/custom-signing", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "70e1c2da-e7db-401a-b166-be0b5da6139c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "3b40098d-d649-4030-bc12-31606e807e15", + "name": "Create or replace custom signing keys - default", + "request": { + "urlPathTemplate": "/keys/custom-signing", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3b40098d-d649-4030-bc12-31606e807e15", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f9b82290-1c82-4a29-891c-cee6ec28bcc5", + "name": "Delete custom signing keys - default", + "request": { + "urlPathTemplate": "/keys/custom-signing", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f9b82290-1c82-4a29-891c-cee6ec28bcc5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c09166ed-9d73-4607-92f6-ae884592a5e5", + "name": "Get all encryption keys - default", + "request": { + "urlPathTemplate": "/keys/encryption", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1,\n \"limit\": 1,\n \"total\": 1,\n \"keys\": [\n {\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c09166ed-9d73-4607-92f6-ae884592a5e5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "b0a9c75d-5268-41dd-849a-da3c0cfcb04b", + "name": "Create the new encryption key - default", + "request": { + "urlPathTemplate": "/keys/encryption", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b0a9c75d-5268-41dd-849a-da3c0cfcb04b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "974880c1-1ef6-4001-a614-aa43c37b4420", + "name": "Rekey the key hierarchy - default", + "request": { + "urlPathTemplate": "/keys/encryption/rekey", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "974880c1-1ef6-4001-a614-aa43c37b4420", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "77bab061-9dae-4268-84d0-0b63e263f1ab", + "name": "Get the encryption key by its key id - default", + "request": { + "urlPathTemplate": "/keys/encryption/{kid}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "77bab061-9dae-4268-84d0-0b63e263f1ab", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "86a3fc30-c02a-4c36-ac4c-7900289870b8", + "name": "Import the encryption key - default", + "request": { + "urlPathTemplate": "/keys/encryption/{kid}", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "86a3fc30-c02a-4c36-ac4c-7900289870b8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cb3a536a-7775-4fcf-a037-f10b16d2fe1d", + "name": "Delete the encryption key by its key id - default", + "request": { + "urlPathTemplate": "/keys/encryption/{kid}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cb3a536a-7775-4fcf-a037-f10b16d2fe1d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cf0b4ec6-52f1-4f55-974a-9eadd755c04f", + "name": "Create the public wrapping key - default", + "request": { + "urlPathTemplate": "/keys/encryption/{kid}/wrapping-key", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"public_key\": \"public_key\",\n \"algorithm\": \"CKM_RSA_AES_KEY_WRAP\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cf0b4ec6-52f1-4f55-974a-9eadd755c04f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1bde50a3-a51e-41b4-9018-8f46bd597774", + "name": "Get all Application Signing Keys - default", + "request": { + "urlPathTemplate": "/keys/signing", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1bde50a3-a51e-41b4-9018-8f46bd597774", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "e9d4827d-c55c-4b09-a761-24a551052257", + "name": "Rotate the Application Signing Key - default", + "request": { + "urlPathTemplate": "/keys/signing/rotate", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e9d4827d-c55c-4b09-a761-24a551052257", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "adec0e81-f58d-4f1f-9071-2c1f28b236e1", + "name": "Get an Application Signing Key by its key id - default", + "request": { + "urlPathTemplate": "/keys/signing/{kid}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "adec0e81-f58d-4f1f-9071-2c1f28b236e1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cab3e5d7-c549-4ce9-aa51-648a2d61b321", + "name": "Revoke an Application Signing Key by its key id - default", + "request": { + "urlPathTemplate": "/keys/signing/{kid}/revoke", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "kid": { + "equalTo": "kid" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cab3e5d7-c549-4ce9-aa51-648a2d61b321", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3bd5c630-fb83-4b4e-a903-67268e3218e0", + "name": "Get client grants associated to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/client-grants", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "audience": { + "equalTo": "audience" + }, + "client_id": { + "equalTo": "client_id" + }, + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3bd5c630-fb83-4b4e-a903-67268e3218e0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e4a9924e-c625-4ff3-a5ed-44c5e7f20053", + "name": "Associate a client grant with an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/client-grants", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e4a9924e-c625-4ff3-a5ed-44c5e7f20053", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "36ae6d81-83b3-4c2c-8f37-5e921d4740ad", + "name": "Remove a client grant from an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/client-grants/{grant_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "grant_id": { + "equalTo": "grant_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "36ae6d81-83b3-4c2c-8f37-5e921d4740ad", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4c65b7b7-43a0-4437-b96f-7f47fdad6550", + "name": "Get connections associated with an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/connections", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "is_enabled": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4c65b7b7-43a0-4437-b96f-7f47fdad6550", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "de944d33-99f5-481d-9810-4aa2473950cc", + "name": "Adds a connection to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/connections", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "de944d33-99f5-481d-9810-4aa2473950cc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ac4ecac7-55a4-49de-b0d5-639975924208", + "name": "Get a specific connection associated with an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/connections/{connection_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connection_id": { + "equalTo": "connection_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ac4ecac7-55a4-49de-b0d5-639975924208", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "dea1d6a9-c8e5-43e2-b22c-b1008e34c6f1", + "name": "Delete a connection from an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/connections/{connection_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connection_id": { + "equalTo": "connection_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "dea1d6a9-c8e5-43e2-b22c-b1008e34c6f1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "98e911b3-5c83-4a51-9fdc-6b4a18bac7c0", + "name": "Update a connection for an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/connections/{connection_id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connection_id": { + "equalTo": "connection_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"organization_connection_name\": \"organization_connection_name\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"organization_access_level\": \"none\",\n \"is_enabled\": true,\n \"connection_id\": \"connection_id\",\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "98e911b3-5c83-4a51-9fdc-6b4a18bac7c0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2edde951-0b04-4e05-9389-658b85c37299", + "name": "Retrieve all organization discovery domains - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"domains\": [\n {\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2edde951-0b04-4e05-9389-658b85c37299", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fdfc20b0-5e2b-4eb6-98af-e0f922aefac7", + "name": "Create an organization discovery domain - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fdfc20b0-5e2b-4eb6-98af-e0f922aefac7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6880f9c8-a623-4d59-b041-fc7f1b5104cc", + "name": "Retrieve an organization discovery domain by domain name - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains/name/{discovery_domain}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "discovery_domain": { + "equalTo": "discovery_domain" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6880f9c8-a623-4d59-b041-fc7f1b5104cc", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496", + "name": "Retrieve an organization discovery domain by ID - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains/{discovery_domain_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "discovery_domain_id": { + "equalTo": "discovery_domain_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "803a298e-d6f6-4370-8e03-37d06547eeef", + "name": "Delete an organization discovery domain - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains/{discovery_domain_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "discovery_domain_id": { + "equalTo": "discovery_domain_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "803a298e-d6f6-4370-8e03-37d06547eeef", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fca95551-032d-44de-a3cf-849f98ec2177", + "name": "Update an organization discovery domain - default", + "request": { + "urlPathTemplate": "/organizations/{id}/discovery-domains/{discovery_domain_id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "discovery_domain_id": { + "equalTo": "discovery_domain_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fca95551-032d-44de-a3cf-849f98ec2177", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "47767c5f-78ac-42c3-affe-a5d3e1ed6800", + "name": "Get connections enabled for an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/enabled_connections", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "47767c5f-78ac-42c3-affe-a5d3e1ed6800", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c311c287-5333-41bd-819e-e813c541ed66", + "name": "Add connections to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/enabled_connections", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c311c287-5333-41bd-819e-e813c541ed66", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c455a9b2-1f8f-45e1-8100-df1d73cd097d", + "name": "Get an enabled connection for an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/enabled_connections/{connectionId}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connectionId": { + "equalTo": "connectionId" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c455a9b2-1f8f-45e1-8100-df1d73cd097d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0dc9106a-150c-40d8-9000-176bd6350a98", + "name": "Delete connections from an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/enabled_connections/{connectionId}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connectionId": { + "equalTo": "connectionId" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0dc9106a-150c-40d8-9000-176bd6350a98", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9a371d52-abea-44dc-a464-f04f63a601b0", + "name": "Update the Connection of an Organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/enabled_connections/{connectionId}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "connectionId": { + "equalTo": "connectionId" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9a371d52-abea-44dc-a464-f04f63a601b0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7fb2e068-8caf-4234-aa52-3b51c9f37300", + "name": "Get invitations to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/invitations", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "sort": { + "equalTo": "sort" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"invitations\": [\n {\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7fb2e068-8caf-4234-aa52-3b51c9f37300", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "49ad8742-5d95-4969-87cf-09427959682f", + "name": "Create invitations to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/invitations", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "49ad8742-5d95-4969-87cf-09427959682f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2bf04456-d49c-45d6-aedf-19598f4c6df8", + "name": "Get a specific invitation to an Organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/invitations/{invitation_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "invitation_id": { + "equalTo": "invitation_id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2bf04456-d49c-45d6-aedf-19598f4c6df8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1a1c3283-fac9-4185-bcb8-3a9053a43163", + "name": "Delete an invitation to an Organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/invitations/{invitation_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "invitation_id": { + "equalTo": "invitation_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1a1c3283-fac9-4185-bcb8-3a9053a43163", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b33d5e95-cdf1-4d3a-b019-7fa6e46267a0", + "name": "Get members who belong to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + }, + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"members\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\",\n \"roles\": [\n {}\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b33d5e95-cdf1-4d3a-b019-7fa6e46267a0", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8536454b-53b8-4272-8829-062f2cb9092d", + "name": "Add members to an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8536454b-53b8-4272-8829-062f2cb9092d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "71dcfc22-87b0-4591-921b-7d7088bd16ae", + "name": "Delete members from an organization - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "71dcfc22-87b0-4591-921b-7d7088bd16ae", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2c099b94-dfed-4bf8-b370-25ceade844b1", + "name": "Get user roles assigned to an Organization member - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members/{user_id}/roles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "user_id": { + "equalTo": "user_id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2c099b94-dfed-4bf8-b370-25ceade844b1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "8a5dc31c-084d-4753-9c95-0a0ddd2294da", + "name": "Assign user roles to an Organization member - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members/{user_id}/roles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8a5dc31c-084d-4753-9c95-0a0ddd2294da", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "245dc825-fc94-49ca-9547-a4b30ac4485a", + "name": "Delete user roles from an Organization member - default", + "request": { + "urlPathTemplate": "/organizations/{id}/members/{user_id}/roles", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "245dc825-fc94-49ca-9547-a4b30ac4485a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f02cb8dc-cee0-4470-b69b-596e4d0653f9", + "name": "Get render setting configurations for all screens - default", + "request": { + "urlPathTemplate": "/prompts/rendering", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + }, + "prompt": { + "equalTo": "prompt" + }, + "screen": { + "equalTo": "screen" + }, + "rendering_mode": { + "equalTo": "advanced" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"configs\": [\n {\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f02cb8dc-cee0-4470-b69b-596e4d0653f9", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "d0abb404-e603-4992-9c65-19a5766a9462", + "name": "Update render settings for multiple screens - default", + "request": { + "urlPathTemplate": "/prompts/rendering", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"configs\": [\n {\n \"prompt\": \"login\",\n \"screen\": \"login\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "d0abb404-e603-4992-9c65-19a5766a9462", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b6f4a3c0-8032-487e-be5c-24b52aea56c3", + "name": "Get render settings for a screen - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/screen/{screen}/rendering", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + }, + "screen": { + "equalTo": "login" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b6f4a3c0-8032-487e-be5c-24b52aea56c3", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "248d2934-0ee0-434c-a9a5-df7501ef901c", + "name": "Update render settings for a screen - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/screen/{screen}/rendering", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + }, + "screen": { + "equalTo": "login" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "248d2934-0ee0-434c-a9a5-df7501ef901c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1cd54de8-b246-4b0a-863b-f5fa0184e206", + "name": "Get custom text for a prompt - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/custom-text/{language}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + }, + "language": { + "equalTo": "am" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1cd54de8-b246-4b0a-863b-f5fa0184e206", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bff89979-efc7-413e-8aaf-a45d84f1793b", + "name": "Set custom text for a specific prompt - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/custom-text/{language}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + }, + "language": { + "equalTo": "am" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bff89979-efc7-413e-8aaf-a45d84f1793b", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e2ccf6be-be59-4e7f-90f9-dd24529c4981", + "name": "Get partials for a prompt - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/partials", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e2ccf6be-be59-4e7f-90f9-dd24529c4981", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c9517422-8a42-4204-8156-cda9b385f017", + "name": "Set partials for a prompt - default", + "request": { + "urlPathTemplate": "/prompts/{prompt}/partials", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "prompt": { + "equalTo": "login" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c9517422-8a42-4204-8156-cda9b385f017", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "cb391545-5076-433d-8b32-b19ed3d73939", + "name": "Get risk assessment settings - default", + "request": { + "urlPathTemplate": "/risk-assessments/settings", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "cb391545-5076-433d-8b32-b19ed3d73939", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "8018c245-2f30-469f-992f-dc1668cccd75", + "name": "Update risk assessment settings - default", + "request": { + "urlPathTemplate": "/risk-assessments/settings", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"enabled\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "8018c245-2f30-469f-992f-dc1668cccd75", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b25bc47f-4ec8-4cd8-b419-5323232b8bb8", + "name": "Get new device assessor - default", + "request": { + "urlPathTemplate": "/risk-assessments/settings/new-device", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"remember_for\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b25bc47f-4ec8-4cd8-b419-5323232b8bb8", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "07a0ab5c-d2e9-4e3d-899b-3f9a833c3813", + "name": "Update new device assessor - default", + "request": { + "urlPathTemplate": "/risk-assessments/settings/new-device", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"remember_for\": 1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "07a0ab5c-d2e9-4e3d-899b-3f9a833c3813", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bf10686c-2651-4040-8299-93e4bbc9834d", + "name": "Get permissions granted by role - default", + "request": { + "urlPathTemplate": "/roles/{id}/permissions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "per_page": { + "equalTo": "1" + }, + "page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bf10686c-2651-4040-8299-93e4bbc9834d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "23e27895-e8da-4c4d-bec9-94df0205eb5c", + "name": "Associate permissions with a role - default", + "request": { + "urlPathTemplate": "/roles/{id}/permissions", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "23e27895-e8da-4c4d-bec9-94df0205eb5c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b94e86fc-05a4-43a3-a57f-ecd7e72ca50a", + "name": "Remove permissions from a role - default", + "request": { + "urlPathTemplate": "/roles/{id}/permissions", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b94e86fc-05a4-43a3-a57f-ecd7e72ca50a", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c87640fd-900b-400f-93f0-9ccb6702a609", + "name": "Get a role's users - default", + "request": { + "urlPathTemplate": "/roles/{id}/users", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c87640fd-900b-400f-93f0-9ccb6702a609", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f", + "name": "Assign users to a role - default", + "request": { + "urlPathTemplate": "/roles/{id}/users", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "f6173c4f-82c6-420c-a40d-889a713cb3e7", + "name": "Get custom text for a self-service profile - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}/custom-text/{language}/{page}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "language": { + "equalTo": "en" + }, + "page": { + "equalTo": "get-started" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "f6173c4f-82c6-420c-a40d-889a713cb3e7", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "52a78cce-bea7-4f10-be84-5b860989a20e", + "name": "Set custom text for a self-service profile - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}/custom-text/{language}/{page}", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "language": { + "equalTo": "en" + }, + "page": { + "equalTo": "get-started" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"key\": \"value\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "52a78cce-bea7-4f10-be84-5b860989a20e", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "47229b19-16ff-4ccd-8fd2-7f925b1743c4", + "name": "Create an SSO access ticket to initiate the Self Service SSO Flow - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{id}/sso-ticket", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"ticket\": \"ticket\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "47229b19-16ff-4ccd-8fd2-7f925b1743c4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "e406adeb-54e0-4218-9e0c-edbfbf0a64bf", + "name": "Revoke an SSO access ticket - default", + "request": { + "urlPathTemplate": "/self-service-profiles/{profileId}/sso-ticket/{id}/revoke", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "profileId": { + "equalTo": "profileId" + }, + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "e406adeb-54e0-4218-9e0c-edbfbf0a64bf", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "12199f5c-a53a-4405-8a5f-a83867b89865", + "name": "Get tenant settings - default", + "request": { + "urlPathTemplate": "/tenants/settings", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "12199f5c-a53a-4405-8a5f-a83867b89865", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "48a056e4-f2d6-45a2-9b0a-3b7d173c8597", + "name": "Update tenant settings - default", + "request": { + "urlPathTemplate": "/tenants/settings", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "48a056e4-f2d6-45a2-9b0a-3b7d173c8597", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5", + "name": "Get a list of authentication methods - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"authenticators\": [\n {\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a786d309-f573-4722-9c1a-4336dcb2ca34", + "name": "Creates an authentication method for a given user - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a786d309-f573-4722-9c1a-4336dcb2ca34", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "de90147a-4c08-43b0-9e64-3c7afab7fe48", + "name": "Update all authentication methods by replacing them with the given ones - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods", + "method": "PUT", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "de90147a-4c08-43b0-9e64-3c7afab7fe48", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0fd546c5-9e1f-4319-b6f2-9ee49c498250", + "name": "Delete all authentication methods for the given user - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0fd546c5-9e1f-4319-b6f2-9ee49c498250", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03", + "name": "Get an authentication method by ID - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods/{authentication_method_id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "authentication_method_id": { + "equalTo": "authentication_method_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "add53361-2a24-44ea-93fe-fd31b9981468", + "name": "Delete an authentication method by ID - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods/{authentication_method_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "authentication_method_id": { + "equalTo": "authentication_method_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "add53361-2a24-44ea-93fe-fd31b9981468", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1cfc820b-23ae-4b7b-8b10-d9e1c2825e51", + "name": "Update an authentication method - default", + "request": { + "urlPathTemplate": "/users/{id}/authentication-methods/{authentication_method_id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "authentication_method_id": { + "equalTo": "authentication_method_id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1cfc820b-23ae-4b7b-8b10-d9e1c2825e51", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "59e259ee-3764-496e-9875-949a218233be", + "name": "Delete All Authenticators - default", + "request": { + "urlPathTemplate": "/users/{id}/authenticators", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "59e259ee-3764-496e-9875-949a218233be", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16", + "name": "Get a User's Connected Accounts - default", + "request": { + "urlPathTemplate": "/users/{id}/connected-accounts", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"connected_accounts\": [\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"strategy\": \"strategy\",\n \"access_type\": \"offline\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b12cc020-548e-4219-bf5f-7896e003fa92", + "name": "Get the First Confirmed Multi-factor Authentication (MFA) Enrollment - default", + "request": { + "urlPathTemplate": "/users/{id}/enrollments", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"status\": \"pending\",\n \"type\": \"type\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"auth_method\": \"authenticator\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth\": \"2024-01-15T09:30:00Z\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b12cc020-548e-4219-bf5f-7896e003fa92", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7df16d6a-51ec-415e-a605-f161474b5a60", + "name": "Get tokensets for a user - default", + "request": { + "urlPathTemplate": "/users/{id}/federated-connections-tokensets", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"scope\": \"scope\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"issued_at\": \"2024-01-15T09:30:00Z\",\n \"last_used_at\": \"2024-01-15T09:30:00Z\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7df16d6a-51ec-415e-a605-f161474b5a60", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93", + "name": "Deletes a tokenset for federated connections by id. - default", + "request": { + "urlPathTemplate": "/users/{id}/federated-connections-tokensets/{tokenset_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "tokenset_id": { + "equalTo": "tokenset_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee", + "name": "Get user's groups - default", + "request": { + "urlPathTemplate": "/users/{id}/groups", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "fields": { + "equalTo": "fields" + }, + "include_fields": { + "equalTo": "true" + }, + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"tenant_name\": \"tenant_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"membership_created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0333210f-005f-4731-9928-1487697620ba", + "name": "Link a User Account - default", + "request": { + "urlPathTemplate": "/users/{id}/identities", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 201, + "body": "[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n },\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0333210f-005f-4731-9928-1487697620ba", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c", + "name": "Unlink a User Identity - default", + "request": { + "urlPathTemplate": "/users/{id}/identities/{provider}/{user_id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "provider": { + "equalTo": "ad" + }, + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n }\n }\n]", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bb12a5f2-c0fc-41b9-874a-4d0b151ca508", + "name": "Get user's log events - default", + "request": { + "urlPathTemplate": "/users/{id}/logs", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "sort": { + "equalTo": "sort" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bb12a5f2-c0fc-41b9-874a-4d0b151ca508", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "b4ab10fb-07fa-43d6-97f0-2f777308b563", + "name": "Invalidate All Remembered Browsers for Multi-factor Authentication (MFA) - default", + "request": { + "urlPathTemplate": "/users/{id}/multifactor/actions/invalidate-remember-browser", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "b4ab10fb-07fa-43d6-97f0-2f777308b563", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "86847e95-c858-46df-b005-c0f0392ae95c", + "name": "Delete a User's Multi-factor Provider - default", + "request": { + "urlPathTemplate": "/users/{id}/multifactor/{provider}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + }, + "provider": { + "equalTo": "duo" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "86847e95-c858-46df-b005-c0f0392ae95c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "3a825384-1ed6-44a5-9a15-b2be0438a1d6", + "name": "List user's organizations - default", + "request": { + "urlPathTemplate": "/users/{id}/organizations", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "page": { + "equalTo": "1" + }, + "per_page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "3a825384-1ed6-44a5-9a15-b2be0438a1d6", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "58cc0983-45ee-47d2-8a5c-b6e215c83942", + "name": "Get a User's Permissions - default", + "request": { + "urlPathTemplate": "/users/{id}/permissions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "per_page": { + "equalTo": "1" + }, + "page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "58cc0983-45ee-47d2-8a5c-b6e215c83942", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "812e845d-b47e-41b3-ad6b-edf602577cc4", + "name": "Assign Permissions to a User - default", + "request": { + "urlPathTemplate": "/users/{id}/permissions", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "812e845d-b47e-41b3-ad6b-edf602577cc4", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "6829e581-25db-4d58-99ad-1fd675c362f1", + "name": "Remove Permissions from a User - default", + "request": { + "urlPathTemplate": "/users/{id}/permissions", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "6829e581-25db-4d58-99ad-1fd675c362f1", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0bf944f2-8c7e-474c-82eb-9e21bb625219", + "name": "Clear risk assessment assessors for a specific user - default", + "request": { + "urlPathTemplate": "/users/{id}/risk-assessments/clear", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0bf944f2-8c7e-474c-82eb-9e21bb625219", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "96a14af0-6c21-49ec-af86-512e672dd464", + "name": "Get a user's roles - default", + "request": { + "urlPathTemplate": "/users/{id}/roles", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + }, + "queryParameters": { + "per_page": { + "equalTo": "1" + }, + "page": { + "equalTo": "1" + }, + "include_totals": { + "equalTo": "true" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "96a14af0-6c21-49ec-af86-512e672dd464", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "fcc9270b-77f1-4374-b64e-ce2381665996", + "name": "Assign roles to a user - default", + "request": { + "urlPathTemplate": "/users/{id}/roles", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "fcc9270b-77f1-4374-b64e-ce2381665996", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "c727015f-123f-4f98-9b24-25828361a4ab", + "name": "Removes roles from a user - default", + "request": { + "urlPathTemplate": "/users/{id}/roles", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "c727015f-123f-4f98-9b24-25828361a4ab", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "28b46c14-5cc3-42ad-8808-0072fb3249ba", + "name": "Get refresh tokens for a user - default", + "request": { + "urlPathTemplate": "/users/{user_id}/refresh-tokens", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "user_id": { + "equalTo": "user_id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "28b46c14-5cc3-42ad-8808-0072fb3249ba", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "1f25d8aa-36f6-4ba8-9865-27c99731105f", + "name": "Delete refresh tokens for a user - default", + "request": { + "urlPathTemplate": "/users/{user_id}/refresh-tokens", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "1f25d8aa-36f6-4ba8-9865-27c99731105f", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "dd1c4072-54e4-4dbc-82d9-ca1c27916f1d", + "name": "Get sessions for user - default", + "request": { + "urlPathTemplate": "/users/{user_id}/sessions", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "user_id": { + "equalTo": "user_id" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"sessions\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"clients\": [\n {}\n ],\n \"session_metadata\": {\n \"key\": \"value\"\n }\n }\n ],\n \"next\": \"next\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "dd1c4072-54e4-4dbc-82d9-ca1c27916f1d", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "0691684c-d746-4411-aa18-4de52a90a463", + "name": "Delete sessions for user - default", + "request": { + "urlPathTemplate": "/users/{user_id}/sessions", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "user_id": { + "equalTo": "user_id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "0691684c-d746-4411-aa18-4de52a90a463", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "7424dc01-51cd-4cc9-b47d-082a7931e487", + "name": "List verifiable credentials template for tenant. - default", + "request": { + "urlPathTemplate": "/verifiable-credentials/verification/templates", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "queryParameters": { + "from": { + "equalTo": "from" + }, + "take": { + "equalTo": "1" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"next\": \"next\",\n \"templates\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "7424dc01-51cd-4cc9-b47d-082a7931e487", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + }, + "postServeActions": [] + }, + { + "id": "65b53386-72a6-4ac3-afba-c41377b10e93", + "name": "Create a verifiable credential template. - default", + "request": { + "urlPathTemplate": "/verifiable-credentials/verification/templates", + "method": "POST", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + } + }, + "response": { + "status": 201, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "65b53386-72a6-4ac3-afba-c41377b10e93", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "bac80375-0249-4659-a3d4-3cad535b4a20", + "name": "Get a verifiable credential template by ID. - default", + "request": { + "urlPathTemplate": "/verifiable-credentials/verification/templates/{id}", + "method": "GET", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "bac80375-0249-4659-a3d4-3cad535b4a20", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c", + "name": "Delete a verifiable credential template by ID. - default", + "request": { + "urlPathTemplate": "/verifiable-credentials/verification/templates/{id}", + "method": "DELETE", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "\"\"", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + }, + { + "id": "9934fba5-6f64-4698-89dd-6123d0878561", + "name": "Update a verifiable credential template by ID. - default", + "request": { + "urlPathTemplate": "/verifiable-credentials/verification/templates/{id}", + "method": "PATCH", + "headers": { + "Authorization": { + "matches": "Bearer .+" + } + }, + "pathParameters": { + "id": { + "equalTo": "id" + } + } + }, + "response": { + "status": 200, + "body": "{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}", + "headers": { + "Content-Type": "application/json" + } + }, + "uuid": "9934fba5-6f64-4698-89dd-6123d0878561", + "persistent": true, + "priority": 3, + "metadata": { + "mocklab": { + "created": { + "at": "2020-01-01T00:00:00.000Z", + "via": "SYSTEM" + } + } + } + } + ], + "meta": { + "total": 402 + } +} \ No newline at end of file