From 1a16ddfa727e9a17494e220f0315814dcb88e8af Mon Sep 17 00:00:00 2001 From: Mridang Agarwalla Date: Thu, 17 Apr 2025 16:18:11 +0300 Subject: [PATCH 1/6] Introduced formatting and linting for the library --- .github/workflows/linting.yml | 52 + poetry.lock | 1242 ++++++------ pyproject.toml | 14 + spec/conftest.py | 4 +- ..._client_credentials_authentication_spec.py | 48 +- ...rsonal_access_token_authentication_spec.py | 44 +- ...est_using_web_token_authentication_spec.py | 16 +- .../test_client_credentials_authenticator.py | 57 +- test/auth/test_no_auth_authenticator.py | 18 +- test/auth/test_oauth_authenticator.py | 54 +- .../test_personal_access_authenticator.py | 16 +- test/auth/test_web_token_authenticator.py | 39 +- test/test_api_client.py | 62 +- test/test_configuration.py | 23 +- test/test_zitadel.py | 43 +- zitadel_client/__init__.py | 14 +- zitadel_client/api/feature_service_api.py | 452 +++-- .../api/identity_provider_service_api.py | 40 +- zitadel_client/api/oidc_service_api.py | 77 +- .../api/organization_service_api.py | 95 +- zitadel_client/api/session_service_api.py | 220 +-- zitadel_client/api/settings_api.py | 80 +- zitadel_client/api/settings_service_api.py | 353 ++-- zitadel_client/api/user_service_api.py | 1760 +++++++++-------- zitadel_client/api_client.py | 1292 ++++++------ zitadel_client/api_response.py | 22 +- zitadel_client/auth/authenticator.py | 97 +- .../auth/client_credentials_authenticator.py | 139 +- zitadel_client/auth/no_auth_authenticator.py | 34 +- zitadel_client/auth/oauth_authenticator.py | 162 +- zitadel_client/auth/open_id.py | 95 +- .../personal_access_token_authenticator.py | 26 +- .../auth/web_token_authenticator.py | 347 ++-- zitadel_client/configuration.py | 373 ++-- zitadel_client/exceptions.py | 317 +-- .../models/add_organization_request_admin.py | 12 +- ...add_organization_response_created_admin.py | 7 +- .../models/objectv2_list_details.py | 9 +- zitadel_client/models/objectv2_list_query.py | 7 +- .../oidc_service_create_callback_body.py | 14 +- zitadel_client/models/otp_email_send_code.py | 10 +- zitadel_client/models/protobuf_any.py | 7 +- .../models/request_challenges_otp_email.py | 12 +- .../models/request_challenges_otpsms.py | 7 +- zitadel_client/models/rpc_status.py | 12 +- .../session_service_delete_session_body.py | 9 +- .../session_service_set_session_body.py | 23 +- .../models/user_agent_header_values.py | 7 +- .../models/user_service_add_idp_link_body.py | 12 +- .../user_service_create_invite_code_body.py | 12 +- ...e_create_passkey_registration_link_body.py | 14 +- .../user_service_list_idp_links_body.py | 12 +- .../user_service_password_reset_body.py | 12 +- .../user_service_register_passkey_body.py | 14 +- .../models/user_service_register_u2_f_body.py | 9 +- .../user_service_resend_email_code_body.py | 14 +- .../user_service_resend_phone_code_body.py | 7 +- ..._retrieve_identity_provider_intent_body.py | 10 +- .../user_service_send_email_code_body.py | 14 +- .../models/user_service_set_email_body.py | 17 +- .../models/user_service_set_phone_body.py | 10 +- .../user_service_update_human_user_body.py | 19 +- .../models/user_service_verify_email_body.py | 12 +- .../user_service_verify_invite_code_body.py | 12 +- ...ervice_verify_passkey_registration_body.py | 10 +- .../models/user_service_verify_phone_body.py | 12 +- ...r_service_verify_totp_registration_body.py | 7 +- ...r_service_verify_u2_f_registration_body.py | 10 +- zitadel_client/models/userv2_set_password.py | 17 +- zitadel_client/models/userv2_type.py | 8 +- zitadel_client/models/v2_access_token_type.py | 6 +- .../models/v2_add_human_user_request.py | 31 +- .../models/v2_add_human_user_request1.py | 27 +- .../models/v2_add_human_user_response.py | 12 +- .../models/v2_add_idp_link_response.py | 12 +- .../models/v2_add_organization_request.py | 17 +- .../models/v2_add_organization_response.py | 18 +- .../models/v2_add_otp_email_response.py | 12 +- .../models/v2_add_otpsms_response.py | 12 +- zitadel_client/models/v2_and_query.py | 10 +- zitadel_client/models/v2_apple_config.py | 7 +- zitadel_client/models/v2_auth_factor.py | 12 +- zitadel_client/models/v2_auth_factor_state.py | 10 +- zitadel_client/models/v2_auth_factor_u2_f.py | 7 +- zitadel_client/models/v2_auth_request.py | 12 +- .../models/v2_authentication_method_type.py | 18 +- .../models/v2_authorization_error.py | 10 +- .../models/v2_auto_linking_option.py | 8 +- zitadel_client/models/v2_azure_ad_config.py | 12 +- zitadel_client/models/v2_azure_ad_tenant.py | 10 +- .../models/v2_azure_ad_tenant_type.py | 8 +- zitadel_client/models/v2_branding_settings.py | 16 +- zitadel_client/models/v2_challenges.py | 12 +- .../models/v2_challenges_web_auth_n.py | 7 +- zitadel_client/models/v2_check_idp_intent.py | 10 +- zitadel_client/models/v2_check_otp.py | 10 +- zitadel_client/models/v2_check_password.py | 10 +- zitadel_client/models/v2_check_totp.py | 10 +- zitadel_client/models/v2_check_user.py | 10 +- zitadel_client/models/v2_check_web_auth_n.py | 7 +- zitadel_client/models/v2_checks.py | 24 +- .../models/v2_create_callback_response.py | 14 +- .../models/v2_create_invite_code_response.py | 12 +- ...eate_passkey_registration_link_response.py | 14 +- .../models/v2_create_session_request.py | 23 +- .../models/v2_create_session_response.py | 18 +- .../models/v2_creation_date_query.py | 14 +- zitadel_client/models/v2_creator_query.py | 10 +- .../models/v2_deactivate_user_response.py | 12 +- .../models/v2_delete_session_response.py | 12 +- .../models/v2_delete_user_response.py | 12 +- zitadel_client/models/v2_details.py | 9 +- .../models/v2_display_name_query.py | 11 +- zitadel_client/models/v2_domain_settings.py | 10 +- zitadel_client/models/v2_email_query.py | 11 +- .../models/v2_embedded_iframe_settings.py | 7 +- zitadel_client/models/v2_error_reason.py | 36 +- zitadel_client/models/v2_factors.py | 24 +- zitadel_client/models/v2_feature_flag.py | 10 +- zitadel_client/models/v2_first_name_query.py | 11 +- zitadel_client/models/v2_gender.py | 10 +- .../models/v2_generic_oidc_config.py | 7 +- ..._get_active_identity_providers_response.py | 14 +- .../models/v2_get_auth_request_response.py | 12 +- .../v2_get_branding_settings_response.py | 14 +- .../models/v2_get_domain_settings_response.py | 14 +- .../v2_get_general_settings_response.py | 7 +- .../models/v2_get_idpby_id_response.py | 12 +- .../v2_get_instance_features_response.py | 44 +- ...get_legal_and_support_settings_response.py | 18 +- .../v2_get_lockout_settings_response.py | 14 +- .../models/v2_get_login_settings_response.py | 14 +- .../v2_get_organization_features_response.py | 12 +- ...t_password_complexity_settings_response.py | 18 +- ...2_get_password_expiry_settings_response.py | 14 +- .../v2_get_security_settings_response.py | 14 +- .../models/v2_get_session_response.py | 12 +- .../models/v2_get_system_features_response.py | 40 +- .../models/v2_get_user_by_id_response.py | 14 +- .../models/v2_get_user_features_response.py | 12 +- zitadel_client/models/v2_git_hub_config.py | 7 +- .../v2_git_hub_enterprise_server_config.py | 7 +- zitadel_client/models/v2_git_lab_config.py | 7 +- .../models/v2_git_lab_self_hosted_config.py | 7 +- zitadel_client/models/v2_google_config.py | 7 +- zitadel_client/models/v2_hashed_password.py | 12 +- zitadel_client/models/v2_human_email.py | 10 +- .../v2_human_mfa_init_skipped_response.py | 12 +- zitadel_client/models/v2_human_phone.py | 10 +- zitadel_client/models/v2_human_profile.py | 11 +- zitadel_client/models/v2_human_user.py | 18 +- zitadel_client/models/v2_identity_provider.py | 12 +- .../models/v2_identity_provider_type.py | 28 +- zitadel_client/models/v2_idp.py | 14 +- zitadel_client/models/v2_idp_config.py | 40 +- zitadel_client/models/v2_idp_information.py | 26 +- zitadel_client/models/v2_idp_intent.py | 10 +- zitadel_client/models/v2_idp_link.py | 10 +- zitadel_client/models/v2_idp_state.py | 12 +- zitadel_client/models/v2_idp_type.py | 28 +- .../models/v2_idpldap_access_information.py | 7 +- .../models/v2_idpo_auth_access_information.py | 7 +- .../models/v2_idpsaml_access_information.py | 12 +- zitadel_client/models/v2_ids_query.py | 7 +- .../models/v2_improved_performance.py | 14 +- .../v2_improved_performance_feature_flag.py | 10 +- .../models/v2_in_user_emails_query.py | 7 +- zitadel_client/models/v2_in_user_id_query.py | 7 +- zitadel_client/models/v2_intent_factor.py | 11 +- zitadel_client/models/v2_jwt_config.py | 7 +- zitadel_client/models/v2_last_name_query.py | 11 +- zitadel_client/models/v2_ldap_attributes.py | 7 +- zitadel_client/models/v2_ldap_config.py | 12 +- zitadel_client/models/v2_ldap_credentials.py | 10 +- .../models/v2_legal_and_support_settings.py | 10 +- ...v2_list_authentication_factors_response.py | 12 +- ...st_authentication_method_types_response.py | 16 +- zitadel_client/models/v2_list_details.py | 9 +- .../models/v2_list_idp_links_response.py | 14 +- .../models/v2_list_organizations_request.py | 14 +- .../models/v2_list_organizations_response.py | 14 +- .../models/v2_list_passkeys_response.py | 14 +- zitadel_client/models/v2_list_query.py | 7 +- .../models/v2_list_sessions_request.py | 14 +- .../models/v2_list_sessions_response.py | 14 +- .../models/v2_list_users_request.py | 14 +- .../models/v2_list_users_response.py | 14 +- .../models/v2_lock_user_response.py | 12 +- zitadel_client/models/v2_lockout_settings.py | 10 +- zitadel_client/models/v2_login_name_query.py | 11 +- zitadel_client/models/v2_login_settings.py | 10 +- zitadel_client/models/v2_login_v2.py | 7 +- .../models/v2_login_v2_feature_flag.py | 10 +- zitadel_client/models/v2_machine_user.py | 10 +- zitadel_client/models/v2_multi_factor_type.py | 6 +- zitadel_client/models/v2_nick_name_query.py | 11 +- zitadel_client/models/v2_not_query.py | 10 +- zitadel_client/models/v2_notification_type.py | 8 +- zitadel_client/models/v2_o_auth_config.py | 7 +- zitadel_client/models/v2_or_query.py | 10 +- zitadel_client/models/v2_organization.py | 7 +- .../models/v2_organization_domain_query.py | 11 +- .../models/v2_organization_field_name.py | 6 +- .../models/v2_organization_id_query.py | 10 +- .../models/v2_organization_name_query.py | 11 +- .../models/v2_organization_state.py | 10 +- .../models/v2_organization_state_query.py | 10 +- zitadel_client/models/v2_otp_factor.py | 11 +- zitadel_client/models/v2_passkey.py | 11 +- .../models/v2_passkey_authenticator.py | 8 +- .../models/v2_passkey_registration_code.py | 14 +- zitadel_client/models/v2_passkeys_type.py | 6 +- zitadel_client/models/v2_password.py | 10 +- .../models/v2_password_complexity_settings.py | 12 +- .../models/v2_password_expiry_settings.py | 10 +- zitadel_client/models/v2_password_factor.py | 11 +- .../models/v2_password_reset_response.py | 12 +- zitadel_client/models/v2_phone_query.py | 11 +- zitadel_client/models/v2_prompt.py | 14 +- .../models/v2_reactivate_user_response.py | 12 +- zitadel_client/models/v2_redirect_urls.py | 10 +- .../models/v2_register_passkey_response.py | 12 +- .../models/v2_register_totp_response.py | 12 +- .../models/v2_register_u2_f_response.py | 12 +- .../models/v2_remove_idp_link_response.py | 12 +- .../models/v2_remove_otp_email_response.py | 12 +- .../models/v2_remove_otpsms_response.py | 12 +- .../models/v2_remove_passkey_response.py | 12 +- .../models/v2_remove_phone_response.py | 12 +- .../models/v2_remove_totp_response.py | 12 +- .../models/v2_remove_u2_f_response.py | 12 +- .../models/v2_request_challenges.py | 20 +- .../v2_request_challenges_web_auth_n.py | 14 +- .../models/v2_resend_email_code_response.py | 12 +- .../models/v2_resend_invite_code_response.py | 12 +- .../models/v2_resend_phone_code_response.py | 12 +- .../v2_reset_instance_features_response.py | 12 +- ...v2_reset_organization_features_response.py | 12 +- .../v2_reset_system_features_response.py | 12 +- .../models/v2_reset_user_features_response.py | 12 +- .../models/v2_resource_owner_type.py | 8 +- ...rieve_identity_provider_intent_response.py | 14 +- zitadel_client/models/v2_saml_binding.py | 10 +- zitadel_client/models/v2_saml_config.py | 22 +- .../models/v2_saml_name_id_format.py | 10 +- zitadel_client/models/v2_search_query.py | 20 +- zitadel_client/models/v2_search_query1.py | 43 +- .../models/v2_second_factor_type.py | 12 +- zitadel_client/models/v2_security_settings.py | 12 +- .../models/v2_send_email_code_response.py | 12 +- .../models/v2_send_email_verification_code.py | 10 +- zitadel_client/models/v2_send_invite_code.py | 10 +- .../v2_send_passkey_registration_link.py | 10 +- .../models/v2_send_password_reset_link.py | 11 +- zitadel_client/models/v2_session.py | 10 +- zitadel_client/models/v2_session1.py | 31 +- .../models/v2_session_field_name.py | 6 +- .../models/v2_set_email_response.py | 12 +- zitadel_client/models/v2_set_human_email.py | 17 +- zitadel_client/models/v2_set_human_email1.py | 17 +- zitadel_client/models/v2_set_human_phone.py | 10 +- zitadel_client/models/v2_set_human_phone1.py | 10 +- zitadel_client/models/v2_set_human_profile.py | 11 +- .../models/v2_set_human_profile1.py | 11 +- .../v2_set_instance_features_request.py | 12 +- .../v2_set_instance_features_response.py | 12 +- .../models/v2_set_metadata_entry.py | 12 +- .../models/v2_set_metadata_entry1.py | 12 +- .../v2_set_organization_features_response.py | 12 +- .../models/v2_set_password_response.py | 12 +- .../models/v2_set_phone_response.py | 12 +- .../v2_set_security_settings_request.py | 12 +- .../v2_set_security_settings_response.py | 12 +- .../models/v2_set_session_response.py | 16 +- .../models/v2_set_system_features_request.py | 12 +- .../models/v2_set_system_features_response.py | 12 +- .../models/v2_set_user_features_response.py | 12 +- zitadel_client/models/v2_source.py | 16 +- ..._start_identity_provider_intent_request.py | 15 +- ...start_identity_provider_intent_response.py | 17 +- zitadel_client/models/v2_state_query.py | 10 +- zitadel_client/models/v2_text_query_method.py | 18 +- zitadel_client/models/v2_theme.py | 7 +- zitadel_client/models/v2_theme_mode.py | 10 +- zitadel_client/models/v2_totp_factor.py | 11 +- zitadel_client/models/v2_type_query.py | 10 +- .../models/v2_unlock_user_response.py | 12 +- .../models/v2_update_human_user_response.py | 12 +- zitadel_client/models/v2_user.py | 16 +- zitadel_client/models/v2_user_agent.py | 12 +- zitadel_client/models/v2_user_agent_query.py | 10 +- zitadel_client/models/v2_user_factor.py | 19 +- zitadel_client/models/v2_user_field_name.py | 22 +- zitadel_client/models/v2_user_id_query.py | 7 +- zitadel_client/models/v2_user_name_query.py | 11 +- .../v2_user_service_set_password_body.py | 15 +- zitadel_client/models/v2_user_state.py | 14 +- .../v2_user_verification_requirement.py | 10 +- .../models/v2_verify_email_response.py | 12 +- .../models/v2_verify_invite_code_response.py | 12 +- ...v2_verify_passkey_registration_response.py | 12 +- .../models/v2_verify_phone_response.py | 12 +- .../v2_verify_totp_registration_response.py | 12 +- .../v2_verify_u2_f_registration_response.py | 12 +- zitadel_client/models/v2_web_auth_n_factor.py | 11 +- zitadel_client/models/zitadelidpv2_options.py | 10 +- .../models/zitadelidpv2_options1.py | 10 +- .../models/zitadelobjectv2_organization.py | 7 +- .../models/zitadelorgv2_organization.py | 12 +- .../models/zitadelorgv2_search_query.py | 18 +- .../zitadelv1_timestamp_query_method.py | 12 +- zitadel_client/rest.py | 352 ++-- zitadel_client/rest_response.py | 34 +- zitadel_client/utils/url_util.py | 22 +- zitadel_client/version.py | 2 +- zitadel_client/zitadel.py | 143 +- 316 files changed, 6285 insertions(+), 5453 deletions(-) create mode 100644 .github/workflows/linting.yml diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml new file mode 100644 index 00000000..a0c8f80f --- /dev/null +++ b/.github/workflows/linting.yml @@ -0,0 +1,52 @@ +name: Linting + +on: + push: + branches: + - main + pull_request: + +permissions: + contents: write + +defaults: + run: + working-directory: ./ + +jobs: + lint-format: + runs-on: ubuntu-latest + name: Reformat Code + + steps: + - name: Checkout code + uses: actions/checkout@v4 + with: + ref: ${{ github.event_name == 'pull_request' && github.event.pull_request.head.sha || github.ref }} + fetch-depth: 0 + + - name: Install poetry + run: | + pipx install poetry + + - name: Setup Python + uses: actions/setup-python@v5 + with: + python-version-file: 'pyproject.toml' + cache: 'poetry' + + - name: Install Dependencies + run: poetry install --no-interaction --sync --all-extras + + - name: Run Formatter + run: poetry run ruff format . + + - name: Commit Changes + uses: stefanzweifel/git-auto-commit-action@v5 + with: + commit_message: 'style: Apply automated code formatting [skip ci]' + commit_options: '--no-verify' + repository: . + commit_user_name: github-actions[bot] + commit_user_email: github-actions[bot]@users.noreply.github.com + commit_author: github-actions[bot] diff --git a/poetry.lock b/poetry.lock index 38c9ea55..07c64782 100644 --- a/poetry.lock +++ b/poetry.lock @@ -8,12 +8,12 @@ optional = false python-versions = ">=3.8" groups = ["main"] files = [ - { file = "annotated_types-0.7.0-py3-none-any.whl", hash = "sha256:1f02e8b43a8fbbc3f3e0d4f0f4bfc8131bcb4eebe8849b8e5c773f3a1c582a53" }, - { file = "annotated_types-0.7.0.tar.gz", hash = "sha256:aff07c09a53a08bc8cfccb9c85b05f1aa9a2a6f23728d790723543408344ce89" }, + {file = "annotated_types-0.7.0-py3-none-any.whl", hash = "sha256:1f02e8b43a8fbbc3f3e0d4f0f4bfc8131bcb4eebe8849b8e5c773f3a1c582a53"}, + {file = "annotated_types-0.7.0.tar.gz", hash = "sha256:aff07c09a53a08bc8cfccb9c85b05f1aa9a2a6f23728d790723543408344ce89"}, ] [package.dependencies] -typing-extensions = { version = ">=4.0.0", markers = "python_version < \"3.9\"" } +typing-extensions = {version = ">=4.0.0", markers = "python_version < \"3.9\""} [[package]] name = "authlib" @@ -23,8 +23,8 @@ optional = false python-versions = ">=3.8" groups = ["main"] files = [ - { file = "Authlib-1.3.2-py2.py3-none-any.whl", hash = "sha256:ede026a95e9f5cdc2d4364a52103f5405e75aa156357e831ef2bfd0bc5094dfc" }, - { file = "authlib-1.3.2.tar.gz", hash = "sha256:4b16130117f9eb82aa6eec97f6dd4673c3f960ac0283ccdae2897ee4bc030ba2" }, + {file = "Authlib-1.3.2-py2.py3-none-any.whl", hash = "sha256:ede026a95e9f5cdc2d4364a52103f5405e75aa156357e831ef2bfd0bc5094dfc"}, + {file = "authlib-1.3.2.tar.gz", hash = "sha256:4b16130117f9eb82aa6eec97f6dd4673c3f960ac0283ccdae2897ee4bc030ba2"}, ] [package.dependencies] @@ -38,8 +38,8 @@ optional = false python-versions = ">=3.7" groups = ["dev"] files = [ - { file = "cachetools-5.5.2-py3-none-any.whl", hash = "sha256:d26a22bcc62eb95c3beabd9f1ee5e820d3d2704fe2967cbe350e20c8ffcd3f0a" }, - { file = "cachetools-5.5.2.tar.gz", hash = "sha256:1a661caa9175d26759571b2e19580f9d6393969e5dfca11fdb1f947a23e640d4" }, + {file = "cachetools-5.5.2-py3-none-any.whl", hash = "sha256:d26a22bcc62eb95c3beabd9f1ee5e820d3d2704fe2967cbe350e20c8ffcd3f0a"}, + {file = "cachetools-5.5.2.tar.gz", hash = "sha256:1a661caa9175d26759571b2e19580f9d6393969e5dfca11fdb1f947a23e640d4"}, ] [[package]] @@ -50,8 +50,8 @@ optional = false python-versions = ">=3.6" groups = ["dev"] files = [ - { file = "certifi-2025.1.31-py3-none-any.whl", hash = "sha256:ca78db4565a652026a4db2bcdf68f2fb589ea80d0be70e03929ed730746b84fe" }, - { file = "certifi-2025.1.31.tar.gz", hash = "sha256:3d5da6925056f6f18f119200434a4780a94263f10d1c21d032a6f6b2baa20651" }, + {file = "certifi-2025.1.31-py3-none-any.whl", hash = "sha256:ca78db4565a652026a4db2bcdf68f2fb589ea80d0be70e03929ed730746b84fe"}, + {file = "certifi-2025.1.31.tar.gz", hash = "sha256:3d5da6925056f6f18f119200434a4780a94263f10d1c21d032a6f6b2baa20651"}, ] [[package]] @@ -63,73 +63,73 @@ python-versions = ">=3.8" groups = ["main"] markers = "platform_python_implementation != \"PyPy\"" files = [ - { file = "cffi-1.17.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:df8b1c11f177bc2313ec4b2d46baec87a5f3e71fc8b45dab2ee7cae86d9aba14" }, - { file = "cffi-1.17.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:8f2cdc858323644ab277e9bb925ad72ae0e67f69e804f4898c070998d50b1a67" }, - { file = "cffi-1.17.1-cp310-cp310-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:edae79245293e15384b51f88b00613ba9f7198016a5948b5dddf4917d4d26382" }, - { file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:45398b671ac6d70e67da8e4224a065cec6a93541bb7aebe1b198a61b58c7b702" }, - { file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:ad9413ccdeda48c5afdae7e4fa2192157e991ff761e7ab8fdd8926f40b160cc3" }, - { file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:5da5719280082ac6bd9aa7becb3938dc9f9cbd57fac7d2871717b1feb0902ab6" }, - { file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2bb1a08b8008b281856e5971307cc386a8e9c5b625ac297e853d36da6efe9c17" }, - { file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:045d61c734659cc045141be4bae381a41d89b741f795af1dd018bfb532fd0df8" }, - { file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:6883e737d7d9e4899a8a695e00ec36bd4e5e4f18fabe0aca0efe0a4b44cdb13e" }, - { file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:6b8b4a92e1c65048ff98cfe1f735ef8f1ceb72e3d5f0c25fdb12087a23da22be" }, - { file = "cffi-1.17.1-cp310-cp310-win32.whl", hash = "sha256:c9c3d058ebabb74db66e431095118094d06abf53284d9c81f27300d0e0d8bc7c" }, - { file = "cffi-1.17.1-cp310-cp310-win_amd64.whl", hash = "sha256:0f048dcf80db46f0098ccac01132761580d28e28bc0f78ae0d58048063317e15" }, - { file = "cffi-1.17.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:a45e3c6913c5b87b3ff120dcdc03f6131fa0065027d0ed7ee6190736a74cd401" }, - { file = "cffi-1.17.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:30c5e0cb5ae493c04c8b42916e52ca38079f1b235c2f8ae5f4527b963c401caf" }, - { file = "cffi-1.17.1-cp311-cp311-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f75c7ab1f9e4aca5414ed4d8e5c0e303a34f4421f8a0d47a4d019ceff0ab6af4" }, - { file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a1ed2dd2972641495a3ec98445e09766f077aee98a1c896dcb4ad0d303628e41" }, - { file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:46bf43160c1a35f7ec506d254e5c890f3c03648a4dbac12d624e4490a7046cd1" }, - { file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:a24ed04c8ffd54b0729c07cee15a81d964e6fee0e3d4d342a27b020d22959dc6" }, - { file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:610faea79c43e44c71e1ec53a554553fa22321b65fae24889706c0a84d4ad86d" }, - { file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:a9b15d491f3ad5d692e11f6b71f7857e7835eb677955c00cc0aefcd0669adaf6" }, - { file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:de2ea4b5833625383e464549fec1bc395c1bdeeb5f25c4a3a82b5a8c756ec22f" }, - { file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:fc48c783f9c87e60831201f2cce7f3b2e4846bf4d8728eabe54d60700b318a0b" }, - { file = "cffi-1.17.1-cp311-cp311-win32.whl", hash = "sha256:85a950a4ac9c359340d5963966e3e0a94a676bd6245a4b55bc43949eee26a655" }, - { file = "cffi-1.17.1-cp311-cp311-win_amd64.whl", hash = "sha256:caaf0640ef5f5517f49bc275eca1406b0ffa6aa184892812030f04c2abf589a0" }, - { file = "cffi-1.17.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:805b4371bf7197c329fcb3ead37e710d1bca9da5d583f5073b799d5c5bd1eee4" }, - { file = "cffi-1.17.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:733e99bc2df47476e3848417c5a4540522f234dfd4ef3ab7fafdf555b082ec0c" }, - { file = "cffi-1.17.1-cp312-cp312-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1257bdabf294dceb59f5e70c64a3e2f462c30c7ad68092d01bbbfb1c16b1ba36" }, - { file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:da95af8214998d77a98cc14e3a3bd00aa191526343078b530ceb0bd710fb48a5" }, - { file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:d63afe322132c194cf832bfec0dc69a99fb9bb6bbd550f161a49e9e855cc78ff" }, - { file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:f79fc4fc25f1c8698ff97788206bb3c2598949bfe0fef03d299eb1b5356ada99" }, - { file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b62ce867176a75d03a665bad002af8e6d54644fad99a3c70905c543130e39d93" }, - { file = "cffi-1.17.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:386c8bf53c502fff58903061338ce4f4950cbdcb23e2902d86c0f722b786bbe3" }, - { file = "cffi-1.17.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:4ceb10419a9adf4460ea14cfd6bc43d08701f0835e979bf821052f1805850fe8" }, - { file = "cffi-1.17.1-cp312-cp312-win32.whl", hash = "sha256:a08d7e755f8ed21095a310a693525137cfe756ce62d066e53f502a83dc550f65" }, - { file = "cffi-1.17.1-cp312-cp312-win_amd64.whl", hash = "sha256:51392eae71afec0d0c8fb1a53b204dbb3bcabcb3c9b807eedf3e1e6ccf2de903" }, - { file = "cffi-1.17.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:f3a2b4222ce6b60e2e8b337bb9596923045681d71e5a082783484d845390938e" }, - { file = "cffi-1.17.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:0984a4925a435b1da406122d4d7968dd861c1385afe3b45ba82b750f229811e2" }, - { file = "cffi-1.17.1-cp313-cp313-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d01b12eeeb4427d3110de311e1774046ad344f5b1a7403101878976ecd7a10f3" }, - { file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:706510fe141c86a69c8ddc029c7910003a17353970cff3b904ff0686a5927683" }, - { file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:de55b766c7aa2e2a3092c51e0483d700341182f08e67c63630d5b6f200bb28e5" }, - { file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:c59d6e989d07460165cc5ad3c61f9fd8f1b4796eacbd81cee78957842b834af4" }, - { file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:dd398dbc6773384a17fe0d3e7eeb8d1a21c2200473ee6806bb5e6a8e62bb73dd" }, - { file = "cffi-1.17.1-cp313-cp313-musllinux_1_1_aarch64.whl", hash = "sha256:3edc8d958eb099c634dace3c7e16560ae474aa3803a5df240542b305d14e14ed" }, - { file = "cffi-1.17.1-cp313-cp313-musllinux_1_1_x86_64.whl", hash = "sha256:72e72408cad3d5419375fc87d289076ee319835bdfa2caad331e377589aebba9" }, - { file = "cffi-1.17.1-cp313-cp313-win32.whl", hash = "sha256:e03eab0a8677fa80d646b5ddece1cbeaf556c313dcfac435ba11f107ba117b5d" }, - { file = "cffi-1.17.1-cp313-cp313-win_amd64.whl", hash = "sha256:f6a16c31041f09ead72d69f583767292f750d24913dadacf5756b966aacb3f1a" }, - { file = "cffi-1.17.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:636062ea65bd0195bc012fea9321aca499c0504409f413dc88af450b57ffd03b" }, - { file = "cffi-1.17.1-cp38-cp38-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c7eac2ef9b63c79431bc4b25f1cd649d7f061a28808cbc6c47b534bd789ef964" }, - { file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e221cf152cff04059d011ee126477f0d9588303eb57e88923578ace7baad17f9" }, - { file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:31000ec67d4221a71bd3f67df918b1f88f676f1c3b535a7eb473255fdc0b83fc" }, - { file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:6f17be4345073b0a7b8ea599688f692ac3ef23ce28e5df79c04de519dbc4912c" }, - { file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0e2b1fac190ae3ebfe37b979cc1ce69c81f4e4fe5746bb401dca63a9062cdaf1" }, - { file = "cffi-1.17.1-cp38-cp38-win32.whl", hash = "sha256:7596d6620d3fa590f677e9ee430df2958d2d6d6de2feeae5b20e82c00b76fbf8" }, - { file = "cffi-1.17.1-cp38-cp38-win_amd64.whl", hash = "sha256:78122be759c3f8a014ce010908ae03364d00a1f81ab5c7f4a7a5120607ea56e1" }, - { file = "cffi-1.17.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:b2ab587605f4ba0bf81dc0cb08a41bd1c0a5906bd59243d56bad7668a6fc6c16" }, - { file = "cffi-1.17.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:28b16024becceed8c6dfbc75629e27788d8a3f9030691a1dbf9821a128b22c36" }, - { file = "cffi-1.17.1-cp39-cp39-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1d599671f396c4723d016dbddb72fe8e0397082b0a77a4fab8028923bec050e8" }, - { file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:ca74b8dbe6e8e8263c0ffd60277de77dcee6c837a3d0881d8c1ead7268c9e576" }, - { file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f7f5baafcc48261359e14bcd6d9bff6d4b28d9103847c9e136694cb0501aef87" }, - { file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:98e3969bcff97cae1b2def8ba499ea3d6f31ddfdb7635374834cf89a1a08ecf0" }, - { file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:cdf5ce3acdfd1661132f2a9c19cac174758dc2352bfe37d98aa7512c6b7178b3" }, - { file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:9755e4345d1ec879e3849e62222a18c7174d65a6a92d5b346b1863912168b595" }, - { file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:f1e22e8c4419538cb197e4dd60acc919d7696e5ef98ee4da4e01d3f8cfa4cc5a" }, - { file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:c03e868a0b3bc35839ba98e74211ed2b05d2119be4e8a0f224fba9384f1fe02e" }, - { file = "cffi-1.17.1-cp39-cp39-win32.whl", hash = "sha256:e31ae45bc2e29f6b2abd0de1cc3b9d5205aa847cafaecb8af1476a609a2f6eb7" }, - { file = "cffi-1.17.1-cp39-cp39-win_amd64.whl", hash = "sha256:d016c76bdd850f3c626af19b0542c9677ba156e4ee4fccfdd7848803533ef662" }, - { file = "cffi-1.17.1.tar.gz", hash = "sha256:1c39c6016c32bc48dd54561950ebd6836e1670f2ae46128f67cf49e789c52824" }, + {file = "cffi-1.17.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:df8b1c11f177bc2313ec4b2d46baec87a5f3e71fc8b45dab2ee7cae86d9aba14"}, + {file = "cffi-1.17.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:8f2cdc858323644ab277e9bb925ad72ae0e67f69e804f4898c070998d50b1a67"}, + {file = "cffi-1.17.1-cp310-cp310-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:edae79245293e15384b51f88b00613ba9f7198016a5948b5dddf4917d4d26382"}, + {file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:45398b671ac6d70e67da8e4224a065cec6a93541bb7aebe1b198a61b58c7b702"}, + {file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:ad9413ccdeda48c5afdae7e4fa2192157e991ff761e7ab8fdd8926f40b160cc3"}, + {file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:5da5719280082ac6bd9aa7becb3938dc9f9cbd57fac7d2871717b1feb0902ab6"}, + {file = "cffi-1.17.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2bb1a08b8008b281856e5971307cc386a8e9c5b625ac297e853d36da6efe9c17"}, + {file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:045d61c734659cc045141be4bae381a41d89b741f795af1dd018bfb532fd0df8"}, + {file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:6883e737d7d9e4899a8a695e00ec36bd4e5e4f18fabe0aca0efe0a4b44cdb13e"}, + {file = "cffi-1.17.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:6b8b4a92e1c65048ff98cfe1f735ef8f1ceb72e3d5f0c25fdb12087a23da22be"}, + {file = "cffi-1.17.1-cp310-cp310-win32.whl", hash = "sha256:c9c3d058ebabb74db66e431095118094d06abf53284d9c81f27300d0e0d8bc7c"}, + {file = "cffi-1.17.1-cp310-cp310-win_amd64.whl", hash = "sha256:0f048dcf80db46f0098ccac01132761580d28e28bc0f78ae0d58048063317e15"}, + {file = "cffi-1.17.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:a45e3c6913c5b87b3ff120dcdc03f6131fa0065027d0ed7ee6190736a74cd401"}, + {file = "cffi-1.17.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:30c5e0cb5ae493c04c8b42916e52ca38079f1b235c2f8ae5f4527b963c401caf"}, + {file = "cffi-1.17.1-cp311-cp311-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f75c7ab1f9e4aca5414ed4d8e5c0e303a34f4421f8a0d47a4d019ceff0ab6af4"}, + {file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a1ed2dd2972641495a3ec98445e09766f077aee98a1c896dcb4ad0d303628e41"}, + {file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:46bf43160c1a35f7ec506d254e5c890f3c03648a4dbac12d624e4490a7046cd1"}, + {file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:a24ed04c8ffd54b0729c07cee15a81d964e6fee0e3d4d342a27b020d22959dc6"}, + {file = "cffi-1.17.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:610faea79c43e44c71e1ec53a554553fa22321b65fae24889706c0a84d4ad86d"}, + {file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:a9b15d491f3ad5d692e11f6b71f7857e7835eb677955c00cc0aefcd0669adaf6"}, + {file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:de2ea4b5833625383e464549fec1bc395c1bdeeb5f25c4a3a82b5a8c756ec22f"}, + {file = "cffi-1.17.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:fc48c783f9c87e60831201f2cce7f3b2e4846bf4d8728eabe54d60700b318a0b"}, + {file = "cffi-1.17.1-cp311-cp311-win32.whl", hash = "sha256:85a950a4ac9c359340d5963966e3e0a94a676bd6245a4b55bc43949eee26a655"}, + {file = "cffi-1.17.1-cp311-cp311-win_amd64.whl", hash = "sha256:caaf0640ef5f5517f49bc275eca1406b0ffa6aa184892812030f04c2abf589a0"}, + {file = "cffi-1.17.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:805b4371bf7197c329fcb3ead37e710d1bca9da5d583f5073b799d5c5bd1eee4"}, + {file = "cffi-1.17.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:733e99bc2df47476e3848417c5a4540522f234dfd4ef3ab7fafdf555b082ec0c"}, + {file = "cffi-1.17.1-cp312-cp312-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1257bdabf294dceb59f5e70c64a3e2f462c30c7ad68092d01bbbfb1c16b1ba36"}, + {file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:da95af8214998d77a98cc14e3a3bd00aa191526343078b530ceb0bd710fb48a5"}, + {file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:d63afe322132c194cf832bfec0dc69a99fb9bb6bbd550f161a49e9e855cc78ff"}, + {file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:f79fc4fc25f1c8698ff97788206bb3c2598949bfe0fef03d299eb1b5356ada99"}, + {file = "cffi-1.17.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b62ce867176a75d03a665bad002af8e6d54644fad99a3c70905c543130e39d93"}, + {file = "cffi-1.17.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:386c8bf53c502fff58903061338ce4f4950cbdcb23e2902d86c0f722b786bbe3"}, + {file = "cffi-1.17.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:4ceb10419a9adf4460ea14cfd6bc43d08701f0835e979bf821052f1805850fe8"}, + {file = "cffi-1.17.1-cp312-cp312-win32.whl", hash = "sha256:a08d7e755f8ed21095a310a693525137cfe756ce62d066e53f502a83dc550f65"}, + {file = "cffi-1.17.1-cp312-cp312-win_amd64.whl", hash = "sha256:51392eae71afec0d0c8fb1a53b204dbb3bcabcb3c9b807eedf3e1e6ccf2de903"}, + {file = "cffi-1.17.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:f3a2b4222ce6b60e2e8b337bb9596923045681d71e5a082783484d845390938e"}, + {file = "cffi-1.17.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:0984a4925a435b1da406122d4d7968dd861c1385afe3b45ba82b750f229811e2"}, + {file = "cffi-1.17.1-cp313-cp313-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d01b12eeeb4427d3110de311e1774046ad344f5b1a7403101878976ecd7a10f3"}, + {file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:706510fe141c86a69c8ddc029c7910003a17353970cff3b904ff0686a5927683"}, + {file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:de55b766c7aa2e2a3092c51e0483d700341182f08e67c63630d5b6f200bb28e5"}, + {file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:c59d6e989d07460165cc5ad3c61f9fd8f1b4796eacbd81cee78957842b834af4"}, + {file = "cffi-1.17.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:dd398dbc6773384a17fe0d3e7eeb8d1a21c2200473ee6806bb5e6a8e62bb73dd"}, + {file = "cffi-1.17.1-cp313-cp313-musllinux_1_1_aarch64.whl", hash = "sha256:3edc8d958eb099c634dace3c7e16560ae474aa3803a5df240542b305d14e14ed"}, + {file = "cffi-1.17.1-cp313-cp313-musllinux_1_1_x86_64.whl", hash = "sha256:72e72408cad3d5419375fc87d289076ee319835bdfa2caad331e377589aebba9"}, + {file = "cffi-1.17.1-cp313-cp313-win32.whl", hash = "sha256:e03eab0a8677fa80d646b5ddece1cbeaf556c313dcfac435ba11f107ba117b5d"}, + {file = "cffi-1.17.1-cp313-cp313-win_amd64.whl", hash = "sha256:f6a16c31041f09ead72d69f583767292f750d24913dadacf5756b966aacb3f1a"}, + {file = "cffi-1.17.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:636062ea65bd0195bc012fea9321aca499c0504409f413dc88af450b57ffd03b"}, + {file = "cffi-1.17.1-cp38-cp38-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c7eac2ef9b63c79431bc4b25f1cd649d7f061a28808cbc6c47b534bd789ef964"}, + {file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e221cf152cff04059d011ee126477f0d9588303eb57e88923578ace7baad17f9"}, + {file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:31000ec67d4221a71bd3f67df918b1f88f676f1c3b535a7eb473255fdc0b83fc"}, + {file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:6f17be4345073b0a7b8ea599688f692ac3ef23ce28e5df79c04de519dbc4912c"}, + {file = "cffi-1.17.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0e2b1fac190ae3ebfe37b979cc1ce69c81f4e4fe5746bb401dca63a9062cdaf1"}, + {file = "cffi-1.17.1-cp38-cp38-win32.whl", hash = "sha256:7596d6620d3fa590f677e9ee430df2958d2d6d6de2feeae5b20e82c00b76fbf8"}, + {file = "cffi-1.17.1-cp38-cp38-win_amd64.whl", hash = "sha256:78122be759c3f8a014ce010908ae03364d00a1f81ab5c7f4a7a5120607ea56e1"}, + {file = "cffi-1.17.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:b2ab587605f4ba0bf81dc0cb08a41bd1c0a5906bd59243d56bad7668a6fc6c16"}, + {file = "cffi-1.17.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:28b16024becceed8c6dfbc75629e27788d8a3f9030691a1dbf9821a128b22c36"}, + {file = "cffi-1.17.1-cp39-cp39-manylinux_2_12_i686.manylinux2010_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1d599671f396c4723d016dbddb72fe8e0397082b0a77a4fab8028923bec050e8"}, + {file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:ca74b8dbe6e8e8263c0ffd60277de77dcee6c837a3d0881d8c1ead7268c9e576"}, + {file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f7f5baafcc48261359e14bcd6d9bff6d4b28d9103847c9e136694cb0501aef87"}, + {file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:98e3969bcff97cae1b2def8ba499ea3d6f31ddfdb7635374834cf89a1a08ecf0"}, + {file = "cffi-1.17.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:cdf5ce3acdfd1661132f2a9c19cac174758dc2352bfe37d98aa7512c6b7178b3"}, + {file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:9755e4345d1ec879e3849e62222a18c7174d65a6a92d5b346b1863912168b595"}, + {file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:f1e22e8c4419538cb197e4dd60acc919d7696e5ef98ee4da4e01d3f8cfa4cc5a"}, + {file = "cffi-1.17.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:c03e868a0b3bc35839ba98e74211ed2b05d2119be4e8a0f224fba9384f1fe02e"}, + {file = "cffi-1.17.1-cp39-cp39-win32.whl", hash = "sha256:e31ae45bc2e29f6b2abd0de1cc3b9d5205aa847cafaecb8af1476a609a2f6eb7"}, + {file = "cffi-1.17.1-cp39-cp39-win_amd64.whl", hash = "sha256:d016c76bdd850f3c626af19b0542c9677ba156e4ee4fccfdd7848803533ef662"}, + {file = "cffi-1.17.1.tar.gz", hash = "sha256:1c39c6016c32bc48dd54561950ebd6836e1670f2ae46128f67cf49e789c52824"}, ] [package.dependencies] @@ -143,8 +143,8 @@ optional = false python-versions = ">=3.7" groups = ["dev"] files = [ - { file = "chardet-5.2.0-py3-none-any.whl", hash = "sha256:e1cf59446890a00105fe7b7912492ea04b6e6f06d4b742b2c788469e34c82970" }, - { file = "chardet-5.2.0.tar.gz", hash = "sha256:1b3b6ff479a8c414bc3fa2c0852995695c4a026dcd6d0633b2dd092ca39c1cf7" }, + {file = "chardet-5.2.0-py3-none-any.whl", hash = "sha256:e1cf59446890a00105fe7b7912492ea04b6e6f06d4b742b2c788469e34c82970"}, + {file = "chardet-5.2.0.tar.gz", hash = "sha256:1b3b6ff479a8c414bc3fa2c0852995695c4a026dcd6d0633b2dd092ca39c1cf7"}, ] [[package]] @@ -155,98 +155,98 @@ optional = false python-versions = ">=3.7" groups = ["dev"] files = [ - { file = "charset_normalizer-3.4.1-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:91b36a978b5ae0ee86c394f5a54d6ef44db1de0815eb43de826d41d21e4af3de" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7461baadb4dc00fd9e0acbe254e3d7d2112e7f92ced2adc96e54ef6501c5f176" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:e218488cd232553829be0664c2292d3af2eeeb94b32bea483cf79ac6a694e037" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:80ed5e856eb7f30115aaf94e4a08114ccc8813e6ed1b5efa74f9f82e8509858f" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b010a7a4fd316c3c484d482922d13044979e78d1861f0e0650423144c616a46a" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:4532bff1b8421fd0a320463030c7520f56a79c9024a4e88f01c537316019005a" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:d973f03c0cb71c5ed99037b870f2be986c3c05e63622c017ea9816881d2dd247" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:3a3bd0dcd373514dcec91c411ddb9632c0d7d92aed7093b8c3bbb6d69ca74408" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_ppc64le.whl", hash = "sha256:d9c3cdf5390dcd29aa8056d13e8e99526cda0305acc038b96b30352aff5ff2bb" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_s390x.whl", hash = "sha256:2bdfe3ac2e1bbe5b59a1a63721eb3b95fc9b6817ae4a46debbb4e11f6232428d" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:eab677309cdb30d047996b36d34caeda1dc91149e4fdca0b1a039b3f79d9a807" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-win32.whl", hash = "sha256:c0429126cf75e16c4f0ad00ee0eae4242dc652290f940152ca8c75c3a4b6ee8f" }, - { file = "charset_normalizer-3.4.1-cp310-cp310-win_amd64.whl", hash = "sha256:9f0b8b1c6d84c8034a44893aba5e767bf9c7a211e313a9605d9c617d7083829f" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:8bfa33f4f2672964266e940dd22a195989ba31669bd84629f05fab3ef4e2d125" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:28bf57629c75e810b6ae989f03c0828d64d6b26a5e205535585f96093e405ed1" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f08ff5e948271dc7e18a35641d2f11a4cd8dfd5634f55228b691e62b37125eb3" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:234ac59ea147c59ee4da87a0c0f098e9c8d169f4dc2a159ef720f1a61bbe27cd" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fd4ec41f914fa74ad1b8304bbc634b3de73d2a0889bd32076342a573e0779e00" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:eea6ee1db730b3483adf394ea72f808b6e18cf3cb6454b4d86e04fa8c4327a12" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:c96836c97b1238e9c9e3fe90844c947d5afbf4f4c92762679acfe19927d81d77" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:4d86f7aff21ee58f26dcf5ae81a9addbd914115cdebcbb2217e4f0ed8982e146" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_ppc64le.whl", hash = "sha256:09b5e6733cbd160dcc09589227187e242a30a49ca5cefa5a7edd3f9d19ed53fd" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_s390x.whl", hash = "sha256:5777ee0881f9499ed0f71cc82cf873d9a0ca8af166dfa0af8ec4e675b7df48e6" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:237bdbe6159cff53b4f24f397d43c6336c6b0b42affbe857970cefbb620911c8" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-win32.whl", hash = "sha256:8417cb1f36cc0bc7eaba8ccb0e04d55f0ee52df06df3ad55259b9a323555fc8b" }, - { file = "charset_normalizer-3.4.1-cp311-cp311-win_amd64.whl", hash = "sha256:d7f50a1f8c450f3925cb367d011448c39239bb3eb4117c36a6d354794de4ce76" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:73d94b58ec7fecbc7366247d3b0b10a21681004153238750bb67bd9012414545" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:dad3e487649f498dd991eeb901125411559b22e8d7ab25d3aeb1af367df5efd7" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:c30197aa96e8eed02200a83fba2657b4c3acd0f0aa4bdc9f6c1af8e8962e0757" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:2369eea1ee4a7610a860d88f268eb39b95cb588acd7235e02fd5a5601773d4fa" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bc2722592d8998c870fa4e290c2eec2c1569b87fe58618e67d38b4665dfa680d" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:ffc9202a29ab3920fa812879e95a9e78b2465fd10be7fcbd042899695d75e616" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:804a4d582ba6e5b747c625bf1255e6b1507465494a40a2130978bda7b932c90b" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:0f55e69f030f7163dffe9fd0752b32f070566451afe180f99dbeeb81f511ad8d" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_ppc64le.whl", hash = "sha256:c4c3e6da02df6fa1410a7680bd3f63d4f710232d3139089536310d027950696a" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_s390x.whl", hash = "sha256:5df196eb874dae23dcfb968c83d4f8fdccb333330fe1fc278ac5ceeb101003a9" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:e358e64305fe12299a08e08978f51fc21fac060dcfcddd95453eabe5b93ed0e1" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-win32.whl", hash = "sha256:9b23ca7ef998bc739bf6ffc077c2116917eabcc901f88da1b9856b210ef63f35" }, - { file = "charset_normalizer-3.4.1-cp312-cp312-win_amd64.whl", hash = "sha256:6ff8a4a60c227ad87030d76e99cd1698345d4491638dfa6673027c48b3cd395f" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:aabfa34badd18f1da5ec1bc2715cadc8dca465868a4e73a0173466b688f29dda" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:22e14b5d70560b8dd51ec22863f370d1e595ac3d024cb8ad7d308b4cd95f8313" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:8436c508b408b82d87dc5f62496973a1805cd46727c34440b0d29d8a2f50a6c9" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:2d074908e1aecee37a7635990b2c6d504cd4766c7bc9fc86d63f9c09af3fa11b" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:955f8851919303c92343d2f66165294848d57e9bba6cf6e3625485a70a038d11" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:44ecbf16649486d4aebafeaa7ec4c9fed8b88101f4dd612dcaf65d5e815f837f" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:0924e81d3d5e70f8126529951dac65c1010cdf117bb75eb02dd12339b57749dd" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:2967f74ad52c3b98de4c3b32e1a44e32975e008a9cd2a8cc8966d6a5218c5cb2" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_ppc64le.whl", hash = "sha256:c75cb2a3e389853835e84a2d8fb2b81a10645b503eca9bcb98df6b5a43eb8886" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_s390x.whl", hash = "sha256:09b26ae6b1abf0d27570633b2b078a2a20419c99d66fb2823173d73f188ce601" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:fa88b843d6e211393a37219e6a1c1df99d35e8fd90446f1118f4216e307e48cd" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-win32.whl", hash = "sha256:eb8178fe3dba6450a3e024e95ac49ed3400e506fd4e9e5c32d30adda88cbd407" }, - { file = "charset_normalizer-3.4.1-cp313-cp313-win_amd64.whl", hash = "sha256:b1ac5992a838106edb89654e0aebfc24f5848ae2547d22c2c3f66454daa11971" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:f30bf9fd9be89ecb2360c7d94a711f00c09b976258846efe40db3d05828e8089" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:97f68b8d6831127e4787ad15e6757232e14e12060bec17091b85eb1486b91d8d" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:7974a0b5ecd505609e3b19742b60cee7aa2aa2fb3151bc917e6e2646d7667dcf" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fc54db6c8593ef7d4b2a331b58653356cf04f67c960f584edb7c3d8c97e8f39e" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:311f30128d7d333eebd7896965bfcfbd0065f1716ec92bd5638d7748eb6f936a" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_aarch64.whl", hash = "sha256:7d053096f67cd1241601111b698f5cad775f97ab25d81567d3f59219b5f1adbd" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_i686.whl", hash = "sha256:807f52c1f798eef6cf26beb819eeb8819b1622ddfeef9d0977a8502d4db6d534" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_ppc64le.whl", hash = "sha256:dccbe65bd2f7f7ec22c4ff99ed56faa1e9f785482b9bbd7c717e26fd723a1d1e" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_s390x.whl", hash = "sha256:2fb9bd477fdea8684f78791a6de97a953c51831ee2981f8e4f583ff3b9d9687e" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_x86_64.whl", hash = "sha256:01732659ba9b5b873fc117534143e4feefecf3b2078b0a6a2e925271bb6f4cfa" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-win32.whl", hash = "sha256:7a4f97a081603d2050bfaffdefa5b02a9ec823f8348a572e39032caa8404a487" }, - { file = "charset_normalizer-3.4.1-cp37-cp37m-win_amd64.whl", hash = "sha256:7b1bef6280950ee6c177b326508f86cad7ad4dff12454483b51d8b7d673a2c5d" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:ecddf25bee22fe4fe3737a399d0d177d72bc22be6913acfab364b40bce1ba83c" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8c60ca7339acd497a55b0ea5d506b2a2612afb2826560416f6894e8b5770d4a9" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:b7b2d86dd06bfc2ade3312a83a5c364c7ec2e3498f8734282c6c3d4b07b346b8" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:dd78cfcda14a1ef52584dbb008f7ac81c1328c0f58184bf9a84c49c605002da6" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6e27f48bcd0957c6d4cb9d6fa6b61d192d0b13d5ef563e5f2ae35feafc0d179c" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:01ad647cdd609225c5350561d084b42ddf732f4eeefe6e678765636791e78b9a" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:619a609aa74ae43d90ed2e89bdd784765de0a25ca761b93e196d938b8fd1dbbd" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:89149166622f4db9b4b6a449256291dc87a99ee53151c74cbd82a53c8c2f6ccd" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_ppc64le.whl", hash = "sha256:7709f51f5f7c853f0fb938bcd3bc59cdfdc5203635ffd18bf354f6967ea0f824" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_s390x.whl", hash = "sha256:345b0426edd4e18138d6528aed636de7a9ed169b4aaf9d61a8c19e39d26838ca" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:0907f11d019260cdc3f94fbdb23ff9125f6b5d1039b76003b5b0ac9d6a6c9d5b" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-win32.whl", hash = "sha256:ea0d8d539afa5eb2728aa1932a988a9a7af94f18582ffae4bc10b3fbdad0626e" }, - { file = "charset_normalizer-3.4.1-cp38-cp38-win_amd64.whl", hash = "sha256:329ce159e82018d646c7ac45b01a430369d526569ec08516081727a20e9e4af4" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:b97e690a2118911e39b4042088092771b4ae3fc3aa86518f84b8cf6888dbdb41" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:78baa6d91634dfb69ec52a463534bc0df05dbd546209b79a3880a34487f4b84f" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:1a2bc9f351a75ef49d664206d51f8e5ede9da246602dc2d2726837620ea034b2" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:75832c08354f595c760a804588b9357d34ec00ba1c940c15e31e96d902093770" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0af291f4fe114be0280cdd29d533696a77b5b49cfde5467176ecab32353395c4" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:0167ddc8ab6508fe81860a57dd472b2ef4060e8d378f0cc555707126830f2537" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:2a75d49014d118e4198bcee5ee0a6f25856b29b12dbf7cd012791f8a6cc5c496" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:363e2f92b0f0174b2f8238240a1a30142e3db7b957a5dd5689b0e75fb717cc78" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_ppc64le.whl", hash = "sha256:ab36c8eb7e454e34e60eb55ca5d241a5d18b2c6244f6827a30e451c42410b5f7" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_s390x.whl", hash = "sha256:4c0907b1928a36d5a998d72d64d8eaa7244989f7aaaf947500d3a800c83a3fd6" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:04432ad9479fa40ec0f387795ddad4437a2b50417c69fa275e212933519ff294" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-win32.whl", hash = "sha256:3bed14e9c89dcb10e8f3a29f9ccac4955aebe93c71ae803af79265c9ca5644c5" }, - { file = "charset_normalizer-3.4.1-cp39-cp39-win_amd64.whl", hash = "sha256:49402233c892a461407c512a19435d1ce275543138294f7ef013f0b63d5d3765" }, - { file = "charset_normalizer-3.4.1-py3-none-any.whl", hash = "sha256:d98b1668f06378c6dbefec3b92299716b931cd4e6061f3c875a71ced1780ab85" }, - { file = "charset_normalizer-3.4.1.tar.gz", hash = "sha256:44251f18cd68a75b56585dd00dae26183e102cd5e0f9f1466e6df5da2ed64ea3" }, + {file = "charset_normalizer-3.4.1-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:91b36a978b5ae0ee86c394f5a54d6ef44db1de0815eb43de826d41d21e4af3de"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7461baadb4dc00fd9e0acbe254e3d7d2112e7f92ced2adc96e54ef6501c5f176"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:e218488cd232553829be0664c2292d3af2eeeb94b32bea483cf79ac6a694e037"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:80ed5e856eb7f30115aaf94e4a08114ccc8813e6ed1b5efa74f9f82e8509858f"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b010a7a4fd316c3c484d482922d13044979e78d1861f0e0650423144c616a46a"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:4532bff1b8421fd0a320463030c7520f56a79c9024a4e88f01c537316019005a"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:d973f03c0cb71c5ed99037b870f2be986c3c05e63622c017ea9816881d2dd247"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:3a3bd0dcd373514dcec91c411ddb9632c0d7d92aed7093b8c3bbb6d69ca74408"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_ppc64le.whl", hash = "sha256:d9c3cdf5390dcd29aa8056d13e8e99526cda0305acc038b96b30352aff5ff2bb"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_s390x.whl", hash = "sha256:2bdfe3ac2e1bbe5b59a1a63721eb3b95fc9b6817ae4a46debbb4e11f6232428d"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:eab677309cdb30d047996b36d34caeda1dc91149e4fdca0b1a039b3f79d9a807"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-win32.whl", hash = "sha256:c0429126cf75e16c4f0ad00ee0eae4242dc652290f940152ca8c75c3a4b6ee8f"}, + {file = "charset_normalizer-3.4.1-cp310-cp310-win_amd64.whl", hash = "sha256:9f0b8b1c6d84c8034a44893aba5e767bf9c7a211e313a9605d9c617d7083829f"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:8bfa33f4f2672964266e940dd22a195989ba31669bd84629f05fab3ef4e2d125"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:28bf57629c75e810b6ae989f03c0828d64d6b26a5e205535585f96093e405ed1"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f08ff5e948271dc7e18a35641d2f11a4cd8dfd5634f55228b691e62b37125eb3"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:234ac59ea147c59ee4da87a0c0f098e9c8d169f4dc2a159ef720f1a61bbe27cd"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fd4ec41f914fa74ad1b8304bbc634b3de73d2a0889bd32076342a573e0779e00"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:eea6ee1db730b3483adf394ea72f808b6e18cf3cb6454b4d86e04fa8c4327a12"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:c96836c97b1238e9c9e3fe90844c947d5afbf4f4c92762679acfe19927d81d77"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:4d86f7aff21ee58f26dcf5ae81a9addbd914115cdebcbb2217e4f0ed8982e146"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_ppc64le.whl", hash = "sha256:09b5e6733cbd160dcc09589227187e242a30a49ca5cefa5a7edd3f9d19ed53fd"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_s390x.whl", hash = "sha256:5777ee0881f9499ed0f71cc82cf873d9a0ca8af166dfa0af8ec4e675b7df48e6"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:237bdbe6159cff53b4f24f397d43c6336c6b0b42affbe857970cefbb620911c8"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-win32.whl", hash = "sha256:8417cb1f36cc0bc7eaba8ccb0e04d55f0ee52df06df3ad55259b9a323555fc8b"}, + {file = "charset_normalizer-3.4.1-cp311-cp311-win_amd64.whl", hash = "sha256:d7f50a1f8c450f3925cb367d011448c39239bb3eb4117c36a6d354794de4ce76"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:73d94b58ec7fecbc7366247d3b0b10a21681004153238750bb67bd9012414545"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:dad3e487649f498dd991eeb901125411559b22e8d7ab25d3aeb1af367df5efd7"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:c30197aa96e8eed02200a83fba2657b4c3acd0f0aa4bdc9f6c1af8e8962e0757"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:2369eea1ee4a7610a860d88f268eb39b95cb588acd7235e02fd5a5601773d4fa"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bc2722592d8998c870fa4e290c2eec2c1569b87fe58618e67d38b4665dfa680d"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:ffc9202a29ab3920fa812879e95a9e78b2465fd10be7fcbd042899695d75e616"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:804a4d582ba6e5b747c625bf1255e6b1507465494a40a2130978bda7b932c90b"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:0f55e69f030f7163dffe9fd0752b32f070566451afe180f99dbeeb81f511ad8d"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_ppc64le.whl", hash = "sha256:c4c3e6da02df6fa1410a7680bd3f63d4f710232d3139089536310d027950696a"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_s390x.whl", hash = "sha256:5df196eb874dae23dcfb968c83d4f8fdccb333330fe1fc278ac5ceeb101003a9"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:e358e64305fe12299a08e08978f51fc21fac060dcfcddd95453eabe5b93ed0e1"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-win32.whl", hash = "sha256:9b23ca7ef998bc739bf6ffc077c2116917eabcc901f88da1b9856b210ef63f35"}, + {file = "charset_normalizer-3.4.1-cp312-cp312-win_amd64.whl", hash = "sha256:6ff8a4a60c227ad87030d76e99cd1698345d4491638dfa6673027c48b3cd395f"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:aabfa34badd18f1da5ec1bc2715cadc8dca465868a4e73a0173466b688f29dda"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:22e14b5d70560b8dd51ec22863f370d1e595ac3d024cb8ad7d308b4cd95f8313"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:8436c508b408b82d87dc5f62496973a1805cd46727c34440b0d29d8a2f50a6c9"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:2d074908e1aecee37a7635990b2c6d504cd4766c7bc9fc86d63f9c09af3fa11b"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:955f8851919303c92343d2f66165294848d57e9bba6cf6e3625485a70a038d11"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:44ecbf16649486d4aebafeaa7ec4c9fed8b88101f4dd612dcaf65d5e815f837f"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:0924e81d3d5e70f8126529951dac65c1010cdf117bb75eb02dd12339b57749dd"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:2967f74ad52c3b98de4c3b32e1a44e32975e008a9cd2a8cc8966d6a5218c5cb2"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_ppc64le.whl", hash = "sha256:c75cb2a3e389853835e84a2d8fb2b81a10645b503eca9bcb98df6b5a43eb8886"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_s390x.whl", hash = "sha256:09b26ae6b1abf0d27570633b2b078a2a20419c99d66fb2823173d73f188ce601"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:fa88b843d6e211393a37219e6a1c1df99d35e8fd90446f1118f4216e307e48cd"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-win32.whl", hash = "sha256:eb8178fe3dba6450a3e024e95ac49ed3400e506fd4e9e5c32d30adda88cbd407"}, + {file = "charset_normalizer-3.4.1-cp313-cp313-win_amd64.whl", hash = "sha256:b1ac5992a838106edb89654e0aebfc24f5848ae2547d22c2c3f66454daa11971"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:f30bf9fd9be89ecb2360c7d94a711f00c09b976258846efe40db3d05828e8089"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:97f68b8d6831127e4787ad15e6757232e14e12060bec17091b85eb1486b91d8d"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:7974a0b5ecd505609e3b19742b60cee7aa2aa2fb3151bc917e6e2646d7667dcf"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fc54db6c8593ef7d4b2a331b58653356cf04f67c960f584edb7c3d8c97e8f39e"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:311f30128d7d333eebd7896965bfcfbd0065f1716ec92bd5638d7748eb6f936a"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_aarch64.whl", hash = "sha256:7d053096f67cd1241601111b698f5cad775f97ab25d81567d3f59219b5f1adbd"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_i686.whl", hash = "sha256:807f52c1f798eef6cf26beb819eeb8819b1622ddfeef9d0977a8502d4db6d534"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_ppc64le.whl", hash = "sha256:dccbe65bd2f7f7ec22c4ff99ed56faa1e9f785482b9bbd7c717e26fd723a1d1e"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_s390x.whl", hash = "sha256:2fb9bd477fdea8684f78791a6de97a953c51831ee2981f8e4f583ff3b9d9687e"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-musllinux_1_2_x86_64.whl", hash = "sha256:01732659ba9b5b873fc117534143e4feefecf3b2078b0a6a2e925271bb6f4cfa"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-win32.whl", hash = "sha256:7a4f97a081603d2050bfaffdefa5b02a9ec823f8348a572e39032caa8404a487"}, + {file = "charset_normalizer-3.4.1-cp37-cp37m-win_amd64.whl", hash = "sha256:7b1bef6280950ee6c177b326508f86cad7ad4dff12454483b51d8b7d673a2c5d"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:ecddf25bee22fe4fe3737a399d0d177d72bc22be6913acfab364b40bce1ba83c"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8c60ca7339acd497a55b0ea5d506b2a2612afb2826560416f6894e8b5770d4a9"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:b7b2d86dd06bfc2ade3312a83a5c364c7ec2e3498f8734282c6c3d4b07b346b8"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:dd78cfcda14a1ef52584dbb008f7ac81c1328c0f58184bf9a84c49c605002da6"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6e27f48bcd0957c6d4cb9d6fa6b61d192d0b13d5ef563e5f2ae35feafc0d179c"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:01ad647cdd609225c5350561d084b42ddf732f4eeefe6e678765636791e78b9a"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:619a609aa74ae43d90ed2e89bdd784765de0a25ca761b93e196d938b8fd1dbbd"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:89149166622f4db9b4b6a449256291dc87a99ee53151c74cbd82a53c8c2f6ccd"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_ppc64le.whl", hash = "sha256:7709f51f5f7c853f0fb938bcd3bc59cdfdc5203635ffd18bf354f6967ea0f824"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_s390x.whl", hash = "sha256:345b0426edd4e18138d6528aed636de7a9ed169b4aaf9d61a8c19e39d26838ca"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:0907f11d019260cdc3f94fbdb23ff9125f6b5d1039b76003b5b0ac9d6a6c9d5b"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-win32.whl", hash = "sha256:ea0d8d539afa5eb2728aa1932a988a9a7af94f18582ffae4bc10b3fbdad0626e"}, + {file = "charset_normalizer-3.4.1-cp38-cp38-win_amd64.whl", hash = "sha256:329ce159e82018d646c7ac45b01a430369d526569ec08516081727a20e9e4af4"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:b97e690a2118911e39b4042088092771b4ae3fc3aa86518f84b8cf6888dbdb41"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:78baa6d91634dfb69ec52a463534bc0df05dbd546209b79a3880a34487f4b84f"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:1a2bc9f351a75ef49d664206d51f8e5ede9da246602dc2d2726837620ea034b2"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:75832c08354f595c760a804588b9357d34ec00ba1c940c15e31e96d902093770"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0af291f4fe114be0280cdd29d533696a77b5b49cfde5467176ecab32353395c4"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:0167ddc8ab6508fe81860a57dd472b2ef4060e8d378f0cc555707126830f2537"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:2a75d49014d118e4198bcee5ee0a6f25856b29b12dbf7cd012791f8a6cc5c496"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:363e2f92b0f0174b2f8238240a1a30142e3db7b957a5dd5689b0e75fb717cc78"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_ppc64le.whl", hash = "sha256:ab36c8eb7e454e34e60eb55ca5d241a5d18b2c6244f6827a30e451c42410b5f7"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_s390x.whl", hash = "sha256:4c0907b1928a36d5a998d72d64d8eaa7244989f7aaaf947500d3a800c83a3fd6"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:04432ad9479fa40ec0f387795ddad4437a2b50417c69fa275e212933519ff294"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-win32.whl", hash = "sha256:3bed14e9c89dcb10e8f3a29f9ccac4955aebe93c71ae803af79265c9ca5644c5"}, + {file = "charset_normalizer-3.4.1-cp39-cp39-win_amd64.whl", hash = "sha256:49402233c892a461407c512a19435d1ce275543138294f7ef013f0b63d5d3765"}, + {file = "charset_normalizer-3.4.1-py3-none-any.whl", hash = "sha256:d98b1668f06378c6dbefec3b92299716b931cd4e6061f3c875a71ced1780ab85"}, + {file = "charset_normalizer-3.4.1.tar.gz", hash = "sha256:44251f18cd68a75b56585dd00dae26183e102cd5e0f9f1466e6df5da2ed64ea3"}, ] [[package]] @@ -257,8 +257,8 @@ optional = false python-versions = "!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*,!=3.4.*,!=3.5.*,!=3.6.*,>=2.7" groups = ["dev"] files = [ - { file = "colorama-0.4.6-py2.py3-none-any.whl", hash = "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6" }, - { file = "colorama-0.4.6.tar.gz", hash = "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44" }, + {file = "colorama-0.4.6-py2.py3-none-any.whl", hash = "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6"}, + {file = "colorama-0.4.6.tar.gz", hash = "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44"}, ] [[package]] @@ -269,82 +269,82 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "coverage-7.6.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:b06079abebbc0e89e6163b8e8f0e16270124c154dc6e4a47b413dd538859af16" }, - { file = "coverage-7.6.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:cf4b19715bccd7ee27b6b120e7e9dd56037b9c0681dcc1adc9ba9db3d417fa36" }, - { file = "coverage-7.6.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e61c0abb4c85b095a784ef23fdd4aede7a2628478e7baba7c5e3deba61070a02" }, - { file = "coverage-7.6.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:fd21f6ae3f08b41004dfb433fa895d858f3f5979e7762d052b12aef444e29afc" }, - { file = "coverage-7.6.1-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8f59d57baca39b32db42b83b2a7ba6f47ad9c394ec2076b084c3f029b7afca23" }, - { file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:a1ac0ae2b8bd743b88ed0502544847c3053d7171a3cff9228af618a068ed9c34" }, - { file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:e6a08c0be454c3b3beb105c0596ebdc2371fab6bb90c0c0297f4e58fd7e1012c" }, - { file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:f5796e664fe802da4f57a168c85359a8fbf3eab5e55cd4e4569fbacecc903959" }, - { file = "coverage-7.6.1-cp310-cp310-win32.whl", hash = "sha256:7bb65125fcbef8d989fa1dd0e8a060999497629ca5b0efbca209588a73356232" }, - { file = "coverage-7.6.1-cp310-cp310-win_amd64.whl", hash = "sha256:3115a95daa9bdba70aea750db7b96b37259a81a709223c8448fa97727d546fe0" }, - { file = "coverage-7.6.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:7dea0889685db8550f839fa202744652e87c60015029ce3f60e006f8c4462c93" }, - { file = "coverage-7.6.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:ed37bd3c3b063412f7620464a9ac1314d33100329f39799255fb8d3027da50d3" }, - { file = "coverage-7.6.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d85f5e9a5f8b73e2350097c3756ef7e785f55bd71205defa0bfdaf96c31616ff" }, - { file = "coverage-7.6.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9bc572be474cafb617672c43fe989d6e48d3c83af02ce8de73fff1c6bb3c198d" }, - { file = "coverage-7.6.1-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0c0420b573964c760df9e9e86d1a9a622d0d27f417e1a949a8a66dd7bcee7bc6" }, - { file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:1f4aa8219db826ce6be7099d559f8ec311549bfc4046f7f9fe9b5cea5c581c56" }, - { file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:fc5a77d0c516700ebad189b587de289a20a78324bc54baee03dd486f0855d234" }, - { file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:b48f312cca9621272ae49008c7f613337c53fadca647d6384cc129d2996d1133" }, - { file = "coverage-7.6.1-cp311-cp311-win32.whl", hash = "sha256:1125ca0e5fd475cbbba3bb67ae20bd2c23a98fac4e32412883f9bcbaa81c314c" }, - { file = "coverage-7.6.1-cp311-cp311-win_amd64.whl", hash = "sha256:8ae539519c4c040c5ffd0632784e21b2f03fc1340752af711f33e5be83a9d6c6" }, - { file = "coverage-7.6.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:95cae0efeb032af8458fc27d191f85d1717b1d4e49f7cb226cf526ff28179778" }, - { file = "coverage-7.6.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:5621a9175cf9d0b0c84c2ef2b12e9f5f5071357c4d2ea6ca1cf01814f45d2391" }, - { file = "coverage-7.6.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:260933720fdcd75340e7dbe9060655aff3af1f0c5d20f46b57f262ab6c86a5e8" }, - { file = "coverage-7.6.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:07e2ca0ad381b91350c0ed49d52699b625aab2b44b65e1b4e02fa9df0e92ad2d" }, - { file = "coverage-7.6.1-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c44fee9975f04b33331cb8eb272827111efc8930cfd582e0320613263ca849ca" }, - { file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:877abb17e6339d96bf08e7a622d05095e72b71f8afd8a9fefc82cf30ed944163" }, - { file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:3e0cadcf6733c09154b461f1ca72d5416635e5e4ec4e536192180d34ec160f8a" }, - { file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:c3c02d12f837d9683e5ab2f3d9844dc57655b92c74e286c262e0fc54213c216d" }, - { file = "coverage-7.6.1-cp312-cp312-win32.whl", hash = "sha256:e05882b70b87a18d937ca6768ff33cc3f72847cbc4de4491c8e73880766718e5" }, - { file = "coverage-7.6.1-cp312-cp312-win_amd64.whl", hash = "sha256:b5d7b556859dd85f3a541db6a4e0167b86e7273e1cdc973e5b175166bb634fdb" }, - { file = "coverage-7.6.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:a4acd025ecc06185ba2b801f2de85546e0b8ac787cf9d3b06e7e2a69f925b106" }, - { file = "coverage-7.6.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:a6d3adcf24b624a7b778533480e32434a39ad8fa30c315208f6d3e5542aeb6e9" }, - { file = "coverage-7.6.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d0c212c49b6c10e6951362f7c6df3329f04c2b1c28499563d4035d964ab8e08c" }, - { file = "coverage-7.6.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:6e81d7a3e58882450ec4186ca59a3f20a5d4440f25b1cff6f0902ad890e6748a" }, - { file = "coverage-7.6.1-cp313-cp313-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:78b260de9790fd81e69401c2dc8b17da47c8038176a79092a89cb2b7d945d060" }, - { file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:a78d169acd38300060b28d600344a803628c3fd585c912cacc9ea8790fe96862" }, - { file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:2c09f4ce52cb99dd7505cd0fc8e0e37c77b87f46bc9c1eb03fe3bc9991085388" }, - { file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:6878ef48d4227aace338d88c48738a4258213cd7b74fd9a3d4d7582bb1d8a155" }, - { file = "coverage-7.6.1-cp313-cp313-win32.whl", hash = "sha256:44df346d5215a8c0e360307d46ffaabe0f5d3502c8a1cefd700b34baf31d411a" }, - { file = "coverage-7.6.1-cp313-cp313-win_amd64.whl", hash = "sha256:8284cf8c0dd272a247bc154eb6c95548722dce90d098c17a883ed36e67cdb129" }, - { file = "coverage-7.6.1-cp313-cp313t-macosx_10_13_x86_64.whl", hash = "sha256:d3296782ca4eab572a1a4eca686d8bfb00226300dcefdf43faa25b5242ab8a3e" }, - { file = "coverage-7.6.1-cp313-cp313t-macosx_11_0_arm64.whl", hash = "sha256:502753043567491d3ff6d08629270127e0c31d4184c4c8d98f92c26f65019962" }, - { file = "coverage-7.6.1-cp313-cp313t-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:6a89ecca80709d4076b95f89f308544ec8f7b4727e8a547913a35f16717856cb" }, - { file = "coverage-7.6.1-cp313-cp313t-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a318d68e92e80af8b00fa99609796fdbcdfef3629c77c6283566c6f02c6d6704" }, - { file = "coverage-7.6.1-cp313-cp313t-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:13b0a73a0896988f053e4fbb7de6d93388e6dd292b0d87ee51d106f2c11b465b" }, - { file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_aarch64.whl", hash = "sha256:4421712dbfc5562150f7554f13dde997a2e932a6b5f352edcce948a815efee6f" }, - { file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_i686.whl", hash = "sha256:166811d20dfea725e2e4baa71fffd6c968a958577848d2131f39b60043400223" }, - { file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_x86_64.whl", hash = "sha256:225667980479a17db1048cb2bf8bfb39b8e5be8f164b8f6628b64f78a72cf9d3" }, - { file = "coverage-7.6.1-cp313-cp313t-win32.whl", hash = "sha256:170d444ab405852903b7d04ea9ae9b98f98ab6d7e63e1115e82620807519797f" }, - { file = "coverage-7.6.1-cp313-cp313t-win_amd64.whl", hash = "sha256:b9f222de8cded79c49bf184bdbc06630d4c58eec9459b939b4a690c82ed05657" }, - { file = "coverage-7.6.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:6db04803b6c7291985a761004e9060b2bca08da6d04f26a7f2294b8623a0c1a0" }, - { file = "coverage-7.6.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:f1adfc8ac319e1a348af294106bc6a8458a0f1633cc62a1446aebc30c5fa186a" }, - { file = "coverage-7.6.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a95324a9de9650a729239daea117df21f4b9868ce32e63f8b650ebe6cef5595b" }, - { file = "coverage-7.6.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b43c03669dc4618ec25270b06ecd3ee4fa94c7f9b3c14bae6571ca00ef98b0d3" }, - { file = "coverage-7.6.1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8929543a7192c13d177b770008bc4e8119f2e1f881d563fc6b6305d2d0ebe9de" }, - { file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:a09ece4a69cf399510c8ab25e0950d9cf2b42f7b3cb0374f95d2e2ff594478a6" }, - { file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:9054a0754de38d9dbd01a46621636689124d666bad1936d76c0341f7d71bf569" }, - { file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:0dbde0f4aa9a16fa4d754356a8f2e36296ff4d83994b2c9d8398aa32f222f989" }, - { file = "coverage-7.6.1-cp38-cp38-win32.whl", hash = "sha256:da511e6ad4f7323ee5702e6633085fb76c2f893aaf8ce4c51a0ba4fc07580ea7" }, - { file = "coverage-7.6.1-cp38-cp38-win_amd64.whl", hash = "sha256:3f1156e3e8f2872197af3840d8ad307a9dd18e615dc64d9ee41696f287c57ad8" }, - { file = "coverage-7.6.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:abd5fd0db5f4dc9289408aaf34908072f805ff7792632250dcb36dc591d24255" }, - { file = "coverage-7.6.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:547f45fa1a93154bd82050a7f3cddbc1a7a4dd2a9bf5cb7d06f4ae29fe94eaf8" }, - { file = "coverage-7.6.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:645786266c8f18a931b65bfcefdbf6952dd0dea98feee39bd188607a9d307ed2" }, - { file = "coverage-7.6.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9e0b2df163b8ed01d515807af24f63de04bebcecbd6c3bfeff88385789fdf75a" }, - { file = "coverage-7.6.1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:609b06f178fe8e9f89ef676532760ec0b4deea15e9969bf754b37f7c40326dbc" }, - { file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:702855feff378050ae4f741045e19a32d57d19f3e0676d589df0575008ea5004" }, - { file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:2bdb062ea438f22d99cba0d7829c2ef0af1d768d1e4a4f528087224c90b132cb" }, - { file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:9c56863d44bd1c4fe2abb8a4d6f5371d197f1ac0ebdee542f07f35895fc07f36" }, - { file = "coverage-7.6.1-cp39-cp39-win32.whl", hash = "sha256:6e2cd258d7d927d09493c8df1ce9174ad01b381d4729a9d8d4e38670ca24774c" }, - { file = "coverage-7.6.1-cp39-cp39-win_amd64.whl", hash = "sha256:06a737c882bd26d0d6ee7269b20b12f14a8704807a01056c80bb881a4b2ce6ca" }, - { file = "coverage-7.6.1-pp38.pp39.pp310-none-any.whl", hash = "sha256:e9a6e0eb86070e8ccaedfbd9d38fec54864f3125ab95419970575b42af7541df" }, - { file = "coverage-7.6.1.tar.gz", hash = "sha256:953510dfb7b12ab69d20135a0662397f077c59b1e6379a768e97c59d852ee51d" }, + {file = "coverage-7.6.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:b06079abebbc0e89e6163b8e8f0e16270124c154dc6e4a47b413dd538859af16"}, + {file = "coverage-7.6.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:cf4b19715bccd7ee27b6b120e7e9dd56037b9c0681dcc1adc9ba9db3d417fa36"}, + {file = "coverage-7.6.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e61c0abb4c85b095a784ef23fdd4aede7a2628478e7baba7c5e3deba61070a02"}, + {file = "coverage-7.6.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:fd21f6ae3f08b41004dfb433fa895d858f3f5979e7762d052b12aef444e29afc"}, + {file = "coverage-7.6.1-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8f59d57baca39b32db42b83b2a7ba6f47ad9c394ec2076b084c3f029b7afca23"}, + {file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:a1ac0ae2b8bd743b88ed0502544847c3053d7171a3cff9228af618a068ed9c34"}, + {file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:e6a08c0be454c3b3beb105c0596ebdc2371fab6bb90c0c0297f4e58fd7e1012c"}, + {file = "coverage-7.6.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:f5796e664fe802da4f57a168c85359a8fbf3eab5e55cd4e4569fbacecc903959"}, + {file = "coverage-7.6.1-cp310-cp310-win32.whl", hash = "sha256:7bb65125fcbef8d989fa1dd0e8a060999497629ca5b0efbca209588a73356232"}, + {file = "coverage-7.6.1-cp310-cp310-win_amd64.whl", hash = "sha256:3115a95daa9bdba70aea750db7b96b37259a81a709223c8448fa97727d546fe0"}, + {file = "coverage-7.6.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:7dea0889685db8550f839fa202744652e87c60015029ce3f60e006f8c4462c93"}, + {file = "coverage-7.6.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:ed37bd3c3b063412f7620464a9ac1314d33100329f39799255fb8d3027da50d3"}, + {file = "coverage-7.6.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d85f5e9a5f8b73e2350097c3756ef7e785f55bd71205defa0bfdaf96c31616ff"}, + {file = "coverage-7.6.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9bc572be474cafb617672c43fe989d6e48d3c83af02ce8de73fff1c6bb3c198d"}, + {file = "coverage-7.6.1-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0c0420b573964c760df9e9e86d1a9a622d0d27f417e1a949a8a66dd7bcee7bc6"}, + {file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:1f4aa8219db826ce6be7099d559f8ec311549bfc4046f7f9fe9b5cea5c581c56"}, + {file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:fc5a77d0c516700ebad189b587de289a20a78324bc54baee03dd486f0855d234"}, + {file = "coverage-7.6.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:b48f312cca9621272ae49008c7f613337c53fadca647d6384cc129d2996d1133"}, + {file = "coverage-7.6.1-cp311-cp311-win32.whl", hash = "sha256:1125ca0e5fd475cbbba3bb67ae20bd2c23a98fac4e32412883f9bcbaa81c314c"}, + {file = "coverage-7.6.1-cp311-cp311-win_amd64.whl", hash = "sha256:8ae539519c4c040c5ffd0632784e21b2f03fc1340752af711f33e5be83a9d6c6"}, + {file = "coverage-7.6.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:95cae0efeb032af8458fc27d191f85d1717b1d4e49f7cb226cf526ff28179778"}, + {file = "coverage-7.6.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:5621a9175cf9d0b0c84c2ef2b12e9f5f5071357c4d2ea6ca1cf01814f45d2391"}, + {file = "coverage-7.6.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:260933720fdcd75340e7dbe9060655aff3af1f0c5d20f46b57f262ab6c86a5e8"}, + {file = "coverage-7.6.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:07e2ca0ad381b91350c0ed49d52699b625aab2b44b65e1b4e02fa9df0e92ad2d"}, + {file = "coverage-7.6.1-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c44fee9975f04b33331cb8eb272827111efc8930cfd582e0320613263ca849ca"}, + {file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:877abb17e6339d96bf08e7a622d05095e72b71f8afd8a9fefc82cf30ed944163"}, + {file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:3e0cadcf6733c09154b461f1ca72d5416635e5e4ec4e536192180d34ec160f8a"}, + {file = "coverage-7.6.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:c3c02d12f837d9683e5ab2f3d9844dc57655b92c74e286c262e0fc54213c216d"}, + {file = "coverage-7.6.1-cp312-cp312-win32.whl", hash = "sha256:e05882b70b87a18d937ca6768ff33cc3f72847cbc4de4491c8e73880766718e5"}, + {file = "coverage-7.6.1-cp312-cp312-win_amd64.whl", hash = "sha256:b5d7b556859dd85f3a541db6a4e0167b86e7273e1cdc973e5b175166bb634fdb"}, + {file = "coverage-7.6.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:a4acd025ecc06185ba2b801f2de85546e0b8ac787cf9d3b06e7e2a69f925b106"}, + {file = "coverage-7.6.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:a6d3adcf24b624a7b778533480e32434a39ad8fa30c315208f6d3e5542aeb6e9"}, + {file = "coverage-7.6.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d0c212c49b6c10e6951362f7c6df3329f04c2b1c28499563d4035d964ab8e08c"}, + {file = "coverage-7.6.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:6e81d7a3e58882450ec4186ca59a3f20a5d4440f25b1cff6f0902ad890e6748a"}, + {file = "coverage-7.6.1-cp313-cp313-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:78b260de9790fd81e69401c2dc8b17da47c8038176a79092a89cb2b7d945d060"}, + {file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:a78d169acd38300060b28d600344a803628c3fd585c912cacc9ea8790fe96862"}, + {file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:2c09f4ce52cb99dd7505cd0fc8e0e37c77b87f46bc9c1eb03fe3bc9991085388"}, + {file = "coverage-7.6.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:6878ef48d4227aace338d88c48738a4258213cd7b74fd9a3d4d7582bb1d8a155"}, + {file = "coverage-7.6.1-cp313-cp313-win32.whl", hash = "sha256:44df346d5215a8c0e360307d46ffaabe0f5d3502c8a1cefd700b34baf31d411a"}, + {file = "coverage-7.6.1-cp313-cp313-win_amd64.whl", hash = "sha256:8284cf8c0dd272a247bc154eb6c95548722dce90d098c17a883ed36e67cdb129"}, + {file = "coverage-7.6.1-cp313-cp313t-macosx_10_13_x86_64.whl", hash = "sha256:d3296782ca4eab572a1a4eca686d8bfb00226300dcefdf43faa25b5242ab8a3e"}, + {file = "coverage-7.6.1-cp313-cp313t-macosx_11_0_arm64.whl", hash = "sha256:502753043567491d3ff6d08629270127e0c31d4184c4c8d98f92c26f65019962"}, + {file = "coverage-7.6.1-cp313-cp313t-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:6a89ecca80709d4076b95f89f308544ec8f7b4727e8a547913a35f16717856cb"}, + {file = "coverage-7.6.1-cp313-cp313t-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a318d68e92e80af8b00fa99609796fdbcdfef3629c77c6283566c6f02c6d6704"}, + {file = "coverage-7.6.1-cp313-cp313t-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:13b0a73a0896988f053e4fbb7de6d93388e6dd292b0d87ee51d106f2c11b465b"}, + {file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_aarch64.whl", hash = "sha256:4421712dbfc5562150f7554f13dde997a2e932a6b5f352edcce948a815efee6f"}, + {file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_i686.whl", hash = "sha256:166811d20dfea725e2e4baa71fffd6c968a958577848d2131f39b60043400223"}, + {file = "coverage-7.6.1-cp313-cp313t-musllinux_1_2_x86_64.whl", hash = "sha256:225667980479a17db1048cb2bf8bfb39b8e5be8f164b8f6628b64f78a72cf9d3"}, + {file = "coverage-7.6.1-cp313-cp313t-win32.whl", hash = "sha256:170d444ab405852903b7d04ea9ae9b98f98ab6d7e63e1115e82620807519797f"}, + {file = "coverage-7.6.1-cp313-cp313t-win_amd64.whl", hash = "sha256:b9f222de8cded79c49bf184bdbc06630d4c58eec9459b939b4a690c82ed05657"}, + {file = "coverage-7.6.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:6db04803b6c7291985a761004e9060b2bca08da6d04f26a7f2294b8623a0c1a0"}, + {file = "coverage-7.6.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:f1adfc8ac319e1a348af294106bc6a8458a0f1633cc62a1446aebc30c5fa186a"}, + {file = "coverage-7.6.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a95324a9de9650a729239daea117df21f4b9868ce32e63f8b650ebe6cef5595b"}, + {file = "coverage-7.6.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b43c03669dc4618ec25270b06ecd3ee4fa94c7f9b3c14bae6571ca00ef98b0d3"}, + {file = "coverage-7.6.1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8929543a7192c13d177b770008bc4e8119f2e1f881d563fc6b6305d2d0ebe9de"}, + {file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:a09ece4a69cf399510c8ab25e0950d9cf2b42f7b3cb0374f95d2e2ff594478a6"}, + {file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:9054a0754de38d9dbd01a46621636689124d666bad1936d76c0341f7d71bf569"}, + {file = "coverage-7.6.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:0dbde0f4aa9a16fa4d754356a8f2e36296ff4d83994b2c9d8398aa32f222f989"}, + {file = "coverage-7.6.1-cp38-cp38-win32.whl", hash = "sha256:da511e6ad4f7323ee5702e6633085fb76c2f893aaf8ce4c51a0ba4fc07580ea7"}, + {file = "coverage-7.6.1-cp38-cp38-win_amd64.whl", hash = "sha256:3f1156e3e8f2872197af3840d8ad307a9dd18e615dc64d9ee41696f287c57ad8"}, + {file = "coverage-7.6.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:abd5fd0db5f4dc9289408aaf34908072f805ff7792632250dcb36dc591d24255"}, + {file = "coverage-7.6.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:547f45fa1a93154bd82050a7f3cddbc1a7a4dd2a9bf5cb7d06f4ae29fe94eaf8"}, + {file = "coverage-7.6.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:645786266c8f18a931b65bfcefdbf6952dd0dea98feee39bd188607a9d307ed2"}, + {file = "coverage-7.6.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9e0b2df163b8ed01d515807af24f63de04bebcecbd6c3bfeff88385789fdf75a"}, + {file = "coverage-7.6.1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:609b06f178fe8e9f89ef676532760ec0b4deea15e9969bf754b37f7c40326dbc"}, + {file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:702855feff378050ae4f741045e19a32d57d19f3e0676d589df0575008ea5004"}, + {file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:2bdb062ea438f22d99cba0d7829c2ef0af1d768d1e4a4f528087224c90b132cb"}, + {file = "coverage-7.6.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:9c56863d44bd1c4fe2abb8a4d6f5371d197f1ac0ebdee542f07f35895fc07f36"}, + {file = "coverage-7.6.1-cp39-cp39-win32.whl", hash = "sha256:6e2cd258d7d927d09493c8df1ce9174ad01b381d4729a9d8d4e38670ca24774c"}, + {file = "coverage-7.6.1-cp39-cp39-win_amd64.whl", hash = "sha256:06a737c882bd26d0d6ee7269b20b12f14a8704807a01056c80bb881a4b2ce6ca"}, + {file = "coverage-7.6.1-pp38.pp39.pp310-none-any.whl", hash = "sha256:e9a6e0eb86070e8ccaedfbd9d38fec54864f3125ab95419970575b42af7541df"}, + {file = "coverage-7.6.1.tar.gz", hash = "sha256:953510dfb7b12ab69d20135a0662397f077c59b1e6379a768e97c59d852ee51d"}, ] [package.dependencies] -tomli = { version = "*", optional = true, markers = "python_full_version <= \"3.11.0a6\" and extra == \"toml\"" } +tomli = {version = "*", optional = true, markers = "python_full_version <= \"3.11.0a6\" and extra == \"toml\""} [package.extras] toml = ["tomli ; python_full_version <= \"3.11.0a6\""] @@ -357,37 +357,37 @@ optional = false python-versions = ">=3.7" groups = ["main"] files = [ - { file = "cryptography-43.0.3-cp37-abi3-macosx_10_9_universal2.whl", hash = "sha256:bf7a1932ac4176486eab36a19ed4c0492da5d97123f1406cf15e41b05e787d2e" }, - { file = "cryptography-43.0.3-cp37-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:63efa177ff54aec6e1c0aefaa1a241232dcd37413835a9b674b6e3f0ae2bfd3e" }, - { file = "cryptography-43.0.3-cp37-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7e1ce50266f4f70bf41a2c6dc4358afadae90e2a1e5342d3c08883df1675374f" }, - { file = "cryptography-43.0.3-cp37-abi3-manylinux_2_28_aarch64.whl", hash = "sha256:443c4a81bb10daed9a8f334365fe52542771f25aedaf889fd323a853ce7377d6" }, - { file = "cryptography-43.0.3-cp37-abi3-manylinux_2_28_x86_64.whl", hash = "sha256:74f57f24754fe349223792466a709f8e0c093205ff0dca557af51072ff47ab18" }, - { file = "cryptography-43.0.3-cp37-abi3-musllinux_1_2_aarch64.whl", hash = "sha256:9762ea51a8fc2a88b70cf2995e5675b38d93bf36bd67d91721c309df184f49bd" }, - { file = "cryptography-43.0.3-cp37-abi3-musllinux_1_2_x86_64.whl", hash = "sha256:81ef806b1fef6b06dcebad789f988d3b37ccaee225695cf3e07648eee0fc6b73" }, - { file = "cryptography-43.0.3-cp37-abi3-win32.whl", hash = "sha256:cbeb489927bd7af4aa98d4b261af9a5bc025bd87f0e3547e11584be9e9427be2" }, - { file = "cryptography-43.0.3-cp37-abi3-win_amd64.whl", hash = "sha256:f46304d6f0c6ab8e52770addfa2fc41e6629495548862279641972b6215451cd" }, - { file = "cryptography-43.0.3-cp39-abi3-macosx_10_9_universal2.whl", hash = "sha256:8ac43ae87929a5982f5948ceda07001ee5e83227fd69cf55b109144938d96984" }, - { file = "cryptography-43.0.3-cp39-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:846da004a5804145a5f441b8530b4bf35afbf7da70f82409f151695b127213d5" }, - { file = "cryptography-43.0.3-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0f996e7268af62598f2fc1204afa98a3b5712313a55c4c9d434aef49cadc91d4" }, - { file = "cryptography-43.0.3-cp39-abi3-manylinux_2_28_aarch64.whl", hash = "sha256:f7b178f11ed3664fd0e995a47ed2b5ff0a12d893e41dd0494f406d1cf555cab7" }, - { file = "cryptography-43.0.3-cp39-abi3-manylinux_2_28_x86_64.whl", hash = "sha256:c2e6fc39c4ab499049df3bdf567f768a723a5e8464816e8f009f121a5a9f4405" }, - { file = "cryptography-43.0.3-cp39-abi3-musllinux_1_2_aarch64.whl", hash = "sha256:e1be4655c7ef6e1bbe6b5d0403526601323420bcf414598955968c9ef3eb7d16" }, - { file = "cryptography-43.0.3-cp39-abi3-musllinux_1_2_x86_64.whl", hash = "sha256:df6b6c6d742395dd77a23ea3728ab62f98379eff8fb61be2744d4679ab678f73" }, - { file = "cryptography-43.0.3-cp39-abi3-win32.whl", hash = "sha256:d56e96520b1020449bbace2b78b603442e7e378a9b3bd68de65c782db1507995" }, - { file = "cryptography-43.0.3-cp39-abi3-win_amd64.whl", hash = "sha256:0c580952eef9bf68c4747774cde7ec1d85a6e61de97281f2dba83c7d2c806362" }, - { file = "cryptography-43.0.3-pp310-pypy310_pp73-macosx_10_9_x86_64.whl", hash = "sha256:d03b5621a135bffecad2c73e9f4deb1a0f977b9a8ffe6f8e002bf6c9d07b918c" }, - { file = "cryptography-43.0.3-pp310-pypy310_pp73-manylinux_2_28_aarch64.whl", hash = "sha256:a2a431ee15799d6db9fe80c82b055bae5a752bef645bba795e8e52687c69efe3" }, - { file = "cryptography-43.0.3-pp310-pypy310_pp73-manylinux_2_28_x86_64.whl", hash = "sha256:281c945d0e28c92ca5e5930664c1cefd85efe80e5c0d2bc58dd63383fda29f83" }, - { file = "cryptography-43.0.3-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:f18c716be16bc1fea8e95def49edf46b82fccaa88587a45f8dc0ff6ab5d8e0a7" }, - { file = "cryptography-43.0.3-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:4a02ded6cd4f0a5562a8887df8b3bd14e822a90f97ac5e544c162899bc467664" }, - { file = "cryptography-43.0.3-pp39-pypy39_pp73-manylinux_2_28_aarch64.whl", hash = "sha256:53a583b6637ab4c4e3591a15bc9db855b8d9dee9a669b550f311480acab6eb08" }, - { file = "cryptography-43.0.3-pp39-pypy39_pp73-manylinux_2_28_x86_64.whl", hash = "sha256:1ec0bcf7e17c0c5669d881b1cd38c4972fade441b27bda1051665faaa89bdcaa" }, - { file = "cryptography-43.0.3-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:2ce6fae5bdad59577b44e4dfed356944fbf1d925269114c28be377692643b4ff" }, - { file = "cryptography-43.0.3.tar.gz", hash = "sha256:315b9001266a492a6ff443b61238f956b214dbec9910a081ba5b6646a055a805" }, + {file = "cryptography-43.0.3-cp37-abi3-macosx_10_9_universal2.whl", hash = "sha256:bf7a1932ac4176486eab36a19ed4c0492da5d97123f1406cf15e41b05e787d2e"}, + {file = "cryptography-43.0.3-cp37-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:63efa177ff54aec6e1c0aefaa1a241232dcd37413835a9b674b6e3f0ae2bfd3e"}, + {file = "cryptography-43.0.3-cp37-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7e1ce50266f4f70bf41a2c6dc4358afadae90e2a1e5342d3c08883df1675374f"}, + {file = "cryptography-43.0.3-cp37-abi3-manylinux_2_28_aarch64.whl", hash = "sha256:443c4a81bb10daed9a8f334365fe52542771f25aedaf889fd323a853ce7377d6"}, + {file = "cryptography-43.0.3-cp37-abi3-manylinux_2_28_x86_64.whl", hash = "sha256:74f57f24754fe349223792466a709f8e0c093205ff0dca557af51072ff47ab18"}, + {file = "cryptography-43.0.3-cp37-abi3-musllinux_1_2_aarch64.whl", hash = "sha256:9762ea51a8fc2a88b70cf2995e5675b38d93bf36bd67d91721c309df184f49bd"}, + {file = "cryptography-43.0.3-cp37-abi3-musllinux_1_2_x86_64.whl", hash = "sha256:81ef806b1fef6b06dcebad789f988d3b37ccaee225695cf3e07648eee0fc6b73"}, + {file = "cryptography-43.0.3-cp37-abi3-win32.whl", hash = "sha256:cbeb489927bd7af4aa98d4b261af9a5bc025bd87f0e3547e11584be9e9427be2"}, + {file = "cryptography-43.0.3-cp37-abi3-win_amd64.whl", hash = "sha256:f46304d6f0c6ab8e52770addfa2fc41e6629495548862279641972b6215451cd"}, + {file = "cryptography-43.0.3-cp39-abi3-macosx_10_9_universal2.whl", hash = "sha256:8ac43ae87929a5982f5948ceda07001ee5e83227fd69cf55b109144938d96984"}, + {file = "cryptography-43.0.3-cp39-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:846da004a5804145a5f441b8530b4bf35afbf7da70f82409f151695b127213d5"}, + {file = "cryptography-43.0.3-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0f996e7268af62598f2fc1204afa98a3b5712313a55c4c9d434aef49cadc91d4"}, + {file = "cryptography-43.0.3-cp39-abi3-manylinux_2_28_aarch64.whl", hash = "sha256:f7b178f11ed3664fd0e995a47ed2b5ff0a12d893e41dd0494f406d1cf555cab7"}, + {file = "cryptography-43.0.3-cp39-abi3-manylinux_2_28_x86_64.whl", hash = "sha256:c2e6fc39c4ab499049df3bdf567f768a723a5e8464816e8f009f121a5a9f4405"}, + {file = "cryptography-43.0.3-cp39-abi3-musllinux_1_2_aarch64.whl", hash = "sha256:e1be4655c7ef6e1bbe6b5d0403526601323420bcf414598955968c9ef3eb7d16"}, + {file = "cryptography-43.0.3-cp39-abi3-musllinux_1_2_x86_64.whl", hash = "sha256:df6b6c6d742395dd77a23ea3728ab62f98379eff8fb61be2744d4679ab678f73"}, + {file = "cryptography-43.0.3-cp39-abi3-win32.whl", hash = "sha256:d56e96520b1020449bbace2b78b603442e7e378a9b3bd68de65c782db1507995"}, + {file = "cryptography-43.0.3-cp39-abi3-win_amd64.whl", hash = "sha256:0c580952eef9bf68c4747774cde7ec1d85a6e61de97281f2dba83c7d2c806362"}, + {file = "cryptography-43.0.3-pp310-pypy310_pp73-macosx_10_9_x86_64.whl", hash = "sha256:d03b5621a135bffecad2c73e9f4deb1a0f977b9a8ffe6f8e002bf6c9d07b918c"}, + {file = "cryptography-43.0.3-pp310-pypy310_pp73-manylinux_2_28_aarch64.whl", hash = "sha256:a2a431ee15799d6db9fe80c82b055bae5a752bef645bba795e8e52687c69efe3"}, + {file = "cryptography-43.0.3-pp310-pypy310_pp73-manylinux_2_28_x86_64.whl", hash = "sha256:281c945d0e28c92ca5e5930664c1cefd85efe80e5c0d2bc58dd63383fda29f83"}, + {file = "cryptography-43.0.3-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:f18c716be16bc1fea8e95def49edf46b82fccaa88587a45f8dc0ff6ab5d8e0a7"}, + {file = "cryptography-43.0.3-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:4a02ded6cd4f0a5562a8887df8b3bd14e822a90f97ac5e544c162899bc467664"}, + {file = "cryptography-43.0.3-pp39-pypy39_pp73-manylinux_2_28_aarch64.whl", hash = "sha256:53a583b6637ab4c4e3591a15bc9db855b8d9dee9a669b550f311480acab6eb08"}, + {file = "cryptography-43.0.3-pp39-pypy39_pp73-manylinux_2_28_x86_64.whl", hash = "sha256:1ec0bcf7e17c0c5669d881b1cd38c4972fade441b27bda1051665faaa89bdcaa"}, + {file = "cryptography-43.0.3-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:2ce6fae5bdad59577b44e4dfed356944fbf1d925269114c28be377692643b4ff"}, + {file = "cryptography-43.0.3.tar.gz", hash = "sha256:315b9001266a492a6ff443b61238f956b214dbec9910a081ba5b6646a055a805"}, ] [package.dependencies] -cffi = { version = ">=1.12", markers = "platform_python_implementation != \"PyPy\"" } +cffi = {version = ">=1.12", markers = "platform_python_implementation != \"PyPy\""} [package.extras] docs = ["sphinx (>=5.3.0)", "sphinx-rtd-theme (>=1.1.1)"] @@ -407,8 +407,8 @@ optional = false python-versions = "*" groups = ["dev"] files = [ - { file = "deprecation-2.1.0-py2.py3-none-any.whl", hash = "sha256:a10811591210e1fb0e768a8c25517cabeabcba6f0bf96564f8ff45189f90b14a" }, - { file = "deprecation-2.1.0.tar.gz", hash = "sha256:72b3bde64e5d778694b0cf68178aed03d15e15477116add3fb773e581f9518ff" }, + {file = "deprecation-2.1.0-py2.py3-none-any.whl", hash = "sha256:a10811591210e1fb0e768a8c25517cabeabcba6f0bf96564f8ff45189f90b14a"}, + {file = "deprecation-2.1.0.tar.gz", hash = "sha256:72b3bde64e5d778694b0cf68178aed03d15e15477116add3fb773e581f9518ff"}, ] [package.dependencies] @@ -422,8 +422,8 @@ optional = false python-versions = "*" groups = ["dev"] files = [ - { file = "distlib-0.3.9-py2.py3-none-any.whl", hash = "sha256:47f8c22fd27c27e25a65601af709b38e4f0a45ea4fc2e710f65755fa8caaaf87" }, - { file = "distlib-0.3.9.tar.gz", hash = "sha256:a60f20dea646b8a33f3e7772f74dc0b2d0772d2837ee1342a00645c81edf9403" }, + {file = "distlib-0.3.9-py2.py3-none-any.whl", hash = "sha256:47f8c22fd27c27e25a65601af709b38e4f0a45ea4fc2e710f65755fa8caaaf87"}, + {file = "distlib-0.3.9.tar.gz", hash = "sha256:a60f20dea646b8a33f3e7772f74dc0b2d0772d2837ee1342a00645c81edf9403"}, ] [[package]] @@ -434,12 +434,12 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "docker-7.1.0-py3-none-any.whl", hash = "sha256:c96b93b7f0a746f9e77d325bcfb87422a3d8bd4f03136ae8a85b37f1898d5fc0" }, - { file = "docker-7.1.0.tar.gz", hash = "sha256:ad8c70e6e3f8926cb8a92619b832b4ea5299e2831c14284663184e200546fa6c" }, + {file = "docker-7.1.0-py3-none-any.whl", hash = "sha256:c96b93b7f0a746f9e77d325bcfb87422a3d8bd4f03136ae8a85b37f1898d5fc0"}, + {file = "docker-7.1.0.tar.gz", hash = "sha256:ad8c70e6e3f8926cb8a92619b832b4ea5299e2831c14284663184e200546fa6c"}, ] [package.dependencies] -pywin32 = { version = ">=304", markers = "sys_platform == \"win32\"" } +pywin32 = {version = ">=304", markers = "sys_platform == \"win32\""} requests = ">=2.26.0" urllib3 = ">=1.26.0" @@ -458,8 +458,8 @@ python-versions = ">=3.7" groups = ["dev"] markers = "python_version < \"3.11\"" files = [ - { file = "exceptiongroup-1.2.2-py3-none-any.whl", hash = "sha256:3111b9d131c238bec2f8f516e123e14ba243563fb135d3fe885990585aa7795b" }, - { file = "exceptiongroup-1.2.2.tar.gz", hash = "sha256:47c2edf7c6738fafb49fd34290706d1a1a2f4d1c6df275526b62cbb4aa5393cc" }, + {file = "exceptiongroup-1.2.2-py3-none-any.whl", hash = "sha256:3111b9d131c238bec2f8f516e123e14ba243563fb135d3fe885990585aa7795b"}, + {file = "exceptiongroup-1.2.2.tar.gz", hash = "sha256:47c2edf7c6738fafb49fd34290706d1a1a2f4d1c6df275526b62cbb4aa5393cc"}, ] [package.extras] @@ -473,8 +473,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "filelock-3.16.1-py3-none-any.whl", hash = "sha256:2082e5703d51fbf98ea75855d9d5527e33d8ff23099bec374a134febee6946b0" }, - { file = "filelock-3.16.1.tar.gz", hash = "sha256:c249fbfcd5db47e5e2d6d62198e565475ee65e4831e2561c8e313fa7eb961435" }, + {file = "filelock-3.16.1-py3-none-any.whl", hash = "sha256:2082e5703d51fbf98ea75855d9d5527e33d8ff23099bec374a134febee6946b0"}, + {file = "filelock-3.16.1.tar.gz", hash = "sha256:c249fbfcd5db47e5e2d6d62198e565475ee65e4831e2561c8e313fa7eb961435"}, ] [package.extras] @@ -490,8 +490,8 @@ optional = false python-versions = ">=3.6.1" groups = ["dev"] files = [ - { file = "flake8-5.0.4-py2.py3-none-any.whl", hash = "sha256:7a1cf6b73744f5806ab95e526f6f0d8c01c66d7bbe349562d22dfca20610b248" }, - { file = "flake8-5.0.4.tar.gz", hash = "sha256:6fbe320aad8d6b95cec8b8e47bc933004678dc63095be98528b7bdd2a9f510db" }, + {file = "flake8-5.0.4-py2.py3-none-any.whl", hash = "sha256:7a1cf6b73744f5806ab95e526f6f0d8c01c66d7bbe349562d22dfca20610b248"}, + {file = "flake8-5.0.4.tar.gz", hash = "sha256:6fbe320aad8d6b95cec8b8e47bc933004678dc63095be98528b7bdd2a9f510db"}, ] [package.dependencies] @@ -507,8 +507,8 @@ optional = false python-versions = ">=3.6" groups = ["dev"] files = [ - { file = "idna-3.10-py3-none-any.whl", hash = "sha256:946d195a0d259cbba61165e88e65941f16e9b36ea6ddb97f00452bae8b1287d3" }, - { file = "idna-3.10.tar.gz", hash = "sha256:12f65c9b470abda6dc35cf8e63cc574b1c52b11df2c86030af0ac09b01b13ea9" }, + {file = "idna-3.10-py3-none-any.whl", hash = "sha256:946d195a0d259cbba61165e88e65941f16e9b36ea6ddb97f00452bae8b1287d3"}, + {file = "idna-3.10.tar.gz", hash = "sha256:12f65c9b470abda6dc35cf8e63cc574b1c52b11df2c86030af0ac09b01b13ea9"}, ] [package.extras] @@ -522,8 +522,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "iniconfig-2.1.0-py3-none-any.whl", hash = "sha256:9deba5723312380e77435581c6bf4935c94cbfab9b1ed33ef8d238ea168eb760" }, - { file = "iniconfig-2.1.0.tar.gz", hash = "sha256:3abbd2e30b36733fee78f9c7f7308f2d0050e88f0087fd25c2645f63c773e1c7" }, + {file = "iniconfig-2.1.0-py3-none-any.whl", hash = "sha256:9deba5723312380e77435581c6bf4935c94cbfab9b1ed33ef8d238ea168eb760"}, + {file = "iniconfig-2.1.0.tar.gz", hash = "sha256:3abbd2e30b36733fee78f9c7f7308f2d0050e88f0087fd25c2645f63c773e1c7"}, ] [[package]] @@ -534,8 +534,8 @@ optional = false python-versions = ">=3.6" groups = ["dev"] files = [ - { file = "mccabe-0.7.0-py2.py3-none-any.whl", hash = "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" }, - { file = "mccabe-0.7.0.tar.gz", hash = "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325" }, + {file = "mccabe-0.7.0-py2.py3-none-any.whl", hash = "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e"}, + {file = "mccabe-0.7.0.tar.gz", hash = "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325"}, ] [[package]] @@ -546,49 +546,49 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "mypy-1.14.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:52686e37cf13d559f668aa398dd7ddf1f92c5d613e4f8cb262be2fb4fedb0fcb" }, - { file = "mypy-1.14.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:1fb545ca340537d4b45d3eecdb3def05e913299ca72c290326be19b3804b39c0" }, - { file = "mypy-1.14.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:90716d8b2d1f4cd503309788e51366f07c56635a3309b0f6a32547eaaa36a64d" }, - { file = "mypy-1.14.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:2ae753f5c9fef278bcf12e1a564351764f2a6da579d4a81347e1d5a15819997b" }, - { file = "mypy-1.14.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:e0fe0f5feaafcb04505bcf439e991c6d8f1bf8b15f12b05feeed96e9e7bf1427" }, - { file = "mypy-1.14.1-cp310-cp310-win_amd64.whl", hash = "sha256:7d54bd85b925e501c555a3227f3ec0cfc54ee8b6930bd6141ec872d1c572f81f" }, - { file = "mypy-1.14.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:f995e511de847791c3b11ed90084a7a0aafdc074ab88c5a9711622fe4751138c" }, - { file = "mypy-1.14.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:d64169ec3b8461311f8ce2fd2eb5d33e2d0f2c7b49116259c51d0d96edee48d1" }, - { file = "mypy-1.14.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:ba24549de7b89b6381b91fbc068d798192b1b5201987070319889e93038967a8" }, - { file = "mypy-1.14.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:183cf0a45457d28ff9d758730cd0210419ac27d4d3f285beda038c9083363b1f" }, - { file = "mypy-1.14.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:f2a0ecc86378f45347f586e4163d1769dd81c5a223d577fe351f26b179e148b1" }, - { file = "mypy-1.14.1-cp311-cp311-win_amd64.whl", hash = "sha256:ad3301ebebec9e8ee7135d8e3109ca76c23752bac1e717bc84cd3836b4bf3eae" }, - { file = "mypy-1.14.1-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:30ff5ef8519bbc2e18b3b54521ec319513a26f1bba19a7582e7b1f58a6e69f14" }, - { file = "mypy-1.14.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:cb9f255c18052343c70234907e2e532bc7e55a62565d64536dbc7706a20b78b9" }, - { file = "mypy-1.14.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:8b4e3413e0bddea671012b063e27591b953d653209e7a4fa5e48759cda77ca11" }, - { file = "mypy-1.14.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:553c293b1fbdebb6c3c4030589dab9fafb6dfa768995a453d8a5d3b23784af2e" }, - { file = "mypy-1.14.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:fad79bfe3b65fe6a1efaed97b445c3d37f7be9fdc348bdb2d7cac75579607c89" }, - { file = "mypy-1.14.1-cp312-cp312-win_amd64.whl", hash = "sha256:8fa2220e54d2946e94ab6dbb3ba0a992795bd68b16dc852db33028df2b00191b" }, - { file = "mypy-1.14.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:92c3ed5afb06c3a8e188cb5da4984cab9ec9a77ba956ee419c68a388b4595255" }, - { file = "mypy-1.14.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:dbec574648b3e25f43d23577309b16534431db4ddc09fda50841f1e34e64ed34" }, - { file = "mypy-1.14.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:8c6d94b16d62eb3e947281aa7347d78236688e21081f11de976376cf010eb31a" }, - { file = "mypy-1.14.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:d4b19b03fdf54f3c5b2fa474c56b4c13c9dbfb9a2db4370ede7ec11a2c5927d9" }, - { file = "mypy-1.14.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:0c911fde686394753fff899c409fd4e16e9b294c24bfd5e1ea4675deae1ac6fd" }, - { file = "mypy-1.14.1-cp313-cp313-win_amd64.whl", hash = "sha256:8b21525cb51671219f5307be85f7e646a153e5acc656e5cebf64bfa076c50107" }, - { file = "mypy-1.14.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:7084fb8f1128c76cd9cf68fe5971b37072598e7c31b2f9f95586b65c741a9d31" }, - { file = "mypy-1.14.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:8f845a00b4f420f693f870eaee5f3e2692fa84cc8514496114649cfa8fd5e2c6" }, - { file = "mypy-1.14.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:44bf464499f0e3a2d14d58b54674dee25c031703b2ffc35064bd0df2e0fac319" }, - { file = "mypy-1.14.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:c99f27732c0b7dc847adb21c9d47ce57eb48fa33a17bc6d7d5c5e9f9e7ae5bac" }, - { file = "mypy-1.14.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:bce23c7377b43602baa0bd22ea3265c49b9ff0b76eb315d6c34721af4cdf1d9b" }, - { file = "mypy-1.14.1-cp38-cp38-win_amd64.whl", hash = "sha256:8edc07eeade7ebc771ff9cf6b211b9a7d93687ff892150cb5692e4f4272b0837" }, - { file = "mypy-1.14.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:3888a1816d69f7ab92092f785a462944b3ca16d7c470d564165fe703b0970c35" }, - { file = "mypy-1.14.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:46c756a444117c43ee984bd055db99e498bc613a70bbbc120272bd13ca579fbc" }, - { file = "mypy-1.14.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:27fc248022907e72abfd8e22ab1f10e903915ff69961174784a3900a8cba9ad9" }, - { file = "mypy-1.14.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:499d6a72fb7e5de92218db961f1a66d5f11783f9ae549d214617edab5d4dbdbb" }, - { file = "mypy-1.14.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:57961db9795eb566dc1d1b4e9139ebc4c6b0cb6e7254ecde69d1552bf7613f60" }, - { file = "mypy-1.14.1-cp39-cp39-win_amd64.whl", hash = "sha256:07ba89fdcc9451f2ebb02853deb6aaaa3d2239a236669a63ab3801bbf923ef5c" }, - { file = "mypy-1.14.1-py3-none-any.whl", hash = "sha256:b66a60cc4073aeb8ae00057f9c1f64d49e90f918fbcef9a977eb121da8b8f1d1" }, - { file = "mypy-1.14.1.tar.gz", hash = "sha256:7ec88144fe9b510e8475ec2f5f251992690fcf89ccb4500b214b4226abcd32d6" }, + {file = "mypy-1.14.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:52686e37cf13d559f668aa398dd7ddf1f92c5d613e4f8cb262be2fb4fedb0fcb"}, + {file = "mypy-1.14.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:1fb545ca340537d4b45d3eecdb3def05e913299ca72c290326be19b3804b39c0"}, + {file = "mypy-1.14.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:90716d8b2d1f4cd503309788e51366f07c56635a3309b0f6a32547eaaa36a64d"}, + {file = "mypy-1.14.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:2ae753f5c9fef278bcf12e1a564351764f2a6da579d4a81347e1d5a15819997b"}, + {file = "mypy-1.14.1-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:e0fe0f5feaafcb04505bcf439e991c6d8f1bf8b15f12b05feeed96e9e7bf1427"}, + {file = "mypy-1.14.1-cp310-cp310-win_amd64.whl", hash = "sha256:7d54bd85b925e501c555a3227f3ec0cfc54ee8b6930bd6141ec872d1c572f81f"}, + {file = "mypy-1.14.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:f995e511de847791c3b11ed90084a7a0aafdc074ab88c5a9711622fe4751138c"}, + {file = "mypy-1.14.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:d64169ec3b8461311f8ce2fd2eb5d33e2d0f2c7b49116259c51d0d96edee48d1"}, + {file = "mypy-1.14.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:ba24549de7b89b6381b91fbc068d798192b1b5201987070319889e93038967a8"}, + {file = "mypy-1.14.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:183cf0a45457d28ff9d758730cd0210419ac27d4d3f285beda038c9083363b1f"}, + {file = "mypy-1.14.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:f2a0ecc86378f45347f586e4163d1769dd81c5a223d577fe351f26b179e148b1"}, + {file = "mypy-1.14.1-cp311-cp311-win_amd64.whl", hash = "sha256:ad3301ebebec9e8ee7135d8e3109ca76c23752bac1e717bc84cd3836b4bf3eae"}, + {file = "mypy-1.14.1-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:30ff5ef8519bbc2e18b3b54521ec319513a26f1bba19a7582e7b1f58a6e69f14"}, + {file = "mypy-1.14.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:cb9f255c18052343c70234907e2e532bc7e55a62565d64536dbc7706a20b78b9"}, + {file = "mypy-1.14.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:8b4e3413e0bddea671012b063e27591b953d653209e7a4fa5e48759cda77ca11"}, + {file = "mypy-1.14.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:553c293b1fbdebb6c3c4030589dab9fafb6dfa768995a453d8a5d3b23784af2e"}, + {file = "mypy-1.14.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:fad79bfe3b65fe6a1efaed97b445c3d37f7be9fdc348bdb2d7cac75579607c89"}, + {file = "mypy-1.14.1-cp312-cp312-win_amd64.whl", hash = "sha256:8fa2220e54d2946e94ab6dbb3ba0a992795bd68b16dc852db33028df2b00191b"}, + {file = "mypy-1.14.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:92c3ed5afb06c3a8e188cb5da4984cab9ec9a77ba956ee419c68a388b4595255"}, + {file = "mypy-1.14.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:dbec574648b3e25f43d23577309b16534431db4ddc09fda50841f1e34e64ed34"}, + {file = "mypy-1.14.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:8c6d94b16d62eb3e947281aa7347d78236688e21081f11de976376cf010eb31a"}, + {file = "mypy-1.14.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:d4b19b03fdf54f3c5b2fa474c56b4c13c9dbfb9a2db4370ede7ec11a2c5927d9"}, + {file = "mypy-1.14.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:0c911fde686394753fff899c409fd4e16e9b294c24bfd5e1ea4675deae1ac6fd"}, + {file = "mypy-1.14.1-cp313-cp313-win_amd64.whl", hash = "sha256:8b21525cb51671219f5307be85f7e646a153e5acc656e5cebf64bfa076c50107"}, + {file = "mypy-1.14.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:7084fb8f1128c76cd9cf68fe5971b37072598e7c31b2f9f95586b65c741a9d31"}, + {file = "mypy-1.14.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:8f845a00b4f420f693f870eaee5f3e2692fa84cc8514496114649cfa8fd5e2c6"}, + {file = "mypy-1.14.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:44bf464499f0e3a2d14d58b54674dee25c031703b2ffc35064bd0df2e0fac319"}, + {file = "mypy-1.14.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:c99f27732c0b7dc847adb21c9d47ce57eb48fa33a17bc6d7d5c5e9f9e7ae5bac"}, + {file = "mypy-1.14.1-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:bce23c7377b43602baa0bd22ea3265c49b9ff0b76eb315d6c34721af4cdf1d9b"}, + {file = "mypy-1.14.1-cp38-cp38-win_amd64.whl", hash = "sha256:8edc07eeade7ebc771ff9cf6b211b9a7d93687ff892150cb5692e4f4272b0837"}, + {file = "mypy-1.14.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:3888a1816d69f7ab92092f785a462944b3ca16d7c470d564165fe703b0970c35"}, + {file = "mypy-1.14.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:46c756a444117c43ee984bd055db99e498bc613a70bbbc120272bd13ca579fbc"}, + {file = "mypy-1.14.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.manylinux_2_28_aarch64.whl", hash = "sha256:27fc248022907e72abfd8e22ab1f10e903915ff69961174784a3900a8cba9ad9"}, + {file = "mypy-1.14.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.manylinux_2_28_x86_64.whl", hash = "sha256:499d6a72fb7e5de92218db961f1a66d5f11783f9ae549d214617edab5d4dbdbb"}, + {file = "mypy-1.14.1-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:57961db9795eb566dc1d1b4e9139ebc4c6b0cb6e7254ecde69d1552bf7613f60"}, + {file = "mypy-1.14.1-cp39-cp39-win_amd64.whl", hash = "sha256:07ba89fdcc9451f2ebb02853deb6aaaa3d2239a236669a63ab3801bbf923ef5c"}, + {file = "mypy-1.14.1-py3-none-any.whl", hash = "sha256:b66a60cc4073aeb8ae00057f9c1f64d49e90f918fbcef9a977eb121da8b8f1d1"}, + {file = "mypy-1.14.1.tar.gz", hash = "sha256:7ec88144fe9b510e8475ec2f5f251992690fcf89ccb4500b214b4226abcd32d6"}, ] [package.dependencies] mypy_extensions = ">=1.0.0" -tomli = { version = ">=1.1.0", markers = "python_version < \"3.11\"" } +tomli = {version = ">=1.1.0", markers = "python_version < \"3.11\""} typing_extensions = ">=4.6.0" [package.extras] @@ -606,8 +606,8 @@ optional = false python-versions = ">=3.5" groups = ["dev"] files = [ - { file = "mypy_extensions-1.0.0-py3-none-any.whl", hash = "sha256:4392f6c0eb8a5668a69e23d168ffa70f0be9ccfd32b5cc2d26a34ae5b844552d" }, - { file = "mypy_extensions-1.0.0.tar.gz", hash = "sha256:75dbf8955dc00442a438fc4d0666508a9a97b6bd41aa2f0ffe9d2f2725af0782" }, + {file = "mypy_extensions-1.0.0-py3-none-any.whl", hash = "sha256:4392f6c0eb8a5668a69e23d168ffa70f0be9ccfd32b5cc2d26a34ae5b844552d"}, + {file = "mypy_extensions-1.0.0.tar.gz", hash = "sha256:75dbf8955dc00442a438fc4d0666508a9a97b6bd41aa2f0ffe9d2f2725af0782"}, ] [[package]] @@ -618,8 +618,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "packaging-24.2-py3-none-any.whl", hash = "sha256:09abb1bccd265c01f4a3aa3f7a7db064b36514d2cba19a2f694fe6150451a759" }, - { file = "packaging-24.2.tar.gz", hash = "sha256:c228a6dc5e932d346bc5739379109d49e8853dd8223571c7c5b55260edc0b97f" }, + {file = "packaging-24.2-py3-none-any.whl", hash = "sha256:09abb1bccd265c01f4a3aa3f7a7db064b36514d2cba19a2f694fe6150451a759"}, + {file = "packaging-24.2.tar.gz", hash = "sha256:c228a6dc5e932d346bc5739379109d49e8853dd8223571c7c5b55260edc0b97f"}, ] [[package]] @@ -630,8 +630,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "platformdirs-4.3.6-py3-none-any.whl", hash = "sha256:73e575e1408ab8103900836b97580d5307456908a03e92031bab39e4554cc3fb" }, - { file = "platformdirs-4.3.6.tar.gz", hash = "sha256:357fb2acbc885b0419afd3ce3ed34564c13c9b95c89360cd9563f73aa5e2b907" }, + {file = "platformdirs-4.3.6-py3-none-any.whl", hash = "sha256:73e575e1408ab8103900836b97580d5307456908a03e92031bab39e4554cc3fb"}, + {file = "platformdirs-4.3.6.tar.gz", hash = "sha256:357fb2acbc885b0419afd3ce3ed34564c13c9b95c89360cd9563f73aa5e2b907"}, ] [package.extras] @@ -647,8 +647,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "pluggy-1.5.0-py3-none-any.whl", hash = "sha256:44e1ad92c8ca002de6377e165f3e0f1be63266ab4d554740532335b9d75ea669" }, - { file = "pluggy-1.5.0.tar.gz", hash = "sha256:2cffa88e94fdc978c4c574f15f9e59b7f4201d439195c3715ca9e2486f1d0cf1" }, + {file = "pluggy-1.5.0-py3-none-any.whl", hash = "sha256:44e1ad92c8ca002de6377e165f3e0f1be63266ab4d554740532335b9d75ea669"}, + {file = "pluggy-1.5.0.tar.gz", hash = "sha256:2cffa88e94fdc978c4c574f15f9e59b7f4201d439195c3715ca9e2486f1d0cf1"}, ] [package.extras] @@ -663,8 +663,8 @@ optional = false python-versions = ">=3.6" groups = ["dev"] files = [ - { file = "pycodestyle-2.9.1-py2.py3-none-any.whl", hash = "sha256:d1735fc58b418fd7c5f658d28d943854f8a849b01a5d0a1e6f3f3fdd0166804b" }, - { file = "pycodestyle-2.9.1.tar.gz", hash = "sha256:2c9607871d58c76354b697b42f5d57e1ada7d261c261efac224b664affdc5785" }, + {file = "pycodestyle-2.9.1-py2.py3-none-any.whl", hash = "sha256:d1735fc58b418fd7c5f658d28d943854f8a849b01a5d0a1e6f3f3fdd0166804b"}, + {file = "pycodestyle-2.9.1.tar.gz", hash = "sha256:2c9607871d58c76354b697b42f5d57e1ada7d261c261efac224b664affdc5785"}, ] [[package]] @@ -676,8 +676,8 @@ python-versions = ">=3.8" groups = ["main"] markers = "platform_python_implementation != \"PyPy\"" files = [ - { file = "pycparser-2.22-py3-none-any.whl", hash = "sha256:c3702b6d3dd8c7abc1afa565d7e63d53a1d0bd86cdc24edd75470f4de499cfcc" }, - { file = "pycparser-2.22.tar.gz", hash = "sha256:491c8be9c040f5390f5bf44a5b07752bd07f56edf992381b05c701439eec10f6" }, + {file = "pycparser-2.22-py3-none-any.whl", hash = "sha256:c3702b6d3dd8c7abc1afa565d7e63d53a1d0bd86cdc24edd75470f4de499cfcc"}, + {file = "pycparser-2.22.tar.gz", hash = "sha256:491c8be9c040f5390f5bf44a5b07752bd07f56edf992381b05c701439eec10f6"}, ] [[package]] @@ -688,8 +688,8 @@ optional = false python-versions = ">=3.8" groups = ["main"] files = [ - { file = "pydantic-2.10.6-py3-none-any.whl", hash = "sha256:427d664bf0b8a2b34ff5dd0f5a18df00591adcee7198fbd71981054cef37b584" }, - { file = "pydantic-2.10.6.tar.gz", hash = "sha256:ca5daa827cce33de7a42be142548b0096bf05a7e7b365aebfa5f8eeec7128236" }, + {file = "pydantic-2.10.6-py3-none-any.whl", hash = "sha256:427d664bf0b8a2b34ff5dd0f5a18df00591adcee7198fbd71981054cef37b584"}, + {file = "pydantic-2.10.6.tar.gz", hash = "sha256:ca5daa827cce33de7a42be142548b0096bf05a7e7b365aebfa5f8eeec7128236"}, ] [package.dependencies] @@ -709,106 +709,106 @@ optional = false python-versions = ">=3.8" groups = ["main"] files = [ - { file = "pydantic_core-2.27.2-cp310-cp310-macosx_10_12_x86_64.whl", hash = "sha256:2d367ca20b2f14095a8f4fa1210f5a7b78b8a20009ecced6b12818f455b1e9fa" }, - { file = "pydantic_core-2.27.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:491a2b73db93fab69731eaee494f320faa4e093dbed776be1a829c2eb222c34c" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7969e133a6f183be60e9f6f56bfae753585680f3b7307a8e555a948d443cc05a" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:3de9961f2a346257caf0aa508a4da705467f53778e9ef6fe744c038119737ef5" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:e2bb4d3e5873c37bb3dd58714d4cd0b0e6238cebc4177ac8fe878f8b3aa8e74c" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:280d219beebb0752699480fe8f1dc61ab6615c2046d76b7ab7ee38858de0a4e7" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:47956ae78b6422cbd46f772f1746799cbb862de838fd8d1fbd34a82e05b0983a" }, - { file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:14d4a5c49d2f009d62a2a7140d3064f686d17a5d1a268bc641954ba181880236" }, - { file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:337b443af21d488716f8d0b6164de833e788aa6bd7e3a39c005febc1284f4962" }, - { file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_armv7l.whl", hash = "sha256:03d0f86ea3184a12f41a2d23f7ccb79cdb5a18e06993f8a45baa8dfec746f0e9" }, - { file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:7041c36f5680c6e0f08d922aed302e98b3745d97fe1589db0a3eebf6624523af" }, - { file = "pydantic_core-2.27.2-cp310-cp310-win32.whl", hash = "sha256:50a68f3e3819077be2c98110c1f9dcb3817e93f267ba80a2c05bb4f8799e2ff4" }, - { file = "pydantic_core-2.27.2-cp310-cp310-win_amd64.whl", hash = "sha256:e0fd26b16394ead34a424eecf8a31a1f5137094cabe84a1bcb10fa6ba39d3d31" }, - { file = "pydantic_core-2.27.2-cp311-cp311-macosx_10_12_x86_64.whl", hash = "sha256:8e10c99ef58cfdf2a66fc15d66b16c4a04f62bca39db589ae8cba08bc55331bc" }, - { file = "pydantic_core-2.27.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:26f32e0adf166a84d0cb63be85c562ca8a6fa8de28e5f0d92250c6b7e9e2aff7" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8c19d1ea0673cd13cc2f872f6c9ab42acc4e4f492a7ca9d3795ce2b112dd7e15" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:5e68c4446fe0810e959cdff46ab0a41ce2f2c86d227d96dc3847af0ba7def306" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:d9640b0059ff4f14d1f37321b94061c6db164fbe49b334b31643e0528d100d99" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:40d02e7d45c9f8af700f3452f329ead92da4c5f4317ca9b896de7ce7199ea459" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1c1fd185014191700554795c99b347d64f2bb637966c4cfc16998a0ca700d048" }, - { file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d81d2068e1c1228a565af076598f9e7451712700b673de8f502f0334f281387d" }, - { file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:1a4207639fb02ec2dbb76227d7c751a20b1a6b4bc52850568e52260cae64ca3b" }, - { file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_armv7l.whl", hash = "sha256:3de3ce3c9ddc8bbd88f6e0e304dea0e66d843ec9de1b0042b0911c1663ffd474" }, - { file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:30c5f68ded0c36466acede341551106821043e9afaad516adfb6e8fa80a4e6a6" }, - { file = "pydantic_core-2.27.2-cp311-cp311-win32.whl", hash = "sha256:c70c26d2c99f78b125a3459f8afe1aed4d9687c24fd677c6a4436bc042e50d6c" }, - { file = "pydantic_core-2.27.2-cp311-cp311-win_amd64.whl", hash = "sha256:08e125dbdc505fa69ca7d9c499639ab6407cfa909214d500897d02afb816e7cc" }, - { file = "pydantic_core-2.27.2-cp311-cp311-win_arm64.whl", hash = "sha256:26f0d68d4b235a2bae0c3fc585c585b4ecc51382db0e3ba402a22cbc440915e4" }, - { file = "pydantic_core-2.27.2-cp312-cp312-macosx_10_12_x86_64.whl", hash = "sha256:9e0c8cfefa0ef83b4da9588448b6d8d2a2bf1a53c3f1ae5fca39eb3061e2f0b0" }, - { file = "pydantic_core-2.27.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:83097677b8e3bd7eaa6775720ec8e0405f1575015a463285a92bfdfe254529ef" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:172fce187655fece0c90d90a678424b013f8fbb0ca8b036ac266749c09438cb7" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:519f29f5213271eeeeb3093f662ba2fd512b91c5f188f3bb7b27bc5973816934" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:05e3a55d124407fffba0dd6b0c0cd056d10e983ceb4e5dbd10dda135c31071d6" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:9c3ed807c7b91de05e63930188f19e921d1fe90de6b4f5cd43ee7fcc3525cb8c" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6fb4aadc0b9a0c063206846d603b92030eb6f03069151a625667f982887153e2" }, - { file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:28ccb213807e037460326424ceb8b5245acb88f32f3d2777427476e1b32c48c4" }, - { file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:de3cd1899e2c279b140adde9357c4495ed9d47131b4a4eaff9052f23398076b3" }, - { file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_armv7l.whl", hash = "sha256:220f892729375e2d736b97d0e51466252ad84c51857d4d15f5e9692f9ef12be4" }, - { file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:a0fcd29cd6b4e74fe8ddd2c90330fd8edf2e30cb52acda47f06dd615ae72da57" }, - { file = "pydantic_core-2.27.2-cp312-cp312-win32.whl", hash = "sha256:1e2cb691ed9834cd6a8be61228471d0a503731abfb42f82458ff27be7b2186fc" }, - { file = "pydantic_core-2.27.2-cp312-cp312-win_amd64.whl", hash = "sha256:cc3f1a99a4f4f9dd1de4fe0312c114e740b5ddead65bb4102884b384c15d8bc9" }, - { file = "pydantic_core-2.27.2-cp312-cp312-win_arm64.whl", hash = "sha256:3911ac9284cd8a1792d3cb26a2da18f3ca26c6908cc434a18f730dc0db7bfa3b" }, - { file = "pydantic_core-2.27.2-cp313-cp313-macosx_10_12_x86_64.whl", hash = "sha256:7d14bd329640e63852364c306f4d23eb744e0f8193148d4044dd3dacdaacbd8b" }, - { file = "pydantic_core-2.27.2-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:82f91663004eb8ed30ff478d77c4d1179b3563df6cdb15c0817cd1cdaf34d154" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:71b24c7d61131bb83df10cc7e687433609963a944ccf45190cfc21e0887b08c9" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:fa8e459d4954f608fa26116118bb67f56b93b209c39b008277ace29937453dc9" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:ce8918cbebc8da707ba805b7fd0b382816858728ae7fe19a942080c24e5b7cd1" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:eda3f5c2a021bbc5d976107bb302e0131351c2ba54343f8a496dc8783d3d3a6a" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bd8086fa684c4775c27f03f062cbb9eaa6e17f064307e86b21b9e0abc9c0f02e" }, - { file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:8d9b3388db186ba0c099a6d20f0604a44eabdeef1777ddd94786cdae158729e4" }, - { file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_aarch64.whl", hash = "sha256:7a66efda2387de898c8f38c0cf7f14fca0b51a8ef0b24bfea5849f1b3c95af27" }, - { file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_armv7l.whl", hash = "sha256:18a101c168e4e092ab40dbc2503bdc0f62010e95d292b27827871dc85450d7ee" }, - { file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_x86_64.whl", hash = "sha256:ba5dd002f88b78a4215ed2f8ddbdf85e8513382820ba15ad5ad8955ce0ca19a1" }, - { file = "pydantic_core-2.27.2-cp313-cp313-win32.whl", hash = "sha256:1ebaf1d0481914d004a573394f4be3a7616334be70261007e47c2a6fe7e50130" }, - { file = "pydantic_core-2.27.2-cp313-cp313-win_amd64.whl", hash = "sha256:953101387ecf2f5652883208769a79e48db18c6df442568a0b5ccd8c2723abee" }, - { file = "pydantic_core-2.27.2-cp313-cp313-win_arm64.whl", hash = "sha256:ac4dbfd1691affb8f48c2c13241a2e3b60ff23247cbcf981759c768b6633cf8b" }, - { file = "pydantic_core-2.27.2-cp38-cp38-macosx_10_12_x86_64.whl", hash = "sha256:d3e8d504bdd3f10835468f29008d72fc8359d95c9c415ce6e767203db6127506" }, - { file = "pydantic_core-2.27.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:521eb9b7f036c9b6187f0b47318ab0d7ca14bd87f776240b90b21c1f4f149320" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:85210c4d99a0114f5a9481b44560d7d1e35e32cc5634c656bc48e590b669b145" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:d716e2e30c6f140d7560ef1538953a5cd1a87264c737643d481f2779fc247fe1" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f66d89ba397d92f840f8654756196d93804278457b5fbede59598a1f9f90b228" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:669e193c1c576a58f132e3158f9dfa9662969edb1a250c54d8fa52590045f046" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9fdbe7629b996647b99c01b37f11170a57ae675375b14b8c13b8518b8320ced5" }, - { file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d262606bf386a5ba0b0af3b97f37c83d7011439e3dc1a9298f21efb292e42f1a" }, - { file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:cabb9bcb7e0d97f74df8646f34fc76fbf793b7f6dc2438517d7a9e50eee4f14d" }, - { file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_armv7l.whl", hash = "sha256:d2d63f1215638d28221f664596b1ccb3944f6e25dd18cd3b86b0a4c408d5ebb9" }, - { file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:bca101c00bff0adb45a833f8451b9105d9df18accb8743b08107d7ada14bd7da" }, - { file = "pydantic_core-2.27.2-cp38-cp38-win32.whl", hash = "sha256:f6f8e111843bbb0dee4cb6594cdc73e79b3329b526037ec242a3e49012495b3b" }, - { file = "pydantic_core-2.27.2-cp38-cp38-win_amd64.whl", hash = "sha256:fd1aea04935a508f62e0d0ef1f5ae968774a32afc306fb8545e06f5ff5cdf3ad" }, - { file = "pydantic_core-2.27.2-cp39-cp39-macosx_10_12_x86_64.whl", hash = "sha256:c10eb4f1659290b523af58fa7cffb452a61ad6ae5613404519aee4bfbf1df993" }, - { file = "pydantic_core-2.27.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:ef592d4bad47296fb11f96cd7dc898b92e795032b4894dfb4076cfccd43a9308" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c61709a844acc6bf0b7dce7daae75195a10aac96a596ea1b776996414791ede4" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:42c5f762659e47fdb7b16956c71598292f60a03aa92f8b6351504359dbdba6cf" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:4c9775e339e42e79ec99c441d9730fccf07414af63eac2f0e48e08fd38a64d76" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:57762139821c31847cfb2df63c12f725788bd9f04bc2fb392790959b8f70f118" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0d1e85068e818c73e048fe28cfc769040bb1f475524f4745a5dc621f75ac7630" }, - { file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:097830ed52fd9e427942ff3b9bc17fab52913b2f50f2880dc4a5611446606a54" }, - { file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:044a50963a614ecfae59bb1eaf7ea7efc4bc62f49ed594e18fa1e5d953c40e9f" }, - { file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_armv7l.whl", hash = "sha256:4e0b4220ba5b40d727c7f879eac379b822eee5d8fff418e9d3381ee45b3b0362" }, - { file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:5e4f4bb20d75e9325cc9696c6802657b58bc1dbbe3022f32cc2b2b632c3fbb96" }, - { file = "pydantic_core-2.27.2-cp39-cp39-win32.whl", hash = "sha256:cca63613e90d001b9f2f9a9ceb276c308bfa2a43fafb75c8031c4f66039e8c6e" }, - { file = "pydantic_core-2.27.2-cp39-cp39-win_amd64.whl", hash = "sha256:77d1bca19b0f7021b3a982e6f903dcd5b2b06076def36a652e3907f596e29f67" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-macosx_10_12_x86_64.whl", hash = "sha256:2bf14caea37e91198329b828eae1618c068dfb8ef17bb33287a7ad4b61ac314e" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-macosx_11_0_arm64.whl", hash = "sha256:b0cb791f5b45307caae8810c2023a184c74605ec3bcbb67d13846c28ff731ff8" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:688d3fd9fcb71f41c4c015c023d12a79d1c4c0732ec9eb35d96e3388a120dcf3" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3d591580c34f4d731592f0e9fe40f9cc1b430d297eecc70b962e93c5c668f15f" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:82f986faf4e644ffc189a7f1aafc86e46ef70372bb153e7001e8afccc6e54133" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:bec317a27290e2537f922639cafd54990551725fc844249e64c523301d0822fc" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_armv7l.whl", hash = "sha256:0296abcb83a797db256b773f45773da397da75a08f5fcaef41f2044adec05f50" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:0d75070718e369e452075a6017fbf187f788e17ed67a3abd47fa934d001863d9" }, - { file = "pydantic_core-2.27.2-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:7e17b560be3c98a8e3aa66ce828bdebb9e9ac6ad5466fba92eb74c4c95cb1151" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-macosx_10_12_x86_64.whl", hash = "sha256:c33939a82924da9ed65dab5a65d427205a73181d8098e79b6b426bdf8ad4e656" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-macosx_11_0_arm64.whl", hash = "sha256:00bad2484fa6bda1e216e7345a798bd37c68fb2d97558edd584942aa41b7d278" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c817e2b40aba42bac6f457498dacabc568c3b7a986fc9ba7c8d9d260b71485fb" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:251136cdad0cb722e93732cb45ca5299fb56e1344a833640bf93b2803f8d1bfd" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d2088237af596f0a524d3afc39ab3b036e8adb054ee57cbb1dcf8e09da5b29cc" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:d4041c0b966a84b4ae7a09832eb691a35aec90910cd2dbe7a208de59be77965b" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_armv7l.whl", hash = "sha256:8083d4e875ebe0b864ffef72a4304827015cff328a1be6e22cc850753bfb122b" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:f141ee28a0ad2123b6611b6ceff018039df17f32ada8b534e6aa039545a3efb2" }, - { file = "pydantic_core-2.27.2-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:7d0c8399fcc1848491f00e0314bd59fb34a9c008761bcb422a057670c3f65e35" }, - { file = "pydantic_core-2.27.2.tar.gz", hash = "sha256:eb026e5a4c1fee05726072337ff51d1efb6f59090b7da90d30ea58625b1ffb39" }, + {file = "pydantic_core-2.27.2-cp310-cp310-macosx_10_12_x86_64.whl", hash = "sha256:2d367ca20b2f14095a8f4fa1210f5a7b78b8a20009ecced6b12818f455b1e9fa"}, + {file = "pydantic_core-2.27.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:491a2b73db93fab69731eaee494f320faa4e093dbed776be1a829c2eb222c34c"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7969e133a6f183be60e9f6f56bfae753585680f3b7307a8e555a948d443cc05a"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:3de9961f2a346257caf0aa508a4da705467f53778e9ef6fe744c038119737ef5"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:e2bb4d3e5873c37bb3dd58714d4cd0b0e6238cebc4177ac8fe878f8b3aa8e74c"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:280d219beebb0752699480fe8f1dc61ab6615c2046d76b7ab7ee38858de0a4e7"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:47956ae78b6422cbd46f772f1746799cbb862de838fd8d1fbd34a82e05b0983a"}, + {file = "pydantic_core-2.27.2-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:14d4a5c49d2f009d62a2a7140d3064f686d17a5d1a268bc641954ba181880236"}, + {file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:337b443af21d488716f8d0b6164de833e788aa6bd7e3a39c005febc1284f4962"}, + {file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_armv7l.whl", hash = "sha256:03d0f86ea3184a12f41a2d23f7ccb79cdb5a18e06993f8a45baa8dfec746f0e9"}, + {file = "pydantic_core-2.27.2-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:7041c36f5680c6e0f08d922aed302e98b3745d97fe1589db0a3eebf6624523af"}, + {file = "pydantic_core-2.27.2-cp310-cp310-win32.whl", hash = "sha256:50a68f3e3819077be2c98110c1f9dcb3817e93f267ba80a2c05bb4f8799e2ff4"}, + {file = "pydantic_core-2.27.2-cp310-cp310-win_amd64.whl", hash = "sha256:e0fd26b16394ead34a424eecf8a31a1f5137094cabe84a1bcb10fa6ba39d3d31"}, + {file = "pydantic_core-2.27.2-cp311-cp311-macosx_10_12_x86_64.whl", hash = "sha256:8e10c99ef58cfdf2a66fc15d66b16c4a04f62bca39db589ae8cba08bc55331bc"}, + {file = "pydantic_core-2.27.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:26f32e0adf166a84d0cb63be85c562ca8a6fa8de28e5f0d92250c6b7e9e2aff7"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8c19d1ea0673cd13cc2f872f6c9ab42acc4e4f492a7ca9d3795ce2b112dd7e15"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:5e68c4446fe0810e959cdff46ab0a41ce2f2c86d227d96dc3847af0ba7def306"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:d9640b0059ff4f14d1f37321b94061c6db164fbe49b334b31643e0528d100d99"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:40d02e7d45c9f8af700f3452f329ead92da4c5f4317ca9b896de7ce7199ea459"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1c1fd185014191700554795c99b347d64f2bb637966c4cfc16998a0ca700d048"}, + {file = "pydantic_core-2.27.2-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d81d2068e1c1228a565af076598f9e7451712700b673de8f502f0334f281387d"}, + {file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:1a4207639fb02ec2dbb76227d7c751a20b1a6b4bc52850568e52260cae64ca3b"}, + {file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_armv7l.whl", hash = "sha256:3de3ce3c9ddc8bbd88f6e0e304dea0e66d843ec9de1b0042b0911c1663ffd474"}, + {file = "pydantic_core-2.27.2-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:30c5f68ded0c36466acede341551106821043e9afaad516adfb6e8fa80a4e6a6"}, + {file = "pydantic_core-2.27.2-cp311-cp311-win32.whl", hash = "sha256:c70c26d2c99f78b125a3459f8afe1aed4d9687c24fd677c6a4436bc042e50d6c"}, + {file = "pydantic_core-2.27.2-cp311-cp311-win_amd64.whl", hash = "sha256:08e125dbdc505fa69ca7d9c499639ab6407cfa909214d500897d02afb816e7cc"}, + {file = "pydantic_core-2.27.2-cp311-cp311-win_arm64.whl", hash = "sha256:26f0d68d4b235a2bae0c3fc585c585b4ecc51382db0e3ba402a22cbc440915e4"}, + {file = "pydantic_core-2.27.2-cp312-cp312-macosx_10_12_x86_64.whl", hash = "sha256:9e0c8cfefa0ef83b4da9588448b6d8d2a2bf1a53c3f1ae5fca39eb3061e2f0b0"}, + {file = "pydantic_core-2.27.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:83097677b8e3bd7eaa6775720ec8e0405f1575015a463285a92bfdfe254529ef"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:172fce187655fece0c90d90a678424b013f8fbb0ca8b036ac266749c09438cb7"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:519f29f5213271eeeeb3093f662ba2fd512b91c5f188f3bb7b27bc5973816934"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:05e3a55d124407fffba0dd6b0c0cd056d10e983ceb4e5dbd10dda135c31071d6"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:9c3ed807c7b91de05e63930188f19e921d1fe90de6b4f5cd43ee7fcc3525cb8c"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6fb4aadc0b9a0c063206846d603b92030eb6f03069151a625667f982887153e2"}, + {file = "pydantic_core-2.27.2-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:28ccb213807e037460326424ceb8b5245acb88f32f3d2777427476e1b32c48c4"}, + {file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:de3cd1899e2c279b140adde9357c4495ed9d47131b4a4eaff9052f23398076b3"}, + {file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_armv7l.whl", hash = "sha256:220f892729375e2d736b97d0e51466252ad84c51857d4d15f5e9692f9ef12be4"}, + {file = "pydantic_core-2.27.2-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:a0fcd29cd6b4e74fe8ddd2c90330fd8edf2e30cb52acda47f06dd615ae72da57"}, + {file = "pydantic_core-2.27.2-cp312-cp312-win32.whl", hash = "sha256:1e2cb691ed9834cd6a8be61228471d0a503731abfb42f82458ff27be7b2186fc"}, + {file = "pydantic_core-2.27.2-cp312-cp312-win_amd64.whl", hash = "sha256:cc3f1a99a4f4f9dd1de4fe0312c114e740b5ddead65bb4102884b384c15d8bc9"}, + {file = "pydantic_core-2.27.2-cp312-cp312-win_arm64.whl", hash = "sha256:3911ac9284cd8a1792d3cb26a2da18f3ca26c6908cc434a18f730dc0db7bfa3b"}, + {file = "pydantic_core-2.27.2-cp313-cp313-macosx_10_12_x86_64.whl", hash = "sha256:7d14bd329640e63852364c306f4d23eb744e0f8193148d4044dd3dacdaacbd8b"}, + {file = "pydantic_core-2.27.2-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:82f91663004eb8ed30ff478d77c4d1179b3563df6cdb15c0817cd1cdaf34d154"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:71b24c7d61131bb83df10cc7e687433609963a944ccf45190cfc21e0887b08c9"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:fa8e459d4954f608fa26116118bb67f56b93b209c39b008277ace29937453dc9"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:ce8918cbebc8da707ba805b7fd0b382816858728ae7fe19a942080c24e5b7cd1"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:eda3f5c2a021bbc5d976107bb302e0131351c2ba54343f8a496dc8783d3d3a6a"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bd8086fa684c4775c27f03f062cbb9eaa6e17f064307e86b21b9e0abc9c0f02e"}, + {file = "pydantic_core-2.27.2-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:8d9b3388db186ba0c099a6d20f0604a44eabdeef1777ddd94786cdae158729e4"}, + {file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_aarch64.whl", hash = "sha256:7a66efda2387de898c8f38c0cf7f14fca0b51a8ef0b24bfea5849f1b3c95af27"}, + {file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_armv7l.whl", hash = "sha256:18a101c168e4e092ab40dbc2503bdc0f62010e95d292b27827871dc85450d7ee"}, + {file = "pydantic_core-2.27.2-cp313-cp313-musllinux_1_1_x86_64.whl", hash = "sha256:ba5dd002f88b78a4215ed2f8ddbdf85e8513382820ba15ad5ad8955ce0ca19a1"}, + {file = "pydantic_core-2.27.2-cp313-cp313-win32.whl", hash = "sha256:1ebaf1d0481914d004a573394f4be3a7616334be70261007e47c2a6fe7e50130"}, + {file = "pydantic_core-2.27.2-cp313-cp313-win_amd64.whl", hash = "sha256:953101387ecf2f5652883208769a79e48db18c6df442568a0b5ccd8c2723abee"}, + {file = "pydantic_core-2.27.2-cp313-cp313-win_arm64.whl", hash = "sha256:ac4dbfd1691affb8f48c2c13241a2e3b60ff23247cbcf981759c768b6633cf8b"}, + {file = "pydantic_core-2.27.2-cp38-cp38-macosx_10_12_x86_64.whl", hash = "sha256:d3e8d504bdd3f10835468f29008d72fc8359d95c9c415ce6e767203db6127506"}, + {file = "pydantic_core-2.27.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:521eb9b7f036c9b6187f0b47318ab0d7ca14bd87f776240b90b21c1f4f149320"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:85210c4d99a0114f5a9481b44560d7d1e35e32cc5634c656bc48e590b669b145"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:d716e2e30c6f140d7560ef1538953a5cd1a87264c737643d481f2779fc247fe1"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f66d89ba397d92f840f8654756196d93804278457b5fbede59598a1f9f90b228"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:669e193c1c576a58f132e3158f9dfa9662969edb1a250c54d8fa52590045f046"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9fdbe7629b996647b99c01b37f11170a57ae675375b14b8c13b8518b8320ced5"}, + {file = "pydantic_core-2.27.2-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d262606bf386a5ba0b0af3b97f37c83d7011439e3dc1a9298f21efb292e42f1a"}, + {file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:cabb9bcb7e0d97f74df8646f34fc76fbf793b7f6dc2438517d7a9e50eee4f14d"}, + {file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_armv7l.whl", hash = "sha256:d2d63f1215638d28221f664596b1ccb3944f6e25dd18cd3b86b0a4c408d5ebb9"}, + {file = "pydantic_core-2.27.2-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:bca101c00bff0adb45a833f8451b9105d9df18accb8743b08107d7ada14bd7da"}, + {file = "pydantic_core-2.27.2-cp38-cp38-win32.whl", hash = "sha256:f6f8e111843bbb0dee4cb6594cdc73e79b3329b526037ec242a3e49012495b3b"}, + {file = "pydantic_core-2.27.2-cp38-cp38-win_amd64.whl", hash = "sha256:fd1aea04935a508f62e0d0ef1f5ae968774a32afc306fb8545e06f5ff5cdf3ad"}, + {file = "pydantic_core-2.27.2-cp39-cp39-macosx_10_12_x86_64.whl", hash = "sha256:c10eb4f1659290b523af58fa7cffb452a61ad6ae5613404519aee4bfbf1df993"}, + {file = "pydantic_core-2.27.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:ef592d4bad47296fb11f96cd7dc898b92e795032b4894dfb4076cfccd43a9308"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c61709a844acc6bf0b7dce7daae75195a10aac96a596ea1b776996414791ede4"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:42c5f762659e47fdb7b16956c71598292f60a03aa92f8b6351504359dbdba6cf"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:4c9775e339e42e79ec99c441d9730fccf07414af63eac2f0e48e08fd38a64d76"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:57762139821c31847cfb2df63c12f725788bd9f04bc2fb392790959b8f70f118"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0d1e85068e818c73e048fe28cfc769040bb1f475524f4745a5dc621f75ac7630"}, + {file = "pydantic_core-2.27.2-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:097830ed52fd9e427942ff3b9bc17fab52913b2f50f2880dc4a5611446606a54"}, + {file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:044a50963a614ecfae59bb1eaf7ea7efc4bc62f49ed594e18fa1e5d953c40e9f"}, + {file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_armv7l.whl", hash = "sha256:4e0b4220ba5b40d727c7f879eac379b822eee5d8fff418e9d3381ee45b3b0362"}, + {file = "pydantic_core-2.27.2-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:5e4f4bb20d75e9325cc9696c6802657b58bc1dbbe3022f32cc2b2b632c3fbb96"}, + {file = "pydantic_core-2.27.2-cp39-cp39-win32.whl", hash = "sha256:cca63613e90d001b9f2f9a9ceb276c308bfa2a43fafb75c8031c4f66039e8c6e"}, + {file = "pydantic_core-2.27.2-cp39-cp39-win_amd64.whl", hash = "sha256:77d1bca19b0f7021b3a982e6f903dcd5b2b06076def36a652e3907f596e29f67"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-macosx_10_12_x86_64.whl", hash = "sha256:2bf14caea37e91198329b828eae1618c068dfb8ef17bb33287a7ad4b61ac314e"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-macosx_11_0_arm64.whl", hash = "sha256:b0cb791f5b45307caae8810c2023a184c74605ec3bcbb67d13846c28ff731ff8"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:688d3fd9fcb71f41c4c015c023d12a79d1c4c0732ec9eb35d96e3388a120dcf3"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3d591580c34f4d731592f0e9fe40f9cc1b430d297eecc70b962e93c5c668f15f"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:82f986faf4e644ffc189a7f1aafc86e46ef70372bb153e7001e8afccc6e54133"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:bec317a27290e2537f922639cafd54990551725fc844249e64c523301d0822fc"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_armv7l.whl", hash = "sha256:0296abcb83a797db256b773f45773da397da75a08f5fcaef41f2044adec05f50"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:0d75070718e369e452075a6017fbf187f788e17ed67a3abd47fa934d001863d9"}, + {file = "pydantic_core-2.27.2-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:7e17b560be3c98a8e3aa66ce828bdebb9e9ac6ad5466fba92eb74c4c95cb1151"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-macosx_10_12_x86_64.whl", hash = "sha256:c33939a82924da9ed65dab5a65d427205a73181d8098e79b6b426bdf8ad4e656"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-macosx_11_0_arm64.whl", hash = "sha256:00bad2484fa6bda1e216e7345a798bd37c68fb2d97558edd584942aa41b7d278"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c817e2b40aba42bac6f457498dacabc568c3b7a986fc9ba7c8d9d260b71485fb"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:251136cdad0cb722e93732cb45ca5299fb56e1344a833640bf93b2803f8d1bfd"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:d2088237af596f0a524d3afc39ab3b036e8adb054ee57cbb1dcf8e09da5b29cc"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:d4041c0b966a84b4ae7a09832eb691a35aec90910cd2dbe7a208de59be77965b"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_armv7l.whl", hash = "sha256:8083d4e875ebe0b864ffef72a4304827015cff328a1be6e22cc850753bfb122b"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:f141ee28a0ad2123b6611b6ceff018039df17f32ada8b534e6aa039545a3efb2"}, + {file = "pydantic_core-2.27.2-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:7d0c8399fcc1848491f00e0314bd59fb34a9c008761bcb422a057670c3f65e35"}, + {file = "pydantic_core-2.27.2.tar.gz", hash = "sha256:eb026e5a4c1fee05726072337ff51d1efb6f59090b7da90d30ea58625b1ffb39"}, ] [package.dependencies] @@ -822,8 +822,8 @@ optional = false python-versions = ">=3.6" groups = ["dev"] files = [ - { file = "pyflakes-2.5.0-py2.py3-none-any.whl", hash = "sha256:4579f67d887f804e67edb544428f264b7b24f435b263c4614f384135cea553d2" }, - { file = "pyflakes-2.5.0.tar.gz", hash = "sha256:491feb020dca48ccc562a8c0cbe8df07ee13078df59813b83959cbdada312ea3" }, + {file = "pyflakes-2.5.0-py2.py3-none-any.whl", hash = "sha256:4579f67d887f804e67edb544428f264b7b24f435b263c4614f384135cea553d2"}, + {file = "pyflakes-2.5.0.tar.gz", hash = "sha256:491feb020dca48ccc562a8c0cbe8df07ee13078df59813b83959cbdada312ea3"}, ] [[package]] @@ -834,13 +834,13 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "pyproject_api-1.8.0-py3-none-any.whl", hash = "sha256:3d7d347a047afe796fd5d1885b1e391ba29be7169bd2f102fcd378f04273d228" }, - { file = "pyproject_api-1.8.0.tar.gz", hash = "sha256:77b8049f2feb5d33eefcc21b57f1e279636277a8ac8ad6b5871037b243778496" }, + {file = "pyproject_api-1.8.0-py3-none-any.whl", hash = "sha256:3d7d347a047afe796fd5d1885b1e391ba29be7169bd2f102fcd378f04273d228"}, + {file = "pyproject_api-1.8.0.tar.gz", hash = "sha256:77b8049f2feb5d33eefcc21b57f1e279636277a8ac8ad6b5871037b243778496"}, ] [package.dependencies] packaging = ">=24.1" -tomli = { version = ">=2.0.1", markers = "python_version < \"3.11\"" } +tomli = {version = ">=2.0.1", markers = "python_version < \"3.11\""} [package.extras] docs = ["furo (>=2024.8.6)", "sphinx-autodoc-typehints (>=2.4.1)"] @@ -854,17 +854,17 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "pytest-8.3.5-py3-none-any.whl", hash = "sha256:c69214aa47deac29fad6c2a4f590b9c4a9fdb16a403176fe154b79c0b4d4d820" }, - { file = "pytest-8.3.5.tar.gz", hash = "sha256:f4efe70cc14e511565ac476b57c279e12a855b11f48f212af1080ef2263d3845" }, + {file = "pytest-8.3.5-py3-none-any.whl", hash = "sha256:c69214aa47deac29fad6c2a4f590b9c4a9fdb16a403176fe154b79c0b4d4d820"}, + {file = "pytest-8.3.5.tar.gz", hash = "sha256:f4efe70cc14e511565ac476b57c279e12a855b11f48f212af1080ef2263d3845"}, ] [package.dependencies] -colorama = { version = "*", markers = "sys_platform == \"win32\"" } -exceptiongroup = { version = ">=1.0.0rc8", markers = "python_version < \"3.11\"" } +colorama = {version = "*", markers = "sys_platform == \"win32\""} +exceptiongroup = {version = ">=1.0.0rc8", markers = "python_version < \"3.11\""} iniconfig = "*" packaging = "*" pluggy = ">=1.5,<2" -tomli = { version = ">=1", markers = "python_version < \"3.11\"" } +tomli = {version = ">=1", markers = "python_version < \"3.11\""} [package.extras] dev = ["argcomplete", "attrs (>=19.2)", "hypothesis (>=3.56)", "mock", "pygments (>=2.7.2)", "requests", "setuptools", "xmlschema"] @@ -877,12 +877,12 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "pytest-cov-5.0.0.tar.gz", hash = "sha256:5837b58e9f6ebd335b0f8060eecce69b662415b16dc503883a02f45dfeb14857" }, - { file = "pytest_cov-5.0.0-py3-none-any.whl", hash = "sha256:4f0764a1219df53214206bf1feea4633c3b558a2925c8b59f144f682861ce652" }, + {file = "pytest-cov-5.0.0.tar.gz", hash = "sha256:5837b58e9f6ebd335b0f8060eecce69b662415b16dc503883a02f45dfeb14857"}, + {file = "pytest_cov-5.0.0-py3-none-any.whl", hash = "sha256:4f0764a1219df53214206bf1feea4633c3b558a2925c8b59f144f682861ce652"}, ] [package.dependencies] -coverage = { version = ">=5.2.1", extras = ["toml"] } +coverage = {version = ">=5.2.1", extras = ["toml"]} pytest = ">=4.6" [package.extras] @@ -896,8 +896,8 @@ optional = false python-versions = "!=3.0.*,!=3.1.*,!=3.2.*,>=2.7" groups = ["main"] files = [ - { file = "python-dateutil-2.9.0.post0.tar.gz", hash = "sha256:37dd54208da7e1cd875388217d5e00ebd4179249f90fb72437e91a35459a0ad3" }, - { file = "python_dateutil-2.9.0.post0-py2.py3-none-any.whl", hash = "sha256:a8b2bc7bffae282281c8140a97d3aa9c14da0b136dfe83f850eea9a5f7470427" }, + {file = "python-dateutil-2.9.0.post0.tar.gz", hash = "sha256:37dd54208da7e1cd875388217d5e00ebd4179249f90fb72437e91a35459a0ad3"}, + {file = "python_dateutil-2.9.0.post0-py2.py3-none-any.whl", hash = "sha256:a8b2bc7bffae282281c8140a97d3aa9c14da0b136dfe83f850eea9a5f7470427"}, ] [package.dependencies] @@ -911,8 +911,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "python-dotenv-1.0.1.tar.gz", hash = "sha256:e324ee90a023d808f1959c46bcbc04446a10ced277783dc6ee09987c37ec10ca" }, - { file = "python_dotenv-1.0.1-py3-none-any.whl", hash = "sha256:f7b63ef50f1b690dddf550d03497b66d609393b40b564ed0d674909a68ebf16a" }, + {file = "python-dotenv-1.0.1.tar.gz", hash = "sha256:e324ee90a023d808f1959c46bcbc04446a10ced277783dc6ee09987c37ec10ca"}, + {file = "python_dotenv-1.0.1-py3-none-any.whl", hash = "sha256:f7b63ef50f1b690dddf550d03497b66d609393b40b564ed0d674909a68ebf16a"}, ] [package.extras] @@ -927,22 +927,22 @@ python-versions = "*" groups = ["dev"] markers = "sys_platform == \"win32\"" files = [ - { file = "pywin32-310-cp310-cp310-win32.whl", hash = "sha256:6dd97011efc8bf51d6793a82292419eba2c71cf8e7250cfac03bba284454abc1" }, - { file = "pywin32-310-cp310-cp310-win_amd64.whl", hash = "sha256:c3e78706e4229b915a0821941a84e7ef420bf2b77e08c9dae3c76fd03fd2ae3d" }, - { file = "pywin32-310-cp310-cp310-win_arm64.whl", hash = "sha256:33babed0cf0c92a6f94cc6cc13546ab24ee13e3e800e61ed87609ab91e4c8213" }, - { file = "pywin32-310-cp311-cp311-win32.whl", hash = "sha256:1e765f9564e83011a63321bb9d27ec456a0ed90d3732c4b2e312b855365ed8bd" }, - { file = "pywin32-310-cp311-cp311-win_amd64.whl", hash = "sha256:126298077a9d7c95c53823934f000599f66ec9296b09167810eb24875f32689c" }, - { file = "pywin32-310-cp311-cp311-win_arm64.whl", hash = "sha256:19ec5fc9b1d51c4350be7bb00760ffce46e6c95eaf2f0b2f1150657b1a43c582" }, - { file = "pywin32-310-cp312-cp312-win32.whl", hash = "sha256:8a75a5cc3893e83a108c05d82198880704c44bbaee4d06e442e471d3c9ea4f3d" }, - { file = "pywin32-310-cp312-cp312-win_amd64.whl", hash = "sha256:bf5c397c9a9a19a6f62f3fb821fbf36cac08f03770056711f765ec1503972060" }, - { file = "pywin32-310-cp312-cp312-win_arm64.whl", hash = "sha256:2349cc906eae872d0663d4d6290d13b90621eaf78964bb1578632ff20e152966" }, - { file = "pywin32-310-cp313-cp313-win32.whl", hash = "sha256:5d241a659c496ada3253cd01cfaa779b048e90ce4b2b38cd44168ad555ce74ab" }, - { file = "pywin32-310-cp313-cp313-win_amd64.whl", hash = "sha256:667827eb3a90208ddbdcc9e860c81bde63a135710e21e4cb3348968e4bd5249e" }, - { file = "pywin32-310-cp313-cp313-win_arm64.whl", hash = "sha256:e308f831de771482b7cf692a1f308f8fca701b2d8f9dde6cc440c7da17e47b33" }, - { file = "pywin32-310-cp38-cp38-win32.whl", hash = "sha256:0867beb8addefa2e3979d4084352e4ac6e991ca45373390775f7084cc0209b9c" }, - { file = "pywin32-310-cp38-cp38-win_amd64.whl", hash = "sha256:30f0a9b3138fb5e07eb4973b7077e1883f558e40c578c6925acc7a94c34eaa36" }, - { file = "pywin32-310-cp39-cp39-win32.whl", hash = "sha256:851c8d927af0d879221e616ae1f66145253537bbdd321a77e8ef701b443a9a1a" }, - { file = "pywin32-310-cp39-cp39-win_amd64.whl", hash = "sha256:96867217335559ac619f00ad70e513c0fcf84b8a3af9fc2bba3b59b97da70475" }, + {file = "pywin32-310-cp310-cp310-win32.whl", hash = "sha256:6dd97011efc8bf51d6793a82292419eba2c71cf8e7250cfac03bba284454abc1"}, + {file = "pywin32-310-cp310-cp310-win_amd64.whl", hash = "sha256:c3e78706e4229b915a0821941a84e7ef420bf2b77e08c9dae3c76fd03fd2ae3d"}, + {file = "pywin32-310-cp310-cp310-win_arm64.whl", hash = "sha256:33babed0cf0c92a6f94cc6cc13546ab24ee13e3e800e61ed87609ab91e4c8213"}, + {file = "pywin32-310-cp311-cp311-win32.whl", hash = "sha256:1e765f9564e83011a63321bb9d27ec456a0ed90d3732c4b2e312b855365ed8bd"}, + {file = "pywin32-310-cp311-cp311-win_amd64.whl", hash = "sha256:126298077a9d7c95c53823934f000599f66ec9296b09167810eb24875f32689c"}, + {file = "pywin32-310-cp311-cp311-win_arm64.whl", hash = "sha256:19ec5fc9b1d51c4350be7bb00760ffce46e6c95eaf2f0b2f1150657b1a43c582"}, + {file = "pywin32-310-cp312-cp312-win32.whl", hash = "sha256:8a75a5cc3893e83a108c05d82198880704c44bbaee4d06e442e471d3c9ea4f3d"}, + {file = "pywin32-310-cp312-cp312-win_amd64.whl", hash = "sha256:bf5c397c9a9a19a6f62f3fb821fbf36cac08f03770056711f765ec1503972060"}, + {file = "pywin32-310-cp312-cp312-win_arm64.whl", hash = "sha256:2349cc906eae872d0663d4d6290d13b90621eaf78964bb1578632ff20e152966"}, + {file = "pywin32-310-cp313-cp313-win32.whl", hash = "sha256:5d241a659c496ada3253cd01cfaa779b048e90ce4b2b38cd44168ad555ce74ab"}, + {file = "pywin32-310-cp313-cp313-win_amd64.whl", hash = "sha256:667827eb3a90208ddbdcc9e860c81bde63a135710e21e4cb3348968e4bd5249e"}, + {file = "pywin32-310-cp313-cp313-win_arm64.whl", hash = "sha256:e308f831de771482b7cf692a1f308f8fca701b2d8f9dde6cc440c7da17e47b33"}, + {file = "pywin32-310-cp38-cp38-win32.whl", hash = "sha256:0867beb8addefa2e3979d4084352e4ac6e991ca45373390775f7084cc0209b9c"}, + {file = "pywin32-310-cp38-cp38-win_amd64.whl", hash = "sha256:30f0a9b3138fb5e07eb4973b7077e1883f558e40c578c6925acc7a94c34eaa36"}, + {file = "pywin32-310-cp39-cp39-win32.whl", hash = "sha256:851c8d927af0d879221e616ae1f66145253537bbdd321a77e8ef701b443a9a1a"}, + {file = "pywin32-310-cp39-cp39-win_amd64.whl", hash = "sha256:96867217335559ac619f00ad70e513c0fcf84b8a3af9fc2bba3b59b97da70475"}, ] [[package]] @@ -953,8 +953,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "requests-2.32.3-py3-none-any.whl", hash = "sha256:70761cfe03c773ceb22aa2f671b4757976145175cdfca038c02654d061d6dcc6" }, - { file = "requests-2.32.3.tar.gz", hash = "sha256:55365417734eb18255590a9ff9eb97e9e1da868d4ccd6402399eaf68af20a760" }, + {file = "requests-2.32.3-py3-none-any.whl", hash = "sha256:70761cfe03c773ceb22aa2f671b4757976145175cdfca038c02654d061d6dcc6"}, + {file = "requests-2.32.3.tar.gz", hash = "sha256:55365417734eb18255590a9ff9eb97e9e1da868d4ccd6402399eaf68af20a760"}, ] [package.dependencies] @@ -967,6 +967,34 @@ urllib3 = ">=1.21.1,<3" socks = ["PySocks (>=1.5.6,!=1.5.7)"] use-chardet-on-py3 = ["chardet (>=3.0.2,<6)"] +[[package]] +name = "ruff" +version = "0.11.5" +description = "An extremely fast Python linter and code formatter, written in Rust." +optional = false +python-versions = ">=3.7" +groups = ["dev"] +files = [ + {file = "ruff-0.11.5-py3-none-linux_armv6l.whl", hash = "sha256:2561294e108eb648e50f210671cc56aee590fb6167b594144401532138c66c7b"}, + {file = "ruff-0.11.5-py3-none-macosx_10_12_x86_64.whl", hash = "sha256:ac12884b9e005c12d0bd121f56ccf8033e1614f736f766c118ad60780882a077"}, + {file = "ruff-0.11.5-py3-none-macosx_11_0_arm64.whl", hash = "sha256:4bfd80a6ec559a5eeb96c33f832418bf0fb96752de0539905cf7b0cc1d31d779"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0947c0a1afa75dcb5db4b34b070ec2bccee869d40e6cc8ab25aca11a7d527794"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:ad871ff74b5ec9caa66cb725b85d4ef89b53f8170f47c3406e32ef040400b038"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e6cf918390cfe46d240732d4d72fa6e18e528ca1f60e318a10835cf2fa3dc19f"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_ppc64.manylinux2014_ppc64.whl", hash = "sha256:56145ee1478582f61c08f21076dc59153310d606ad663acc00ea3ab5b2125f82"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:e5f66f8f1e8c9fc594cbd66fbc5f246a8d91f916cb9667e80208663ec3728304"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:80b4df4d335a80315ab9afc81ed1cff62be112bd165e162b5eed8ac55bfc8470"}, + {file = "ruff-0.11.5-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3068befab73620b8a0cc2431bd46b3cd619bc17d6f7695a3e1bb166b652c382a"}, + {file = "ruff-0.11.5-py3-none-musllinux_1_2_aarch64.whl", hash = "sha256:f5da2e710a9641828e09aa98b92c9ebbc60518fdf3921241326ca3e8f8e55b8b"}, + {file = "ruff-0.11.5-py3-none-musllinux_1_2_armv7l.whl", hash = "sha256:ef39f19cb8ec98cbc762344921e216f3857a06c47412030374fffd413fb8fd3a"}, + {file = "ruff-0.11.5-py3-none-musllinux_1_2_i686.whl", hash = "sha256:b2a7cedf47244f431fd11aa5a7e2806dda2e0c365873bda7834e8f7d785ae159"}, + {file = "ruff-0.11.5-py3-none-musllinux_1_2_x86_64.whl", hash = "sha256:81be52e7519f3d1a0beadcf8e974715b2dfc808ae8ec729ecfc79bddf8dbb783"}, + {file = "ruff-0.11.5-py3-none-win32.whl", hash = "sha256:e268da7b40f56e3eca571508a7e567e794f9bfcc0f412c4b607931d3af9c4afe"}, + {file = "ruff-0.11.5-py3-none-win_amd64.whl", hash = "sha256:6c6dc38af3cfe2863213ea25b6dc616d679205732dc0fb673356c2d69608f800"}, + {file = "ruff-0.11.5-py3-none-win_arm64.whl", hash = "sha256:67e241b4314f4eacf14a601d586026a962f4002a475aa702c69980a38087aa4e"}, + {file = "ruff-0.11.5.tar.gz", hash = "sha256:cae2e2439cb88853e421901ec040a758960b576126dab520fa08e9de431d1bef"}, +] + [[package]] name = "six" version = "1.17.0" @@ -975,8 +1003,8 @@ optional = false python-versions = "!=3.0.*,!=3.1.*,!=3.2.*,>=2.7" groups = ["main"] files = [ - { file = "six-1.17.0-py2.py3-none-any.whl", hash = "sha256:4721f391ed90541fddacab5acf947aa0d3dc7d27b2e1e8eda2be8970586c3274" }, - { file = "six-1.17.0.tar.gz", hash = "sha256:ff70335d468e7eb6ec65b95b99d3a2836546063f63acc5171de367e834932a81" }, + {file = "six-1.17.0-py2.py3-none-any.whl", hash = "sha256:4721f391ed90541fddacab5acf947aa0d3dc7d27b2e1e8eda2be8970586c3274"}, + {file = "six-1.17.0.tar.gz", hash = "sha256:ff70335d468e7eb6ec65b95b99d3a2836546063f63acc5171de367e834932a81"}, ] [[package]] @@ -987,7 +1015,7 @@ optional = false python-versions = ">=3.7" groups = ["dev"] files = [ - { file = "testcontainers-3.7.1-py2.py3-none-any.whl", hash = "sha256:7f48cef4bf0ccd78f1a4534d4b701a003a3bace851f24eae58a32f9e3f0aeba0" }, + {file = "testcontainers-3.7.1-py2.py3-none-any.whl", hash = "sha256:7f48cef4bf0ccd78f1a4534d4b701a003a3bace851f24eae58a32f9e3f0aeba0"}, ] [package.dependencies] @@ -1022,38 +1050,38 @@ python-versions = ">=3.8" groups = ["dev"] markers = "python_full_version <= \"3.11.0a6\"" files = [ - { file = "tomli-2.2.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:678e4fa69e4575eb77d103de3df8a895e1591b48e740211bd1067378c69e8249" }, - { file = "tomli-2.2.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:023aa114dd824ade0100497eb2318602af309e5a55595f76b626d6d9f3b7b0a6" }, - { file = "tomli-2.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:ece47d672db52ac607a3d9599a9d48dcb2f2f735c6c2d1f34130085bb12b112a" }, - { file = "tomli-2.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6972ca9c9cc9f0acaa56a8ca1ff51e7af152a9f87fb64623e31d5c83700080ee" }, - { file = "tomli-2.2.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c954d2250168d28797dd4e3ac5cf812a406cd5a92674ee4c8f123c889786aa8e" }, - { file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:8dd28b3e155b80f4d54beb40a441d366adcfe740969820caf156c019fb5c7ec4" }, - { file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:e59e304978767a54663af13c07b3d1af22ddee3bb2fb0618ca1593e4f593a106" }, - { file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:33580bccab0338d00994d7f16f4c4ec25b776af3ffaac1ed74e0b3fc95e885a8" }, - { file = "tomli-2.2.1-cp311-cp311-win32.whl", hash = "sha256:465af0e0875402f1d226519c9904f37254b3045fc5084697cefb9bdde1ff99ff" }, - { file = "tomli-2.2.1-cp311-cp311-win_amd64.whl", hash = "sha256:2d0f2fdd22b02c6d81637a3c95f8cd77f995846af7414c5c4b8d0545afa1bc4b" }, - { file = "tomli-2.2.1-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:4a8f6e44de52d5e6c657c9fe83b562f5f4256d8ebbfe4ff922c495620a7f6cea" }, - { file = "tomli-2.2.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:8d57ca8095a641b8237d5b079147646153d22552f1c637fd3ba7f4b0b29167a8" }, - { file = "tomli-2.2.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4e340144ad7ae1533cb897d406382b4b6fede8890a03738ff1683af800d54192" }, - { file = "tomli-2.2.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:db2b95f9de79181805df90bedc5a5ab4c165e6ec3fe99f970d0e302f384ad222" }, - { file = "tomli-2.2.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:40741994320b232529c802f8bc86da4e1aa9f413db394617b9a256ae0f9a7f77" }, - { file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:400e720fe168c0f8521520190686ef8ef033fb19fc493da09779e592861b78c6" }, - { file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:02abe224de6ae62c19f090f68da4e27b10af2b93213d36cf44e6e1c5abd19fdd" }, - { file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:b82ebccc8c8a36f2094e969560a1b836758481f3dc360ce9a3277c65f374285e" }, - { file = "tomli-2.2.1-cp312-cp312-win32.whl", hash = "sha256:889f80ef92701b9dbb224e49ec87c645ce5df3fa2cc548664eb8a25e03127a98" }, - { file = "tomli-2.2.1-cp312-cp312-win_amd64.whl", hash = "sha256:7fc04e92e1d624a4a63c76474610238576942d6b8950a2d7f908a340494e67e4" }, - { file = "tomli-2.2.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:f4039b9cbc3048b2416cc57ab3bda989a6fcf9b36cf8937f01a6e731b64f80d7" }, - { file = "tomli-2.2.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:286f0ca2ffeeb5b9bd4fcc8d6c330534323ec51b2f52da063b11c502da16f30c" }, - { file = "tomli-2.2.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a92ef1a44547e894e2a17d24e7557a5e85a9e1d0048b0b5e7541f76c5032cb13" }, - { file = "tomli-2.2.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9316dc65bed1684c9a98ee68759ceaed29d229e985297003e494aa825ebb0281" }, - { file = "tomli-2.2.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e85e99945e688e32d5a35c1ff38ed0b3f41f43fad8df0bdf79f72b2ba7bc5272" }, - { file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:ac065718db92ca818f8d6141b5f66369833d4a80a9d74435a268c52bdfa73140" }, - { file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:d920f33822747519673ee656a4b6ac33e382eca9d331c87770faa3eef562aeb2" }, - { file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:a198f10c4d1b1375d7687bc25294306e551bf1abfa4eace6650070a5c1ae2744" }, - { file = "tomli-2.2.1-cp313-cp313-win32.whl", hash = "sha256:d3f5614314d758649ab2ab3a62d4f2004c825922f9e370b29416484086b264ec" }, - { file = "tomli-2.2.1-cp313-cp313-win_amd64.whl", hash = "sha256:a38aa0308e754b0e3c67e344754dff64999ff9b513e691d0e786265c93583c69" }, - { file = "tomli-2.2.1-py3-none-any.whl", hash = "sha256:cb55c73c5f4408779d0cf3eef9f762b9c9f147a77de7b258bef0a5628adc85cc" }, - { file = "tomli-2.2.1.tar.gz", hash = "sha256:cd45e1dc79c835ce60f7404ec8119f2eb06d38b1deba146f07ced3bbc44505ff" }, + {file = "tomli-2.2.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:678e4fa69e4575eb77d103de3df8a895e1591b48e740211bd1067378c69e8249"}, + {file = "tomli-2.2.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:023aa114dd824ade0100497eb2318602af309e5a55595f76b626d6d9f3b7b0a6"}, + {file = "tomli-2.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:ece47d672db52ac607a3d9599a9d48dcb2f2f735c6c2d1f34130085bb12b112a"}, + {file = "tomli-2.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6972ca9c9cc9f0acaa56a8ca1ff51e7af152a9f87fb64623e31d5c83700080ee"}, + {file = "tomli-2.2.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c954d2250168d28797dd4e3ac5cf812a406cd5a92674ee4c8f123c889786aa8e"}, + {file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:8dd28b3e155b80f4d54beb40a441d366adcfe740969820caf156c019fb5c7ec4"}, + {file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:e59e304978767a54663af13c07b3d1af22ddee3bb2fb0618ca1593e4f593a106"}, + {file = "tomli-2.2.1-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:33580bccab0338d00994d7f16f4c4ec25b776af3ffaac1ed74e0b3fc95e885a8"}, + {file = "tomli-2.2.1-cp311-cp311-win32.whl", hash = "sha256:465af0e0875402f1d226519c9904f37254b3045fc5084697cefb9bdde1ff99ff"}, + {file = "tomli-2.2.1-cp311-cp311-win_amd64.whl", hash = "sha256:2d0f2fdd22b02c6d81637a3c95f8cd77f995846af7414c5c4b8d0545afa1bc4b"}, + {file = "tomli-2.2.1-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:4a8f6e44de52d5e6c657c9fe83b562f5f4256d8ebbfe4ff922c495620a7f6cea"}, + {file = "tomli-2.2.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:8d57ca8095a641b8237d5b079147646153d22552f1c637fd3ba7f4b0b29167a8"}, + {file = "tomli-2.2.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4e340144ad7ae1533cb897d406382b4b6fede8890a03738ff1683af800d54192"}, + {file = "tomli-2.2.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:db2b95f9de79181805df90bedc5a5ab4c165e6ec3fe99f970d0e302f384ad222"}, + {file = "tomli-2.2.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:40741994320b232529c802f8bc86da4e1aa9f413db394617b9a256ae0f9a7f77"}, + {file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:400e720fe168c0f8521520190686ef8ef033fb19fc493da09779e592861b78c6"}, + {file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:02abe224de6ae62c19f090f68da4e27b10af2b93213d36cf44e6e1c5abd19fdd"}, + {file = "tomli-2.2.1-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:b82ebccc8c8a36f2094e969560a1b836758481f3dc360ce9a3277c65f374285e"}, + {file = "tomli-2.2.1-cp312-cp312-win32.whl", hash = "sha256:889f80ef92701b9dbb224e49ec87c645ce5df3fa2cc548664eb8a25e03127a98"}, + {file = "tomli-2.2.1-cp312-cp312-win_amd64.whl", hash = "sha256:7fc04e92e1d624a4a63c76474610238576942d6b8950a2d7f908a340494e67e4"}, + {file = "tomli-2.2.1-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:f4039b9cbc3048b2416cc57ab3bda989a6fcf9b36cf8937f01a6e731b64f80d7"}, + {file = "tomli-2.2.1-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:286f0ca2ffeeb5b9bd4fcc8d6c330534323ec51b2f52da063b11c502da16f30c"}, + {file = "tomli-2.2.1-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a92ef1a44547e894e2a17d24e7557a5e85a9e1d0048b0b5e7541f76c5032cb13"}, + {file = "tomli-2.2.1-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9316dc65bed1684c9a98ee68759ceaed29d229e985297003e494aa825ebb0281"}, + {file = "tomli-2.2.1-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e85e99945e688e32d5a35c1ff38ed0b3f41f43fad8df0bdf79f72b2ba7bc5272"}, + {file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:ac065718db92ca818f8d6141b5f66369833d4a80a9d74435a268c52bdfa73140"}, + {file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:d920f33822747519673ee656a4b6ac33e382eca9d331c87770faa3eef562aeb2"}, + {file = "tomli-2.2.1-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:a198f10c4d1b1375d7687bc25294306e551bf1abfa4eace6650070a5c1ae2744"}, + {file = "tomli-2.2.1-cp313-cp313-win32.whl", hash = "sha256:d3f5614314d758649ab2ab3a62d4f2004c825922f9e370b29416484086b264ec"}, + {file = "tomli-2.2.1-cp313-cp313-win_amd64.whl", hash = "sha256:a38aa0308e754b0e3c67e344754dff64999ff9b513e691d0e786265c93583c69"}, + {file = "tomli-2.2.1-py3-none-any.whl", hash = "sha256:cb55c73c5f4408779d0cf3eef9f762b9c9f147a77de7b258bef0a5628adc85cc"}, + {file = "tomli-2.2.1.tar.gz", hash = "sha256:cd45e1dc79c835ce60f7404ec8119f2eb06d38b1deba146f07ced3bbc44505ff"}, ] [[package]] @@ -1064,8 +1092,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "tox-4.24.2-py3-none-any.whl", hash = "sha256:92e8290e76ad4e15748860a205865696409a2d014eedeb796a34a0f3b5e7336e" }, - { file = "tox-4.24.2.tar.gz", hash = "sha256:d5948b350f76fae436d6545a5e87c2b676ab7a0d7d88c1308651245eadbe8aea" }, + {file = "tox-4.24.2-py3-none-any.whl", hash = "sha256:92e8290e76ad4e15748860a205865696409a2d014eedeb796a34a0f3b5e7336e"}, + {file = "tox-4.24.2.tar.gz", hash = "sha256:d5948b350f76fae436d6545a5e87c2b676ab7a0d7d88c1308651245eadbe8aea"}, ] [package.dependencies] @@ -1077,8 +1105,8 @@ packaging = ">=24.2" platformdirs = ">=4.3.6" pluggy = ">=1.5" pyproject-api = ">=1.8" -tomli = { version = ">=2.2.1", markers = "python_version < \"3.11\"" } -typing-extensions = { version = ">=4.12.2", markers = "python_version < \"3.11\"" } +tomli = {version = ">=2.2.1", markers = "python_version < \"3.11\""} +typing-extensions = {version = ">=4.12.2", markers = "python_version < \"3.11\""} virtualenv = ">=20.29.1" [package.extras] @@ -1092,8 +1120,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "types_python_dateutil-2.9.0.20241206-py3-none-any.whl", hash = "sha256:e248a4bc70a486d3e3ec84d0dc30eec3a5f979d6e7ee4123ae043eedbb987f53" }, - { file = "types_python_dateutil-2.9.0.20241206.tar.gz", hash = "sha256:18f493414c26ffba692a72369fea7a154c502646301ebfe3d56a04b3767284cb" }, + {file = "types_python_dateutil-2.9.0.20241206-py3-none-any.whl", hash = "sha256:e248a4bc70a486d3e3ec84d0dc30eec3a5f979d6e7ee4123ae043eedbb987f53"}, + {file = "types_python_dateutil-2.9.0.20241206.tar.gz", hash = "sha256:18f493414c26ffba692a72369fea7a154c502646301ebfe3d56a04b3767284cb"}, ] [[package]] @@ -1104,8 +1132,8 @@ optional = false python-versions = ">=3.8" groups = ["main", "dev"] files = [ - { file = "typing_extensions-4.13.0-py3-none-any.whl", hash = "sha256:c8dd92cc0d6425a97c18fbb9d1954e5ff92c1ca881a309c45f06ebc0b79058e5" }, - { file = "typing_extensions-4.13.0.tar.gz", hash = "sha256:0a4ac55a5820789d87e297727d229866c9650f6521b64206413c4fbada24d95b" }, + {file = "typing_extensions-4.13.0-py3-none-any.whl", hash = "sha256:c8dd92cc0d6425a97c18fbb9d1954e5ff92c1ca881a309c45f06ebc0b79058e5"}, + {file = "typing_extensions-4.13.0.tar.gz", hash = "sha256:0a4ac55a5820789d87e297727d229866c9650f6521b64206413c4fbada24d95b"}, ] [[package]] @@ -1116,8 +1144,8 @@ optional = false python-versions = ">=3.8" groups = ["main", "dev"] files = [ - { file = "urllib3-2.2.3-py3-none-any.whl", hash = "sha256:ca899ca043dcb1bafa3e262d73aa25c465bfb49e0bd9dd5d59f1d0acba2f8fac" }, - { file = "urllib3-2.2.3.tar.gz", hash = "sha256:e7d814a81dad81e6caf2ec9fdedb284ecc9c73076b62654547cc64ccdcae26e9" }, + {file = "urllib3-2.2.3-py3-none-any.whl", hash = "sha256:ca899ca043dcb1bafa3e262d73aa25c465bfb49e0bd9dd5d59f1d0acba2f8fac"}, + {file = "urllib3-2.2.3.tar.gz", hash = "sha256:e7d814a81dad81e6caf2ec9fdedb284ecc9c73076b62654547cc64ccdcae26e9"}, ] [package.extras] @@ -1134,8 +1162,8 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "virtualenv-20.29.3-py3-none-any.whl", hash = "sha256:3e3d00f5807e83b234dfb6122bf37cfadf4be216c53a49ac059d02414f819170" }, - { file = "virtualenv-20.29.3.tar.gz", hash = "sha256:95e39403fcf3940ac45bc717597dba16110b74506131845d9b687d5e73d947ac" }, + {file = "virtualenv-20.29.3-py3-none-any.whl", hash = "sha256:3e3d00f5807e83b234dfb6122bf37cfadf4be216c53a49ac059d02414f819170"}, + {file = "virtualenv-20.29.3.tar.gz", hash = "sha256:95e39403fcf3940ac45bc717597dba16110b74506131845d9b687d5e73d947ac"}, ] [package.dependencies] @@ -1155,88 +1183,88 @@ optional = false python-versions = ">=3.8" groups = ["dev"] files = [ - { file = "wrapt-1.17.2-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:3d57c572081fed831ad2d26fd430d565b76aa277ed1d30ff4d40670b1c0dd984" }, - { file = "wrapt-1.17.2-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:b5e251054542ae57ac7f3fba5d10bfff615b6c2fb09abeb37d2f1463f841ae22" }, - { file = "wrapt-1.17.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:80dd7db6a7cb57ffbc279c4394246414ec99537ae81ffd702443335a61dbf3a7" }, - { file = "wrapt-1.17.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0a6e821770cf99cc586d33833b2ff32faebdbe886bd6322395606cf55153246c" }, - { file = "wrapt-1.17.2-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b60fb58b90c6d63779cb0c0c54eeb38941bae3ecf7a73c764c52c88c2dcb9d72" }, - { file = "wrapt-1.17.2-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b870b5df5b71d8c3359d21be8f0d6c485fa0ebdb6477dda51a1ea54a9b558061" }, - { file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:4011d137b9955791f9084749cba9a367c68d50ab8d11d64c50ba1688c9b457f2" }, - { file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:1473400e5b2733e58b396a04eb7f35f541e1fb976d0c0724d0223dd607e0f74c" }, - { file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:3cedbfa9c940fdad3e6e941db7138e26ce8aad38ab5fe9dcfadfed9db7a54e62" }, - { file = "wrapt-1.17.2-cp310-cp310-win32.whl", hash = "sha256:582530701bff1dec6779efa00c516496968edd851fba224fbd86e46cc6b73563" }, - { file = "wrapt-1.17.2-cp310-cp310-win_amd64.whl", hash = "sha256:58705da316756681ad3c9c73fd15499aa4d8c69f9fd38dc8a35e06c12468582f" }, - { file = "wrapt-1.17.2-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:ff04ef6eec3eee8a5efef2401495967a916feaa353643defcc03fc74fe213b58" }, - { file = "wrapt-1.17.2-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:4db983e7bca53819efdbd64590ee96c9213894272c776966ca6306b73e4affda" }, - { file = "wrapt-1.17.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:9abc77a4ce4c6f2a3168ff34b1da9b0f311a8f1cfd694ec96b0603dff1c79438" }, - { file = "wrapt-1.17.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0b929ac182f5ace000d459c59c2c9c33047e20e935f8e39371fa6e3b85d56f4a" }, - { file = "wrapt-1.17.2-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f09b286faeff3c750a879d336fb6d8713206fc97af3adc14def0cdd349df6000" }, - { file = "wrapt-1.17.2-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1a7ed2d9d039bd41e889f6fb9364554052ca21ce823580f6a07c4ec245c1f5d6" }, - { file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:129a150f5c445165ff941fc02ee27df65940fcb8a22a61828b1853c98763a64b" }, - { file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:1fb5699e4464afe5c7e65fa51d4f99e0b2eadcc176e4aa33600a3df7801d6662" }, - { file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:9a2bce789a5ea90e51a02dfcc39e31b7f1e662bc3317979aa7e5538e3a034f72" }, - { file = "wrapt-1.17.2-cp311-cp311-win32.whl", hash = "sha256:4afd5814270fdf6380616b321fd31435a462019d834f83c8611a0ce7484c7317" }, - { file = "wrapt-1.17.2-cp311-cp311-win_amd64.whl", hash = "sha256:acc130bc0375999da18e3d19e5a86403667ac0c4042a094fefb7eec8ebac7cf3" }, - { file = "wrapt-1.17.2-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:d5e2439eecc762cd85e7bd37161d4714aa03a33c5ba884e26c81559817ca0925" }, - { file = "wrapt-1.17.2-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:3fc7cb4c1c744f8c05cd5f9438a3caa6ab94ce8344e952d7c45a8ed59dd88392" }, - { file = "wrapt-1.17.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:8fdbdb757d5390f7c675e558fd3186d590973244fab0c5fe63d373ade3e99d40" }, - { file = "wrapt-1.17.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:5bb1d0dbf99411f3d871deb6faa9aabb9d4e744d67dcaaa05399af89d847a91d" }, - { file = "wrapt-1.17.2-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d18a4865f46b8579d44e4fe1e2bcbc6472ad83d98e22a26c963d46e4c125ef0b" }, - { file = "wrapt-1.17.2-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bc570b5f14a79734437cb7b0500376b6b791153314986074486e0b0fa8d71d98" }, - { file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:6d9187b01bebc3875bac9b087948a2bccefe464a7d8f627cf6e48b1bbae30f82" }, - { file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:9e8659775f1adf02eb1e6f109751268e493c73716ca5761f8acb695e52a756ae" }, - { file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:e8b2816ebef96d83657b56306152a93909a83f23994f4b30ad4573b00bd11bb9" }, - { file = "wrapt-1.17.2-cp312-cp312-win32.whl", hash = "sha256:468090021f391fe0056ad3e807e3d9034e0fd01adcd3bdfba977b6fdf4213ea9" }, - { file = "wrapt-1.17.2-cp312-cp312-win_amd64.whl", hash = "sha256:ec89ed91f2fa8e3f52ae53cd3cf640d6feff92ba90d62236a81e4e563ac0e991" }, - { file = "wrapt-1.17.2-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:6ed6ffac43aecfe6d86ec5b74b06a5be33d5bb9243d055141e8cabb12aa08125" }, - { file = "wrapt-1.17.2-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:35621ae4c00e056adb0009f8e86e28eb4a41a4bfa8f9bfa9fca7d343fe94f998" }, - { file = "wrapt-1.17.2-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:a604bf7a053f8362d27eb9fefd2097f82600b856d5abe996d623babd067b1ab5" }, - { file = "wrapt-1.17.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:5cbabee4f083b6b4cd282f5b817a867cf0b1028c54d445b7ec7cfe6505057cf8" }, - { file = "wrapt-1.17.2-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:49703ce2ddc220df165bd2962f8e03b84c89fee2d65e1c24a7defff6f988f4d6" }, - { file = "wrapt-1.17.2-cp313-cp313-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8112e52c5822fc4253f3901b676c55ddf288614dc7011634e2719718eaa187dc" }, - { file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:9fee687dce376205d9a494e9c121e27183b2a3df18037f89d69bd7b35bcf59e2" }, - { file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:18983c537e04d11cf027fbb60a1e8dfd5190e2b60cc27bc0808e653e7b218d1b" }, - { file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:703919b1633412ab54bcf920ab388735832fdcb9f9a00ae49387f0fe67dad504" }, - { file = "wrapt-1.17.2-cp313-cp313-win32.whl", hash = "sha256:abbb9e76177c35d4e8568e58650aa6926040d6a9f6f03435b7a522bf1c487f9a" }, - { file = "wrapt-1.17.2-cp313-cp313-win_amd64.whl", hash = "sha256:69606d7bb691b50a4240ce6b22ebb319c1cfb164e5f6569835058196e0f3a845" }, - { file = "wrapt-1.17.2-cp313-cp313t-macosx_10_13_universal2.whl", hash = "sha256:4a721d3c943dae44f8e243b380cb645a709ba5bd35d3ad27bc2ed947e9c68192" }, - { file = "wrapt-1.17.2-cp313-cp313t-macosx_10_13_x86_64.whl", hash = "sha256:766d8bbefcb9e00c3ac3b000d9acc51f1b399513f44d77dfe0eb026ad7c9a19b" }, - { file = "wrapt-1.17.2-cp313-cp313t-macosx_11_0_arm64.whl", hash = "sha256:e496a8ce2c256da1eb98bd15803a79bee00fc351f5dfb9ea82594a3f058309e0" }, - { file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:40d615e4fe22f4ad3528448c193b218e077656ca9ccb22ce2cb20db730f8d306" }, - { file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a5aaeff38654462bc4b09023918b7f21790efb807f54c000a39d41d69cf552cb" }, - { file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9a7d15bbd2bc99e92e39f49a04653062ee6085c0e18b3b7512a4f2fe91f2d681" }, - { file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_aarch64.whl", hash = "sha256:e3890b508a23299083e065f435a492b5435eba6e304a7114d2f919d400888cc6" }, - { file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_i686.whl", hash = "sha256:8c8b293cd65ad716d13d8dd3624e42e5a19cc2a2f1acc74b30c2c13f15cb61a6" }, - { file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_x86_64.whl", hash = "sha256:4c82b8785d98cdd9fed4cac84d765d234ed3251bd6afe34cb7ac523cb93e8b4f" }, - { file = "wrapt-1.17.2-cp313-cp313t-win32.whl", hash = "sha256:13e6afb7fe71fe7485a4550a8844cc9ffbe263c0f1a1eea569bc7091d4898555" }, - { file = "wrapt-1.17.2-cp313-cp313t-win_amd64.whl", hash = "sha256:eaf675418ed6b3b31c7a989fd007fa7c3be66ce14e5c3b27336383604c9da85c" }, - { file = "wrapt-1.17.2-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:5c803c401ea1c1c18de70a06a6f79fcc9c5acfc79133e9869e730ad7f8ad8ef9" }, - { file = "wrapt-1.17.2-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:f917c1180fdb8623c2b75a99192f4025e412597c50b2ac870f156de8fb101119" }, - { file = "wrapt-1.17.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:ecc840861360ba9d176d413a5489b9a0aff6d6303d7e733e2c4623cfa26904a6" }, - { file = "wrapt-1.17.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:bb87745b2e6dc56361bfde481d5a378dc314b252a98d7dd19a651a3fa58f24a9" }, - { file = "wrapt-1.17.2-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:58455b79ec2661c3600e65c0a716955adc2410f7383755d537584b0de41b1d8a" }, - { file = "wrapt-1.17.2-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b4e42a40a5e164cbfdb7b386c966a588b1047558a990981ace551ed7e12ca9c2" }, - { file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:91bd7d1773e64019f9288b7a5101f3ae50d3d8e6b1de7edee9c2ccc1d32f0c0a" }, - { file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:bb90fb8bda722a1b9d48ac1e6c38f923ea757b3baf8ebd0c82e09c5c1a0e7a04" }, - { file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:08e7ce672e35efa54c5024936e559469436f8b8096253404faeb54d2a878416f" }, - { file = "wrapt-1.17.2-cp38-cp38-win32.whl", hash = "sha256:410a92fefd2e0e10d26210e1dfb4a876ddaf8439ef60d6434f21ef8d87efc5b7" }, - { file = "wrapt-1.17.2-cp38-cp38-win_amd64.whl", hash = "sha256:95c658736ec15602da0ed73f312d410117723914a5c91a14ee4cdd72f1d790b3" }, - { file = "wrapt-1.17.2-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:99039fa9e6306880572915728d7f6c24a86ec57b0a83f6b2491e1d8ab0235b9a" }, - { file = "wrapt-1.17.2-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:2696993ee1eebd20b8e4ee4356483c4cb696066ddc24bd70bcbb80fa56ff9061" }, - { file = "wrapt-1.17.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:612dff5db80beef9e649c6d803a8d50c409082f1fedc9dbcdfde2983b2025b82" }, - { file = "wrapt-1.17.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:62c2caa1585c82b3f7a7ab56afef7b3602021d6da34fbc1cf234ff139fed3cd9" }, - { file = "wrapt-1.17.2-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c958bcfd59bacc2d0249dcfe575e71da54f9dcf4a8bdf89c4cb9a68a1170d73f" }, - { file = "wrapt-1.17.2-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fc78a84e2dfbc27afe4b2bd7c80c8db9bca75cc5b85df52bfe634596a1da846b" }, - { file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:ba0f0eb61ef00ea10e00eb53a9129501f52385c44853dbd6c4ad3f403603083f" }, - { file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:1e1fe0e6ab7775fd842bc39e86f6dcfc4507ab0ffe206093e76d61cde37225c8" }, - { file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:c86563182421896d73858e08e1db93afdd2b947a70064b813d515d66549e15f9" }, - { file = "wrapt-1.17.2-cp39-cp39-win32.whl", hash = "sha256:f393cda562f79828f38a819f4788641ac7c4085f30f1ce1a68672baa686482bb" }, - { file = "wrapt-1.17.2-cp39-cp39-win_amd64.whl", hash = "sha256:36ccae62f64235cf8ddb682073a60519426fdd4725524ae38874adf72b5f2aeb" }, - { file = "wrapt-1.17.2-py3-none-any.whl", hash = "sha256:b18f2d1533a71f069c7f82d524a52599053d4c7166e9dd374ae2136b7f40f7c8" }, - { file = "wrapt-1.17.2.tar.gz", hash = "sha256:41388e9d4d1522446fe79d3213196bd9e3b301a336965b9e27ca2788ebd122f3" }, + {file = "wrapt-1.17.2-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:3d57c572081fed831ad2d26fd430d565b76aa277ed1d30ff4d40670b1c0dd984"}, + {file = "wrapt-1.17.2-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:b5e251054542ae57ac7f3fba5d10bfff615b6c2fb09abeb37d2f1463f841ae22"}, + {file = "wrapt-1.17.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:80dd7db6a7cb57ffbc279c4394246414ec99537ae81ffd702443335a61dbf3a7"}, + {file = "wrapt-1.17.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0a6e821770cf99cc586d33833b2ff32faebdbe886bd6322395606cf55153246c"}, + {file = "wrapt-1.17.2-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b60fb58b90c6d63779cb0c0c54eeb38941bae3ecf7a73c764c52c88c2dcb9d72"}, + {file = "wrapt-1.17.2-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b870b5df5b71d8c3359d21be8f0d6c485fa0ebdb6477dda51a1ea54a9b558061"}, + {file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_aarch64.whl", hash = "sha256:4011d137b9955791f9084749cba9a367c68d50ab8d11d64c50ba1688c9b457f2"}, + {file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_i686.whl", hash = "sha256:1473400e5b2733e58b396a04eb7f35f541e1fb976d0c0724d0223dd607e0f74c"}, + {file = "wrapt-1.17.2-cp310-cp310-musllinux_1_2_x86_64.whl", hash = "sha256:3cedbfa9c940fdad3e6e941db7138e26ce8aad38ab5fe9dcfadfed9db7a54e62"}, + {file = "wrapt-1.17.2-cp310-cp310-win32.whl", hash = "sha256:582530701bff1dec6779efa00c516496968edd851fba224fbd86e46cc6b73563"}, + {file = "wrapt-1.17.2-cp310-cp310-win_amd64.whl", hash = "sha256:58705da316756681ad3c9c73fd15499aa4d8c69f9fd38dc8a35e06c12468582f"}, + {file = "wrapt-1.17.2-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:ff04ef6eec3eee8a5efef2401495967a916feaa353643defcc03fc74fe213b58"}, + {file = "wrapt-1.17.2-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:4db983e7bca53819efdbd64590ee96c9213894272c776966ca6306b73e4affda"}, + {file = "wrapt-1.17.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:9abc77a4ce4c6f2a3168ff34b1da9b0f311a8f1cfd694ec96b0603dff1c79438"}, + {file = "wrapt-1.17.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0b929ac182f5ace000d459c59c2c9c33047e20e935f8e39371fa6e3b85d56f4a"}, + {file = "wrapt-1.17.2-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f09b286faeff3c750a879d336fb6d8713206fc97af3adc14def0cdd349df6000"}, + {file = "wrapt-1.17.2-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1a7ed2d9d039bd41e889f6fb9364554052ca21ce823580f6a07c4ec245c1f5d6"}, + {file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_aarch64.whl", hash = "sha256:129a150f5c445165ff941fc02ee27df65940fcb8a22a61828b1853c98763a64b"}, + {file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_i686.whl", hash = "sha256:1fb5699e4464afe5c7e65fa51d4f99e0b2eadcc176e4aa33600a3df7801d6662"}, + {file = "wrapt-1.17.2-cp311-cp311-musllinux_1_2_x86_64.whl", hash = "sha256:9a2bce789a5ea90e51a02dfcc39e31b7f1e662bc3317979aa7e5538e3a034f72"}, + {file = "wrapt-1.17.2-cp311-cp311-win32.whl", hash = "sha256:4afd5814270fdf6380616b321fd31435a462019d834f83c8611a0ce7484c7317"}, + {file = "wrapt-1.17.2-cp311-cp311-win_amd64.whl", hash = "sha256:acc130bc0375999da18e3d19e5a86403667ac0c4042a094fefb7eec8ebac7cf3"}, + {file = "wrapt-1.17.2-cp312-cp312-macosx_10_13_universal2.whl", hash = "sha256:d5e2439eecc762cd85e7bd37161d4714aa03a33c5ba884e26c81559817ca0925"}, + {file = "wrapt-1.17.2-cp312-cp312-macosx_10_13_x86_64.whl", hash = "sha256:3fc7cb4c1c744f8c05cd5f9438a3caa6ab94ce8344e952d7c45a8ed59dd88392"}, + {file = "wrapt-1.17.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:8fdbdb757d5390f7c675e558fd3186d590973244fab0c5fe63d373ade3e99d40"}, + {file = "wrapt-1.17.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:5bb1d0dbf99411f3d871deb6faa9aabb9d4e744d67dcaaa05399af89d847a91d"}, + {file = "wrapt-1.17.2-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d18a4865f46b8579d44e4fe1e2bcbc6472ad83d98e22a26c963d46e4c125ef0b"}, + {file = "wrapt-1.17.2-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:bc570b5f14a79734437cb7b0500376b6b791153314986074486e0b0fa8d71d98"}, + {file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_aarch64.whl", hash = "sha256:6d9187b01bebc3875bac9b087948a2bccefe464a7d8f627cf6e48b1bbae30f82"}, + {file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_i686.whl", hash = "sha256:9e8659775f1adf02eb1e6f109751268e493c73716ca5761f8acb695e52a756ae"}, + {file = "wrapt-1.17.2-cp312-cp312-musllinux_1_2_x86_64.whl", hash = "sha256:e8b2816ebef96d83657b56306152a93909a83f23994f4b30ad4573b00bd11bb9"}, + {file = "wrapt-1.17.2-cp312-cp312-win32.whl", hash = "sha256:468090021f391fe0056ad3e807e3d9034e0fd01adcd3bdfba977b6fdf4213ea9"}, + {file = "wrapt-1.17.2-cp312-cp312-win_amd64.whl", hash = "sha256:ec89ed91f2fa8e3f52ae53cd3cf640d6feff92ba90d62236a81e4e563ac0e991"}, + {file = "wrapt-1.17.2-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:6ed6ffac43aecfe6d86ec5b74b06a5be33d5bb9243d055141e8cabb12aa08125"}, + {file = "wrapt-1.17.2-cp313-cp313-macosx_10_13_x86_64.whl", hash = "sha256:35621ae4c00e056adb0009f8e86e28eb4a41a4bfa8f9bfa9fca7d343fe94f998"}, + {file = "wrapt-1.17.2-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:a604bf7a053f8362d27eb9fefd2097f82600b856d5abe996d623babd067b1ab5"}, + {file = "wrapt-1.17.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:5cbabee4f083b6b4cd282f5b817a867cf0b1028c54d445b7ec7cfe6505057cf8"}, + {file = "wrapt-1.17.2-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:49703ce2ddc220df165bd2962f8e03b84c89fee2d65e1c24a7defff6f988f4d6"}, + {file = "wrapt-1.17.2-cp313-cp313-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8112e52c5822fc4253f3901b676c55ddf288614dc7011634e2719718eaa187dc"}, + {file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:9fee687dce376205d9a494e9c121e27183b2a3df18037f89d69bd7b35bcf59e2"}, + {file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:18983c537e04d11cf027fbb60a1e8dfd5190e2b60cc27bc0808e653e7b218d1b"}, + {file = "wrapt-1.17.2-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:703919b1633412ab54bcf920ab388735832fdcb9f9a00ae49387f0fe67dad504"}, + {file = "wrapt-1.17.2-cp313-cp313-win32.whl", hash = "sha256:abbb9e76177c35d4e8568e58650aa6926040d6a9f6f03435b7a522bf1c487f9a"}, + {file = "wrapt-1.17.2-cp313-cp313-win_amd64.whl", hash = "sha256:69606d7bb691b50a4240ce6b22ebb319c1cfb164e5f6569835058196e0f3a845"}, + {file = "wrapt-1.17.2-cp313-cp313t-macosx_10_13_universal2.whl", hash = "sha256:4a721d3c943dae44f8e243b380cb645a709ba5bd35d3ad27bc2ed947e9c68192"}, + {file = "wrapt-1.17.2-cp313-cp313t-macosx_10_13_x86_64.whl", hash = "sha256:766d8bbefcb9e00c3ac3b000d9acc51f1b399513f44d77dfe0eb026ad7c9a19b"}, + {file = "wrapt-1.17.2-cp313-cp313t-macosx_11_0_arm64.whl", hash = "sha256:e496a8ce2c256da1eb98bd15803a79bee00fc351f5dfb9ea82594a3f058309e0"}, + {file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:40d615e4fe22f4ad3528448c193b218e077656ca9ccb22ce2cb20db730f8d306"}, + {file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a5aaeff38654462bc4b09023918b7f21790efb807f54c000a39d41d69cf552cb"}, + {file = "wrapt-1.17.2-cp313-cp313t-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9a7d15bbd2bc99e92e39f49a04653062ee6085c0e18b3b7512a4f2fe91f2d681"}, + {file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_aarch64.whl", hash = "sha256:e3890b508a23299083e065f435a492b5435eba6e304a7114d2f919d400888cc6"}, + {file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_i686.whl", hash = "sha256:8c8b293cd65ad716d13d8dd3624e42e5a19cc2a2f1acc74b30c2c13f15cb61a6"}, + {file = "wrapt-1.17.2-cp313-cp313t-musllinux_1_2_x86_64.whl", hash = "sha256:4c82b8785d98cdd9fed4cac84d765d234ed3251bd6afe34cb7ac523cb93e8b4f"}, + {file = "wrapt-1.17.2-cp313-cp313t-win32.whl", hash = "sha256:13e6afb7fe71fe7485a4550a8844cc9ffbe263c0f1a1eea569bc7091d4898555"}, + {file = "wrapt-1.17.2-cp313-cp313t-win_amd64.whl", hash = "sha256:eaf675418ed6b3b31c7a989fd007fa7c3be66ce14e5c3b27336383604c9da85c"}, + {file = "wrapt-1.17.2-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:5c803c401ea1c1c18de70a06a6f79fcc9c5acfc79133e9869e730ad7f8ad8ef9"}, + {file = "wrapt-1.17.2-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:f917c1180fdb8623c2b75a99192f4025e412597c50b2ac870f156de8fb101119"}, + {file = "wrapt-1.17.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:ecc840861360ba9d176d413a5489b9a0aff6d6303d7e733e2c4623cfa26904a6"}, + {file = "wrapt-1.17.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:bb87745b2e6dc56361bfde481d5a378dc314b252a98d7dd19a651a3fa58f24a9"}, + {file = "wrapt-1.17.2-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:58455b79ec2661c3600e65c0a716955adc2410f7383755d537584b0de41b1d8a"}, + {file = "wrapt-1.17.2-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b4e42a40a5e164cbfdb7b386c966a588b1047558a990981ace551ed7e12ca9c2"}, + {file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_aarch64.whl", hash = "sha256:91bd7d1773e64019f9288b7a5101f3ae50d3d8e6b1de7edee9c2ccc1d32f0c0a"}, + {file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_i686.whl", hash = "sha256:bb90fb8bda722a1b9d48ac1e6c38f923ea757b3baf8ebd0c82e09c5c1a0e7a04"}, + {file = "wrapt-1.17.2-cp38-cp38-musllinux_1_2_x86_64.whl", hash = "sha256:08e7ce672e35efa54c5024936e559469436f8b8096253404faeb54d2a878416f"}, + {file = "wrapt-1.17.2-cp38-cp38-win32.whl", hash = "sha256:410a92fefd2e0e10d26210e1dfb4a876ddaf8439ef60d6434f21ef8d87efc5b7"}, + {file = "wrapt-1.17.2-cp38-cp38-win_amd64.whl", hash = "sha256:95c658736ec15602da0ed73f312d410117723914a5c91a14ee4cdd72f1d790b3"}, + {file = "wrapt-1.17.2-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:99039fa9e6306880572915728d7f6c24a86ec57b0a83f6b2491e1d8ab0235b9a"}, + {file = "wrapt-1.17.2-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:2696993ee1eebd20b8e4ee4356483c4cb696066ddc24bd70bcbb80fa56ff9061"}, + {file = "wrapt-1.17.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:612dff5db80beef9e649c6d803a8d50c409082f1fedc9dbcdfde2983b2025b82"}, + {file = "wrapt-1.17.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:62c2caa1585c82b3f7a7ab56afef7b3602021d6da34fbc1cf234ff139fed3cd9"}, + {file = "wrapt-1.17.2-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c958bcfd59bacc2d0249dcfe575e71da54f9dcf4a8bdf89c4cb9a68a1170d73f"}, + {file = "wrapt-1.17.2-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fc78a84e2dfbc27afe4b2bd7c80c8db9bca75cc5b85df52bfe634596a1da846b"}, + {file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_aarch64.whl", hash = "sha256:ba0f0eb61ef00ea10e00eb53a9129501f52385c44853dbd6c4ad3f403603083f"}, + {file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_i686.whl", hash = "sha256:1e1fe0e6ab7775fd842bc39e86f6dcfc4507ab0ffe206093e76d61cde37225c8"}, + {file = "wrapt-1.17.2-cp39-cp39-musllinux_1_2_x86_64.whl", hash = "sha256:c86563182421896d73858e08e1db93afdd2b947a70064b813d515d66549e15f9"}, + {file = "wrapt-1.17.2-cp39-cp39-win32.whl", hash = "sha256:f393cda562f79828f38a819f4788641ac7c4085f30f1ce1a68672baa686482bb"}, + {file = "wrapt-1.17.2-cp39-cp39-win_amd64.whl", hash = "sha256:36ccae62f64235cf8ddb682073a60519426fdd4725524ae38874adf72b5f2aeb"}, + {file = "wrapt-1.17.2-py3-none-any.whl", hash = "sha256:b18f2d1533a71f069c7f82d524a52599053d4c7166e9dd374ae2136b7f40f7c8"}, + {file = "wrapt-1.17.2.tar.gz", hash = "sha256:41388e9d4d1522446fe79d3213196bd9e3b301a336965b9e27ca2788ebd122f3"}, ] [metadata] lock-version = "2.1" python-versions = ">=3.8" -content-hash = "d66d79be5c31db83ad345b5fe1bb384e9410902aaee7258f4719d69d7451d000" +content-hash = "cde9fdc41538aaadb2fe556fbf7d8304ac3c47f14e09d1ac283e8e270513e293" diff --git a/pyproject.toml b/pyproject.toml index ca8b3946..71d46502 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -38,6 +38,7 @@ types-python-dateutil = ">= 2.8.19.14" mypy = ">= 1.5" testcontainers = "3.7.1" python-dotenv = "1.0.1" +ruff = "^0.11.5" [build-system] requires = ["poetry-core>=1.0.0"] @@ -89,3 +90,16 @@ disable_error_code = ["import-untyped"] [tool.flake8] max-line-length = 99 + +[tool.ruff] +line-length = 88 +fix = true +target-version = "py39" +exclude = [ + "zitadel_client/api/*", + "zitadel_client/models/*" +] + +[tool.ruff.lint] +select = ["E", "F", "I", "B", "C", "N", "Q", "S", "T"] +extend-select = ["A"] diff --git a/spec/conftest.py b/spec/conftest.py index a1642246..1b2b5139 100644 --- a/spec/conftest.py +++ b/spec/conftest.py @@ -4,5 +4,5 @@ @pytest.fixture(scope="session", autouse=True) def load_env() -> None: - """Load the .env file for the entire test session.""" - load_dotenv() + """Load the .env file for the entire test session.""" + load_dotenv() diff --git a/spec/sdk_test_using_client_credentials_authentication_spec.py b/spec/sdk_test_using_client_credentials_authentication_spec.py index d1b80a65..a697b8c1 100644 --- a/spec/sdk_test_using_client_credentials_authentication_spec.py +++ b/spec/sdk_test_using_client_credentials_authentication_spec.py @@ -4,7 +4,9 @@ import pytest import zitadel_client as zitadel -from zitadel_client.auth.client_credentials_authenticator import ClientCredentialsAuthenticator +from zitadel_client.auth.client_credentials_authenticator import ( + ClientCredentialsAuthenticator, +) @pytest.fixture @@ -28,13 +30,21 @@ def base_url() -> str | None: @pytest.fixture def user_id(client_id: str, client_secret: str, base_url: str) -> str | None: """Fixture to create a user and return their ID.""" - with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, client_id, client_secret).build()) as client: + with zitadel.Zitadel( + ClientCredentialsAuthenticator.builder( + base_url, client_id, client_secret + ).build() + ) as client: try: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag") + profile=zitadel.models.V2SetHumanProfile( + given_name="John", family_name="Doe" + ), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail( + email=f"johndoe{uuid.uuid4().hex}@caos.ag" + ), ) ) print("User created:", response) @@ -43,9 +53,15 @@ def user_id(client_id: str, client_secret: str, base_url: str) -> str | None: pytest.fail(f"Exception while creating user: {e}") -def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, client_id: str, client_secret: str, base_url: str) -> None: +def test_should_deactivate_and_reactivate_user_with_valid_token( + user_id: str, client_id: str, client_secret: str, base_url: str +) -> None: """Test to (de)activate the user with a valid token.""" - with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, client_id, client_secret).build()) as client: + with zitadel.Zitadel( + ClientCredentialsAuthenticator.builder( + base_url, client_id, client_secret + ).build() + ) as client: try: deactivate_response = client.users.deactivate_user(user_id=user_id) print("User deactivated:", deactivate_response) @@ -55,20 +71,30 @@ def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, cl # Adjust based on actual response format # assert reactivate_response["status"] == "success" except Exception as e: - pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") + pytest.fail( + f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" + ) -def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, base_url: str) -> None: +def test_should_not_deactivate_or_reactivate_user_with_invalid_token( + user_id: str, base_url: str +) -> None: """Test to attempt (de)activating the user with an invalid token.""" - with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build()) as client: + with zitadel.Zitadel( + ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build() + ) as client: try: client.users.deactivate_user(user_id=user_id) - pytest.fail("Expected exception when deactivating user with invalid token, but got response.") + pytest.fail( + "Expected exception when deactivating user with invalid token, but got response." + ) except Exception as e: print("Caught expected UnauthorizedException:", e) try: client.users.reactivate_user(user_id=user_id) - pytest.fail("Expected exception when reactivating user with invalid token, but got response.") + pytest.fail( + "Expected exception when reactivating user with invalid token, but got response." + ) except Exception as e: print("Caught expected UnauthorizedException:", e) diff --git a/spec/sdk_test_using_personal_access_token_authentication_spec.py b/spec/sdk_test_using_personal_access_token_authentication_spec.py index 359ba1b1..b30e4ba3 100644 --- a/spec/sdk_test_using_personal_access_token_authentication_spec.py +++ b/spec/sdk_test_using_personal_access_token_authentication_spec.py @@ -4,7 +4,9 @@ import pytest import zitadel_client as zitadel -from zitadel_client.auth.personal_access_token_authenticator import PersonalAccessTokenAuthenticator +from zitadel_client.auth.personal_access_token_authenticator import ( + PersonalAccessTokenAuthenticator, +) from zitadel_client.exceptions import UnauthorizedException @@ -29,13 +31,19 @@ def base_url() -> str | None: @pytest.fixture def user_id(valid_token: str, base_url: str) -> str | None: """Fixture to create a user and return their ID.""" - with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, valid_token)) as client: + with zitadel.Zitadel( + PersonalAccessTokenAuthenticator(base_url, valid_token) + ) as client: try: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag") + profile=zitadel.models.V2SetHumanProfile( + given_name="John", family_name="Doe" + ), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail( + email=f"johndoe{uuid.uuid4().hex}@caos.ag" + ), ) ) print("User created:", response) @@ -44,9 +52,13 @@ def user_id(valid_token: str, base_url: str) -> str | None: pytest.fail(f"Exception while creating user: {e}") -def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, valid_token: str, base_url: str) -> None: +def test_should_deactivate_and_reactivate_user_with_valid_token( + user_id: str, valid_token: str, base_url: str +) -> None: """Test to (de)activate the user with a valid token.""" - with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, valid_token)) as client: + with zitadel.Zitadel( + PersonalAccessTokenAuthenticator(base_url, valid_token) + ) as client: try: deactivate_response = client.users.deactivate_user(user_id=user_id) print("User deactivated:", deactivate_response) @@ -56,15 +68,23 @@ def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, va # Adjust based on actual response format # assert reactivate_response["status"] == "success" except Exception as e: - pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") + pytest.fail( + f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" + ) -def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, invalid_token: str, base_url: str) -> None: +def test_should_not_deactivate_or_reactivate_user_with_invalid_token( + user_id: str, invalid_token: str, base_url: str +) -> None: """Test to attempt (de)activating the user with an invalid token.""" - with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, invalid_token)) as client: + with zitadel.Zitadel( + PersonalAccessTokenAuthenticator(base_url, invalid_token) + ) as client: try: client.users.deactivate_user(user_id=user_id) - pytest.fail("Expected exception when deactivating user with invalid token, but got response.") + pytest.fail( + "Expected exception when deactivating user with invalid token, but got response." + ) except UnauthorizedException as e: print("Caught expected UnauthorizedException:", e) except Exception as e: @@ -72,7 +92,9 @@ def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: st try: client.users.reactivate_user(user_id=user_id) - pytest.fail("Expected exception when reactivating user with invalid token, but got response.") + pytest.fail( + "Expected exception when reactivating user with invalid token, but got response." + ) except UnauthorizedException as e: print("Caught expected UnauthorizedException:", e) except Exception as e: diff --git a/spec/sdk_test_using_web_token_authentication_spec.py b/spec/sdk_test_using_web_token_authentication_spec.py index b086f752..f69a915f 100644 --- a/spec/sdk_test_using_web_token_authentication_spec.py +++ b/spec/sdk_test_using_web_token_authentication_spec.py @@ -32,8 +32,12 @@ def user_id(key_file: str, base_url: str) -> str | None: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag") + profile=zitadel.models.V2SetHumanProfile( + given_name="John", family_name="Doe" + ), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail( + email=f"johndoe{uuid.uuid4().hex}@caos.ag" + ), ) ) print("User created:", response) @@ -42,7 +46,9 @@ def user_id(key_file: str, base_url: str) -> str | None: pytest.fail(f"Exception while creating user: {e}") -def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, key_file: str, base_url: str) -> None: +def test_should_deactivate_and_reactivate_user_with_valid_token( + user_id: str, key_file: str, base_url: str +) -> None: """Test to (de)activate the user with a valid token.""" with zitadel.Zitadel(WebTokenAuthenticator.from_json(base_url, key_file)) as client: try: @@ -54,4 +60,6 @@ def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, ke # Adjust based on actual response format # assert reactivate_response["status"] == "success" except Exception as e: - pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") + pytest.fail( + f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" + ) diff --git a/test/auth/test_client_credentials_authenticator.py b/test/auth/test_client_credentials_authenticator.py index a1b16d4c..b0c2d071 100644 --- a/test/auth/test_client_credentials_authenticator.py +++ b/test/auth/test_client_credentials_authenticator.py @@ -2,29 +2,46 @@ from datetime import datetime, timezone from test.auth.test_oauth_authenticator import OAuthAuthenticatorTest -from zitadel_client.auth.client_credentials_authenticator import ClientCredentialsAuthenticator +from zitadel_client.auth.client_credentials_authenticator import ( + ClientCredentialsAuthenticator, +) class ClientCredentialsAuthenticatorTest(OAuthAuthenticatorTest): - """ - Test for ClientCredentialsAuthenticator to verify token refresh functionality. - Extends the base OAuthAuthenticatorTest class. - """ + """ + Test for ClientCredentialsAuthenticator to verify token refresh functionality. + Extends the base OAuthAuthenticatorTest class. + """ - def test_refresh_token(self) -> None: - time.sleep(20) + def test_refresh_token(self) -> None: + time.sleep(20) - assert self.oauth_host is not None - authenticator = ClientCredentialsAuthenticator.builder(self.oauth_host, "dummy-client", "dummy-secret") \ - .scopes("openid", "foo") \ - .build() + assert self.oauth_host is not None + authenticator = ( + ClientCredentialsAuthenticator.builder( + self.oauth_host, "dummy-client", "dummy-secret" + ) + .scopes("openid", "foo") + .build() + ) - self.assertTrue(authenticator.get_auth_token(), "Access token should not be empty") - token = authenticator.refresh_token() - self.assertEqual({"Authorization": "Bearer " + token.access_token}, authenticator.get_auth_headers()) - self.assertTrue(token.access_token, "Access token should not be null") - self.assertTrue(token.expires_at > datetime.now(timezone.utc), "Token expiry should be in the future") - self.assertEqual(token.access_token, authenticator.get_auth_token()) - self.assertEqual(self.oauth_host, authenticator.get_host()) - self.assertNotEqual(authenticator.refresh_token().access_token, authenticator.refresh_token().access_token, - "Two refreshToken calls should produce different tokens") + self.assertTrue( + authenticator.get_auth_token(), "Access token should not be empty" + ) + token = authenticator.refresh_token() + self.assertEqual( + {"Authorization": "Bearer " + token.access_token}, + authenticator.get_auth_headers(), + ) + self.assertTrue(token.access_token, "Access token should not be null") + self.assertTrue( + token.expires_at > datetime.now(timezone.utc), + "Token expiry should be in the future", + ) + self.assertEqual(token.access_token, authenticator.get_auth_token()) + self.assertEqual(self.oauth_host, authenticator.get_host()) + self.assertNotEqual( + authenticator.refresh_token().access_token, + authenticator.refresh_token().access_token, + "Two refreshToken calls should produce different tokens", + ) diff --git a/test/auth/test_no_auth_authenticator.py b/test/auth/test_no_auth_authenticator.py index d972a636..baf99390 100644 --- a/test/auth/test_no_auth_authenticator.py +++ b/test/auth/test_no_auth_authenticator.py @@ -4,12 +4,12 @@ class NoAuthAuthenticatorTest(unittest.TestCase): - def test_returns_empty_headers_and_default_host(self) -> None: - auth = NoAuthAuthenticator() - self.assertEqual({}, auth.get_auth_headers()) - self.assertEqual("http://localhost", auth.get_host()) - - def test_returns_empty_headers_and_custom_host(self) -> None: - auth = NoAuthAuthenticator("https://custom-host") - self.assertEqual({}, auth.get_auth_headers()) - self.assertEqual("https://custom-host", auth.get_host()) + def test_returns_empty_headers_and_default_host(self) -> None: + auth = NoAuthAuthenticator() + self.assertEqual({}, auth.get_auth_headers()) + self.assertEqual("http://localhost", auth.get_host()) + + def test_returns_empty_headers_and_custom_host(self) -> None: + auth = NoAuthAuthenticator("https://custom-host") + self.assertEqual({}, auth.get_auth_headers()) + self.assertEqual("https://custom-host", auth.get_host()) diff --git a/test/auth/test_oauth_authenticator.py b/test/auth/test_oauth_authenticator.py index 9f56aa53..e173bd31 100644 --- a/test/auth/test_oauth_authenticator.py +++ b/test/auth/test_oauth_authenticator.py @@ -4,29 +4,31 @@ class OAuthAuthenticatorTest(unittest.TestCase): - """ - Base test class for OAuth authenticators. - - This class starts a Docker container running the mock OAuth2 server - (ghcr.io/navikt/mock-oauth2-server:2.1.10) before any tests run and stops it after all tests. - It sets the class variable `oauth_host` to the container’s accessible URL. - - The container is configured to wait for an HTTP response from the "/" endpoint - with a status code of 405, using HttpWaitStrategy. - """ - oauth_host: str | None = None - mock_oauth2_server: DockerContainer = None - - @classmethod - def setUpClass(cls) -> None: - cls.mock_oauth2_server = DockerContainer("ghcr.io/navikt/mock-oauth2-server:2.1.10") \ - .with_exposed_ports(8080) - cls.mock_oauth2_server.start() - host = cls.mock_oauth2_server.get_container_host_ip() - port = cls.mock_oauth2_server.get_exposed_port(8080) - cls.oauth_host = f"http://{host}:{port}" - - @classmethod - def tearDownClass(cls) -> None: - if cls.mock_oauth2_server is not None: - cls.mock_oauth2_server.stop() + """ + Base test class for OAuth authenticators. + + This class starts a Docker container running the mock OAuth2 server + (ghcr.io/navikt/mock-oauth2-server:2.1.10) before any tests run and stops it after all tests. + It sets the class variable `oauth_host` to the container’s accessible URL. + + The container is configured to wait for an HTTP response from the "/" endpoint + with a status code of 405, using HttpWaitStrategy. + """ + + oauth_host: str | None = None + mock_oauth2_server: DockerContainer = None + + @classmethod + def setUpClass(cls) -> None: + cls.mock_oauth2_server = DockerContainer( + "ghcr.io/navikt/mock-oauth2-server:2.1.10" + ).with_exposed_ports(8080) + cls.mock_oauth2_server.start() + host = cls.mock_oauth2_server.get_container_host_ip() + port = cls.mock_oauth2_server.get_exposed_port(8080) + cls.oauth_host = f"http://{host}:{port}" + + @classmethod + def tearDownClass(cls) -> None: + if cls.mock_oauth2_server is not None: + cls.mock_oauth2_server.stop() diff --git a/test/auth/test_personal_access_authenticator.py b/test/auth/test_personal_access_authenticator.py index 0d59aa05..9609b988 100644 --- a/test/auth/test_personal_access_authenticator.py +++ b/test/auth/test_personal_access_authenticator.py @@ -1,10 +1,16 @@ import unittest -from zitadel_client.auth.personal_access_token_authenticator import PersonalAccessTokenAuthenticator +from zitadel_client.auth.personal_access_token_authenticator import ( + PersonalAccessTokenAuthenticator, +) class PersonalAccessTokenAuthenticatorTest(unittest.TestCase): - def test_returns_expected_headers_and_host(self) -> None: - auth = PersonalAccessTokenAuthenticator("https://api.example.com", "my-secret-token") - self.assertEqual({"Authorization": "Bearer my-secret-token"}, auth.get_auth_headers()) - self.assertEqual("https://api.example.com", auth.get_host()) + def test_returns_expected_headers_and_host(self) -> None: + auth = PersonalAccessTokenAuthenticator( + "https://api.example.com", "my-secret-token" + ) + self.assertEqual( + {"Authorization": "Bearer my-secret-token"}, auth.get_auth_headers() + ) + self.assertEqual("https://api.example.com", auth.get_host()) diff --git a/test/auth/test_web_token_authenticator.py b/test/auth/test_web_token_authenticator.py index 456e904b..6ec27481 100644 --- a/test/auth/test_web_token_authenticator.py +++ b/test/auth/test_web_token_authenticator.py @@ -2,7 +2,11 @@ from datetime import datetime, timezone from cryptography.hazmat.primitives.asymmetric import rsa -from cryptography.hazmat.primitives.serialization import Encoding, PrivateFormat, NoEncryption +from cryptography.hazmat.primitives.serialization import ( + Encoding, + NoEncryption, + PrivateFormat, +) from test.auth.test_oauth_authenticator import OAuthAuthenticatorTest from zitadel_client.auth.web_token_authenticator import WebTokenAuthenticator @@ -20,20 +24,35 @@ def test_refresh_token_using_builder(self) -> None: private_key_pem = key.private_bytes( encoding=Encoding.PEM, format=PrivateFormat.PKCS8, - encryption_algorithm=NoEncryption() - ).decode('utf-8') + encryption_algorithm=NoEncryption(), + ).decode("utf-8") assert self.oauth_host is not None - authenticator = WebTokenAuthenticator.builder(self.oauth_host, "dummy-client", private_key_pem) \ - .token_lifetime_seconds(3600) \ + authenticator = ( + WebTokenAuthenticator.builder( + self.oauth_host, "dummy-client", private_key_pem + ) + .token_lifetime_seconds(3600) .build() + ) - self.assertTrue(authenticator.get_auth_token(), "Access token should not be empty") + self.assertTrue( + authenticator.get_auth_token(), "Access token should not be empty" + ) token = authenticator.refresh_token() - self.assertEqual({"Authorization": "Bearer " + token.access_token}, authenticator.get_auth_headers()) + self.assertEqual( + {"Authorization": "Bearer " + token.access_token}, + authenticator.get_auth_headers(), + ) self.assertTrue(token.access_token, "Access token should not be null") - self.assertTrue(token.expires_at > datetime.now(timezone.utc), "Token expiry should be in the future") + self.assertTrue( + token.expires_at > datetime.now(timezone.utc), + "Token expiry should be in the future", + ) self.assertEqual(token.access_token, authenticator.get_auth_token()) self.assertEqual(self.oauth_host, authenticator.get_host()) - self.assertNotEqual(authenticator.refresh_token().access_token, authenticator.refresh_token().access_token, - "Two refreshToken calls should produce different tokens") + self.assertNotEqual( + authenticator.refresh_token().access_token, + authenticator.refresh_token().access_token, + "Two refreshToken calls should produce different tokens", + ) diff --git a/test/test_api_client.py b/test/test_api_client.py index 683339c0..944920bb 100644 --- a/test/test_api_client.py +++ b/test/test_api_client.py @@ -7,13 +7,16 @@ from testcontainers.core.container import DockerContainer from zitadel_client import ApiClient, Configuration -from zitadel_client.auth.personal_access_token_authenticator import PersonalAccessTokenAuthenticator +from zitadel_client.auth.personal_access_token_authenticator import ( + PersonalAccessTokenAuthenticator, +) class TestApiClient(unittest.TestCase): """ Test case for interacting with the WireMock mock OAuth2 server. """ + mock_oauth2_server: DockerContainer oauth_host: str @@ -23,8 +26,9 @@ def setUpClass(cls) -> None: Starts the WireMock Docker container and exposes the required port. Sets up the OAuth server URL. """ - cls.mock_oauth2_server = DockerContainer("wiremock/wiremock:3.12.1") \ - .with_exposed_ports(8080) + cls.mock_oauth2_server = DockerContainer( + "wiremock/wiremock:3.12.1" + ).with_exposed_ports(8080) cls.mock_oauth2_server.start() host = cls.mock_oauth2_server.get_container_host_ip() @@ -47,47 +51,51 @@ def test_assert_headers_and_content_type(self) -> None: time.sleep(20) with urllib.request.urlopen( - urllib.request.Request( - self.oauth_host + "/__admin/mappings", - data=json.dumps({ + urllib.request.Request( + self.oauth_host + "/__admin/mappings", + data=json.dumps( + { "request": { "method": "GET", "url": "/your/endpoint", "headers": { - "Authorization": { - "equalTo": "Bearer mm" - }, + "Authorization": {"equalTo": "Bearer mm"}, "User-Agent": { - "matches": "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" - } - } + "matches": "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" + }, + }, }, "response": { "status": 200, - "body": "{\"key\": \"value\"}", - "headers": { - "Content-Type": "application/json" - } - } - }).encode('utf-8'), - headers={'Content-Type': 'application/json'}, - method='POST' - ) + "body": '{"key": "value"}', + "headers": {"Content-Type": "application/json"}, + }, + } + ).encode("utf-8"), + headers={"Content-Type": "application/json"}, + method="POST", + ) ) as response: response.read().decode() api_client = ApiClient( - Configuration(authenticator=PersonalAccessTokenAuthenticator(self.oauth_host, "mm")) + Configuration( + authenticator=PersonalAccessTokenAuthenticator(self.oauth_host, "mm") + ) ) - api_response = api_client.call_api(*(api_client.param_serialize( - method='GET', - resource_path='/your/endpoint', - ))) + api_response = api_client.call_api( + *( + api_client.param_serialize( + method="GET", + resource_path="/your/endpoint", + ) + ) + ) if api_response.status != 200: self.fail(f"Expected status 200, but got {api_response.status}") -if __name__ == '__main__': +if __name__ == "__main__": unittest.main() diff --git a/test/test_configuration.py b/test/test_configuration.py index 2869f484..19830dcc 100644 --- a/test/test_configuration.py +++ b/test/test_configuration.py @@ -5,16 +5,17 @@ class ConfigurationTest(unittest.TestCase): + def test_user_agent_getter_and_setter(self) -> None: + """ + Test user agent getter and setter. - def test_user_agent_getter_and_setter(self) -> None: - """ - Test user agent getter and setter. + @return void + """ + config = Configuration(NoAuthAuthenticator()) - @return void - """ - config = Configuration(NoAuthAuthenticator()) - - self.assertRegex(config.user_agent, - r"^zitadel-client/0\.0\.0 \(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\)$") - config.user_agent = "CustomUserAgent/1.0" - self.assertEqual(config.user_agent, "CustomUserAgent/1.0") + self.assertRegex( + config.user_agent, + r"^zitadel-client/0\.0\.0 \(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\)$", + ) + config.user_agent = "CustomUserAgent/1.0" + self.assertEqual(config.user_agent, "CustomUserAgent/1.0") diff --git a/test/test_zitadel.py b/test/test_zitadel.py index ca43eea1..0200a895 100644 --- a/test/test_zitadel.py +++ b/test/test_zitadel.py @@ -8,22 +8,29 @@ class ZitadelServicesTest(unittest.TestCase): - """ - Test to verify that all API service classes defined in the "zitadel_client.api" namespace - are registered as attributes in the Zitadel class. - """ + """ + Test to verify that all API service classes defined in the "zitadel_client.api" namespace + are registered as attributes in the Zitadel class. + """ - def test_services_dynamic(self) -> None: - expected = set() - package = importlib.import_module("zitadel_client.api") - for _, modname, _ in pkgutil.walk_packages(package.__path__, package.__name__ + "."): - module = importlib.import_module(modname) - for name, obj in inspect.getmembers(module, inspect.isclass): - if obj.__module__ == modname and obj.__name__.endswith("ServiceApi"): - expected.add(obj) - zitadel = Zitadel(NoAuthAuthenticator("http://dummy")) - actual = {type(getattr(zitadel, attr)) - for attr in dir(zitadel) - if not attr.startswith("_") and hasattr(getattr(zitadel, attr), "__class__") - and getattr(zitadel, attr).__class__.__module__.startswith("zitadel_client.api")} - self.assertEqual(expected, actual) + def test_services_dynamic(self) -> None: + expected = set() + package = importlib.import_module("zitadel_client.api") + for _, modname, _ in pkgutil.walk_packages( + package.__path__, package.__name__ + "." + ): + module = importlib.import_module(modname) + for name, obj in inspect.getmembers(module, inspect.isclass): + if obj.__module__ == modname and obj.__name__.endswith("ServiceApi"): + expected.add(obj) + zitadel = Zitadel(NoAuthAuthenticator("http://dummy")) + actual = { + type(getattr(zitadel, attr)) + for attr in dir(zitadel) + if not attr.startswith("_") + and hasattr(getattr(zitadel, attr), "__class__") + and getattr(zitadel, attr).__class__.__module__.startswith( + "zitadel_client.api" + ) + } + self.assertEqual(expected, actual) diff --git a/zitadel_client/__init__.py b/zitadel_client/__init__.py index 3a3bc419..e88a14c4 100644 --- a/zitadel_client/__init__.py +++ b/zitadel_client/__init__.py @@ -3,10 +3,12 @@ from .api_client import ApiClient from .api_response import ApiResponse from .configuration import Configuration -from .exceptions import ApiAttributeError -from .exceptions import ApiException -from .exceptions import ApiKeyError -from .exceptions import ApiTypeError -from .exceptions import ApiValueError -from .exceptions import OpenApiException +from .exceptions import ( + ApiAttributeError, + ApiException, + ApiKeyError, + ApiTypeError, + ApiValueError, + OpenApiException, +) from .zitadel import Zitadel diff --git a/zitadel_client/api/feature_service_api.py b/zitadel_client/api/feature_service_api.py index ddd4373f..14b98f51 100644 --- a/zitadel_client/api/feature_service_api.py +++ b/zitadel_client/api/feature_service_api.py @@ -11,31 +11,55 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from pydantic import Field, StrictBool, StrictStr -from typing import Optional +from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.models.v2_get_instance_features_response import V2GetInstanceFeaturesResponse -from zitadel_client.models.v2_get_organization_features_response import V2GetOrganizationFeaturesResponse -from zitadel_client.models.v2_get_system_features_response import V2GetSystemFeaturesResponse -from zitadel_client.models.v2_get_user_features_response import V2GetUserFeaturesResponse -from zitadel_client.models.v2_reset_instance_features_response import V2ResetInstanceFeaturesResponse -from zitadel_client.models.v2_reset_organization_features_response import V2ResetOrganizationFeaturesResponse -from zitadel_client.models.v2_reset_system_features_response import V2ResetSystemFeaturesResponse -from zitadel_client.models.v2_reset_user_features_response import V2ResetUserFeaturesResponse -from zitadel_client.models.v2_set_instance_features_request import V2SetInstanceFeaturesRequest -from zitadel_client.models.v2_set_instance_features_response import V2SetInstanceFeaturesResponse -from zitadel_client.models.v2_set_organization_features_response import V2SetOrganizationFeaturesResponse -from zitadel_client.models.v2_set_system_features_request import V2SetSystemFeaturesRequest -from zitadel_client.models.v2_set_system_features_response import V2SetSystemFeaturesResponse -from zitadel_client.models.v2_set_user_features_response import V2SetUserFeaturesResponse from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse +from zitadel_client.models.v2_get_instance_features_response import ( + V2GetInstanceFeaturesResponse, +) +from zitadel_client.models.v2_get_organization_features_response import ( + V2GetOrganizationFeaturesResponse, +) +from zitadel_client.models.v2_get_system_features_response import ( + V2GetSystemFeaturesResponse, +) +from zitadel_client.models.v2_get_user_features_response import ( + V2GetUserFeaturesResponse, +) +from zitadel_client.models.v2_reset_instance_features_response import ( + V2ResetInstanceFeaturesResponse, +) +from zitadel_client.models.v2_reset_organization_features_response import ( + V2ResetOrganizationFeaturesResponse, +) +from zitadel_client.models.v2_reset_system_features_response import ( + V2ResetSystemFeaturesResponse, +) +from zitadel_client.models.v2_reset_user_features_response import ( + V2ResetUserFeaturesResponse, +) +from zitadel_client.models.v2_set_instance_features_request import ( + V2SetInstanceFeaturesRequest, +) +from zitadel_client.models.v2_set_instance_features_response import ( + V2SetInstanceFeaturesResponse, +) +from zitadel_client.models.v2_set_organization_features_response import ( + V2SetOrganizationFeaturesResponse, +) +from zitadel_client.models.v2_set_system_features_request import ( + V2SetSystemFeaturesRequest, +) +from zitadel_client.models.v2_set_system_features_response import ( + V2SetSystemFeaturesResponse, +) +from zitadel_client.models.v2_set_user_features_response import ( + V2SetUserFeaturesResponse, +) from zitadel_client.rest import RESTResponseType @@ -106,9 +130,9 @@ def get_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -175,9 +199,9 @@ def get_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -244,9 +268,9 @@ def get_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -282,7 +306,7 @@ def _get_instance_features_serialize( # process the query parameters if inheritance is not None: - _query_params.append(('inheritance', inheritance)) + _query_params.append(("inheritance", inheritance)) # process the header parameters # process the form parameters @@ -290,22 +314,22 @@ def _get_instance_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/features/instance', + method="GET", + resource_path="/v2/features/instance", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -379,9 +403,9 @@ def get_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -452,9 +476,9 @@ def get_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -525,9 +549,9 @@ def get_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -562,11 +586,11 @@ def _get_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params['organizationId'] = organization_id + _path_params["organizationId"] = organization_id # process the query parameters if inheritance is not None: - _query_params.append(('inheritance', inheritance)) + _query_params.append(("inheritance", inheritance)) # process the header parameters # process the form parameters @@ -574,22 +598,22 @@ def _get_organization_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/features/organization/{organizationId}', + method="GET", + resource_path="/v2/features/organization/{organizationId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -655,9 +679,9 @@ def get_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -720,9 +744,9 @@ def get_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -785,9 +809,9 @@ def get_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -826,22 +850,22 @@ def _get_system_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/features/system', + method="GET", + resource_path="/v2/features/system", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -915,9 +939,9 @@ def get_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -988,9 +1012,9 @@ def get_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1061,9 +1085,9 @@ def get_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1098,11 +1122,11 @@ def _get_user_features_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters if inheritance is not None: - _query_params.append(('inheritance', inheritance)) + _query_params.append(("inheritance", inheritance)) # process the header parameters # process the form parameters @@ -1110,22 +1134,22 @@ def _get_user_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/features/user/{userId}', + method="GET", + resource_path="/v2/features/user/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1191,9 +1215,9 @@ def reset_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1256,9 +1280,9 @@ def reset_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1321,9 +1345,9 @@ def reset_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1362,22 +1386,22 @@ def _reset_instance_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/features/instance', + method="DELETE", + resource_path="/v2/features/instance", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1447,9 +1471,9 @@ def reset_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1516,9 +1540,9 @@ def reset_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1585,9 +1609,9 @@ def reset_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1621,7 +1645,7 @@ def _reset_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params['organizationId'] = organization_id + _path_params["organizationId"] = organization_id # process the query parameters # process the header parameters # process the form parameters @@ -1629,22 +1653,22 @@ def _reset_organization_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/features/organization/{organizationId}', + method="DELETE", + resource_path="/v2/features/organization/{organizationId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1710,9 +1734,9 @@ def reset_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1775,9 +1799,9 @@ def reset_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1840,9 +1864,9 @@ def reset_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1881,22 +1905,22 @@ def _reset_system_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/features/system', + method="DELETE", + resource_path="/v2/features/system", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1966,9 +1990,9 @@ def reset_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2035,9 +2059,9 @@ def reset_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2104,9 +2128,9 @@ def reset_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2140,7 +2164,7 @@ def _reset_user_features_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2148,22 +2172,22 @@ def _reset_user_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/features/user/{userId}', + method="DELETE", + resource_path="/v2/features/user/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2233,9 +2257,9 @@ def set_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2302,9 +2326,9 @@ def set_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2371,9 +2395,9 @@ def set_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetInstanceFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetInstanceFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2415,35 +2439,35 @@ def _set_instance_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/features/instance', + method="PUT", + resource_path="/v2/features/instance", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2513,9 +2537,9 @@ def set_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2582,9 +2606,9 @@ def set_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2651,9 +2675,9 @@ def set_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetOrganizationFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetOrganizationFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2687,7 +2711,7 @@ def _set_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params['organizationId'] = organization_id + _path_params["organizationId"] = organization_id # process the query parameters # process the header parameters # process the form parameters @@ -2695,22 +2719,22 @@ def _set_organization_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/features/organization/{organizationId}', + method="PUT", + resource_path="/v2/features/organization/{organizationId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2780,9 +2804,9 @@ def set_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2849,9 +2873,9 @@ def set_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2918,9 +2942,9 @@ def set_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSystemFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSystemFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2962,35 +2986,35 @@ def _set_system_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/features/system', + method="PUT", + resource_path="/v2/features/system", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3060,9 +3084,9 @@ def set_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3129,9 +3153,9 @@ def set_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3198,9 +3222,9 @@ def set_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetUserFeaturesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetUserFeaturesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3234,7 +3258,7 @@ def _set_user_features_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -3242,22 +3266,22 @@ def _set_user_features_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/features/user/{userId}', + method="PUT", + resource_path="/v2/features/user/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/identity_provider_service_api.py b/zitadel_client/api/identity_provider_service_api.py index d68acdb6..7ca658a2 100644 --- a/zitadel_client/api/identity_provider_service_api.py +++ b/zitadel_client/api/identity_provider_service_api.py @@ -11,16 +11,14 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from pydantic import StrictStr -from zitadel_client.models.v2_get_idpby_id_response import V2GetIDPByIDResponse +from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call +from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse +from zitadel_client.models.v2_get_idpby_id_response import V2GetIDPByIDResponse from zitadel_client.rest import RESTResponseType @@ -91,9 +89,9 @@ def get_idpby_id( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetIDPByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetIDPByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -160,9 +158,9 @@ def get_idpby_id_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetIDPByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetIDPByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -229,9 +227,9 @@ def get_idpby_id_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetIDPByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetIDPByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -265,7 +263,7 @@ def _get_idpby_id_serialize( # process the path parameters if id is not None: - _path_params['id'] = id + _path_params["id"] = id # process the query parameters # process the header parameters # process the form parameters @@ -273,22 +271,22 @@ def _get_idpby_id_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/idps/{id}', + method="GET", + resource_path="/v2/idps/{id}", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/oidc_service_api.py b/zitadel_client/api/oidc_service_api.py index d28e9912..86689150 100644 --- a/zitadel_client/api/oidc_service_api.py +++ b/zitadel_client/api/oidc_service_api.py @@ -13,13 +13,14 @@ from typing import Any, Dict, List, Optional, Tuple, Union -from pydantic import Field, StrictStr -from pydantic import validate_call, StrictFloat, StrictInt +from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.oidc_service_create_callback_body import OIDCServiceCreateCallbackBody +from zitadel_client.models.oidc_service_create_callback_body import ( + OIDCServiceCreateCallbackBody, +) from zitadel_client.models.v2_create_callback_response import V2CreateCallbackResponse from zitadel_client.models.v2_get_auth_request_response import V2GetAuthRequestResponse from zitadel_client.rest import RESTResponseType @@ -96,9 +97,9 @@ def create_callback( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateCallbackResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateCallbackResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -169,9 +170,9 @@ def create_callback_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateCallbackResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateCallbackResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -242,9 +243,9 @@ def create_callback_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateCallbackResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateCallbackResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -279,7 +280,7 @@ def _create_callback_serialize( # process the path parameters if auth_request_id is not None: - _path_params['authRequestId'] = auth_request_id + _path_params["authRequestId"] = auth_request_id # process the query parameters # process the header parameters # process the form parameters @@ -289,35 +290,35 @@ def _create_callback_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/oidc/auth_requests/{authRequestId}', + method="POST", + resource_path="/v2/oidc/auth_requests/{authRequestId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -387,9 +388,9 @@ def get_auth_request( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetAuthRequestResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetAuthRequestResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -456,9 +457,9 @@ def get_auth_request_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetAuthRequestResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetAuthRequestResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -525,9 +526,9 @@ def get_auth_request_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetAuthRequestResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetAuthRequestResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -561,7 +562,7 @@ def _get_auth_request_serialize( # process the path parameters if auth_request_id is not None: - _path_params['authRequestId'] = auth_request_id + _path_params["authRequestId"] = auth_request_id # process the query parameters # process the header parameters # process the form parameters @@ -569,22 +570,22 @@ def _get_auth_request_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/oidc/auth_requests/{authRequestId}', + method="GET", + resource_path="/v2/oidc/auth_requests/{authRequestId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/organization_service_api.py b/zitadel_client/api/organization_service_api.py index 09a2efea..fb9f54a9 100644 --- a/zitadel_client/api/organization_service_api.py +++ b/zitadel_client/api/organization_service_api.py @@ -11,18 +11,21 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from zitadel_client.models.v2_add_organization_request import V2AddOrganizationRequest -from zitadel_client.models.v2_add_organization_response import V2AddOrganizationResponse -from zitadel_client.models.v2_list_organizations_request import V2ListOrganizationsRequest -from zitadel_client.models.v2_list_organizations_response import V2ListOrganizationsResponse +from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call +from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse +from zitadel_client.models.v2_add_organization_request import V2AddOrganizationRequest +from zitadel_client.models.v2_add_organization_response import V2AddOrganizationResponse +from zitadel_client.models.v2_list_organizations_request import ( + V2ListOrganizationsRequest, +) +from zitadel_client.models.v2_list_organizations_response import ( + V2ListOrganizationsResponse, +) from zitadel_client.rest import RESTResponseType @@ -93,9 +96,9 @@ def add_organization( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOrganizationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOrganizationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -162,9 +165,9 @@ def add_organization_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOrganizationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOrganizationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -231,9 +234,9 @@ def add_organization_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOrganizationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOrganizationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -275,35 +278,35 @@ def _add_organization_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/organizations', + method="POST", + resource_path="/v2/organizations", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -373,10 +376,10 @@ def list_organizations( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListOrganizationsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListOrganizationsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -443,10 +446,10 @@ def list_organizations_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListOrganizationsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListOrganizationsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -513,10 +516,10 @@ def list_organizations_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListOrganizationsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListOrganizationsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -558,35 +561,35 @@ def _list_organizations_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/organizations/_search', + method="POST", + resource_path="/v2/organizations/_search", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/session_service_api.py b/zitadel_client/api/session_service_api.py index 71fd7393..47ffd6c0 100644 --- a/zitadel_client/api/session_service_api.py +++ b/zitadel_client/api/session_service_api.py @@ -11,16 +11,19 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from pydantic import Field, StrictStr -from typing import Optional +from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.models.session_service_delete_session_body import SessionServiceDeleteSessionBody -from zitadel_client.models.session_service_set_session_body import SessionServiceSetSessionBody + +from zitadel_client.api_client import ApiClient, RequestSerialized +from zitadel_client.api_response import ApiResponse +from zitadel_client.models.session_service_delete_session_body import ( + SessionServiceDeleteSessionBody, +) +from zitadel_client.models.session_service_set_session_body import ( + SessionServiceSetSessionBody, +) from zitadel_client.models.v2_create_session_request import V2CreateSessionRequest from zitadel_client.models.v2_create_session_response import V2CreateSessionResponse from zitadel_client.models.v2_delete_session_response import V2DeleteSessionResponse @@ -28,9 +31,6 @@ from zitadel_client.models.v2_list_sessions_request import V2ListSessionsRequest from zitadel_client.models.v2_list_sessions_response import V2ListSessionsResponse from zitadel_client.models.v2_set_session_response import V2SetSessionResponse - -from zitadel_client.api_client import ApiClient, RequestSerialized -from zitadel_client.api_response import ApiResponse from zitadel_client.rest import RESTResponseType @@ -101,9 +101,9 @@ def create_session( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -170,9 +170,9 @@ def create_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -239,9 +239,9 @@ def create_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -283,35 +283,35 @@ def _create_session_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/sessions', + method="POST", + resource_path="/v2/sessions", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -330,7 +330,7 @@ def _create_session_serialize( @validate_call def delete_session( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -385,9 +385,9 @@ def delete_session( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -403,7 +403,7 @@ def delete_session( @validate_call def delete_session_with_http_info( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -458,9 +458,9 @@ def delete_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -476,7 +476,7 @@ def delete_session_with_http_info( @validate_call def delete_session_without_preload_content( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -531,9 +531,9 @@ def delete_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -568,7 +568,7 @@ def _delete_session_serialize( # process the path parameters if session_id is not None: - _path_params['sessionId'] = session_id + _path_params["sessionId"] = session_id # process the query parameters # process the header parameters # process the form parameters @@ -578,35 +578,35 @@ def _delete_session_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/sessions/{sessionId}', + method="DELETE", + resource_path="/v2/sessions/{sessionId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -680,9 +680,9 @@ def get_session( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -753,9 +753,9 @@ def get_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -826,9 +826,9 @@ def get_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -863,11 +863,11 @@ def _get_session_serialize( # process the path parameters if session_id is not None: - _path_params['sessionId'] = session_id + _path_params["sessionId"] = session_id # process the query parameters if session_token is not None: - _query_params.append(('sessionToken', session_token)) + _query_params.append(("sessionToken", session_token)) # process the header parameters # process the form parameters @@ -875,22 +875,22 @@ def _get_session_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/sessions/{sessionId}', + method="GET", + resource_path="/v2/sessions/{sessionId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -960,10 +960,10 @@ def list_sessions( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListSessionsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListSessionsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1030,10 +1030,10 @@ def list_sessions_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListSessionsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListSessionsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1100,10 +1100,10 @@ def list_sessions_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListSessionsResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListSessionsResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1145,35 +1145,35 @@ def _list_sessions_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/sessions/search', + method="POST", + resource_path="/v2/sessions/search", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1192,7 +1192,7 @@ def _list_sessions_serialize( @validate_call def set_session( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1247,9 +1247,9 @@ def set_session( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1265,7 +1265,7 @@ def set_session( @validate_call def set_session_with_http_info( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1320,9 +1320,9 @@ def set_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1338,7 +1338,7 @@ def set_session_with_http_info( @validate_call def set_session_without_preload_content( self, - session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], + session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1393,9 +1393,9 @@ def set_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSessionResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSessionResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1430,7 +1430,7 @@ def _set_session_serialize( # process the path parameters if session_id is not None: - _path_params['sessionId'] = session_id + _path_params["sessionId"] = session_id # process the query parameters # process the header parameters # process the form parameters @@ -1440,35 +1440,35 @@ def _set_session_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PATCH', - resource_path='/v2/sessions/{sessionId}', + method="PATCH", + resource_path="/v2/sessions/{sessionId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/settings_api.py b/zitadel_client/api/settings_api.py index 4ff62223..50a09435 100644 --- a/zitadel_client/api/settings_api.py +++ b/zitadel_client/api/settings_api.py @@ -13,14 +13,20 @@ from typing import Any, Dict, List, Optional, Tuple, Union -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt +from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.v2_get_security_settings_response import V2GetSecuritySettingsResponse -from zitadel_client.models.v2_set_security_settings_request import V2SetSecuritySettingsRequest -from zitadel_client.models.v2_set_security_settings_response import V2SetSecuritySettingsResponse +from zitadel_client.models.v2_get_security_settings_response import ( + V2GetSecuritySettingsResponse, +) +from zitadel_client.models.v2_set_security_settings_request import ( + V2SetSecuritySettingsRequest, +) +from zitadel_client.models.v2_set_security_settings_response import ( + V2SetSecuritySettingsResponse, +) from zitadel_client.rest import RESTResponseType @@ -87,9 +93,9 @@ def get_security_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -152,9 +158,9 @@ def get_security_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -217,9 +223,9 @@ def get_security_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -258,22 +264,22 @@ def _get_security_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/security', + method="GET", + resource_path="/v2/settings/security", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -343,9 +349,9 @@ def set_security_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -412,9 +418,9 @@ def set_security_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -481,9 +487,9 @@ def set_security_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetSecuritySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetSecuritySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -525,35 +531,35 @@ def _set_security_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/policies/security', + method="PUT", + resource_path="/v2/policies/security", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/settings_service_api.py b/zitadel_client/api/settings_service_api.py index 6076a48d..17787a0c 100644 --- a/zitadel_client/api/settings_service_api.py +++ b/zitadel_client/api/settings_service_api.py @@ -11,25 +11,40 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from pydantic import StrictBool, StrictStr -from typing import Optional -from zitadel_client.models.v2_get_active_identity_providers_response import V2GetActiveIdentityProvidersResponse -from zitadel_client.models.v2_get_branding_settings_response import V2GetBrandingSettingsResponse -from zitadel_client.models.v2_get_domain_settings_response import V2GetDomainSettingsResponse -from zitadel_client.models.v2_get_general_settings_response import V2GetGeneralSettingsResponse -from zitadel_client.models.v2_get_legal_and_support_settings_response import V2GetLegalAndSupportSettingsResponse -from zitadel_client.models.v2_get_lockout_settings_response import V2GetLockoutSettingsResponse -from zitadel_client.models.v2_get_login_settings_response import V2GetLoginSettingsResponse -from zitadel_client.models.v2_get_password_complexity_settings_response import V2GetPasswordComplexitySettingsResponse -from zitadel_client.models.v2_get_password_expiry_settings_response import V2GetPasswordExpirySettingsResponse +from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call +from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse +from zitadel_client.models.v2_get_active_identity_providers_response import ( + V2GetActiveIdentityProvidersResponse, +) +from zitadel_client.models.v2_get_branding_settings_response import ( + V2GetBrandingSettingsResponse, +) +from zitadel_client.models.v2_get_domain_settings_response import ( + V2GetDomainSettingsResponse, +) +from zitadel_client.models.v2_get_general_settings_response import ( + V2GetGeneralSettingsResponse, +) +from zitadel_client.models.v2_get_legal_and_support_settings_response import ( + V2GetLegalAndSupportSettingsResponse, +) +from zitadel_client.models.v2_get_lockout_settings_response import ( + V2GetLockoutSettingsResponse, +) +from zitadel_client.models.v2_get_login_settings_response import ( + V2GetLoginSettingsResponse, +) +from zitadel_client.models.v2_get_password_complexity_settings_response import ( + V2GetPasswordComplexitySettingsResponse, +) +from zitadel_client.models.v2_get_password_expiry_settings_response import ( + V2GetPasswordExpirySettingsResponse, +) from zitadel_client.rest import RESTResponseType @@ -120,9 +135,9 @@ def get_active_identity_providers( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetActiveIdentityProvidersResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetActiveIdentityProvidersResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -209,9 +224,9 @@ def get_active_identity_providers_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetActiveIdentityProvidersResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetActiveIdentityProvidersResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -298,9 +313,9 @@ def get_active_identity_providers_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetActiveIdentityProvidersResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetActiveIdentityProvidersResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -341,27 +356,27 @@ def _get_active_identity_providers_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) if creation_allowed is not None: - _query_params.append(('creationAllowed', creation_allowed)) + _query_params.append(("creationAllowed", creation_allowed)) if linking_allowed is not None: - _query_params.append(('linkingAllowed', linking_allowed)) + _query_params.append(("linkingAllowed", linking_allowed)) if auto_creation is not None: - _query_params.append(('autoCreation', auto_creation)) + _query_params.append(("autoCreation", auto_creation)) if auto_linking is not None: - _query_params.append(('autoLinking', auto_linking)) + _query_params.append(("autoLinking", auto_linking)) # process the header parameters # process the form parameters @@ -369,22 +384,22 @@ def _get_active_identity_providers_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/login/idps', + method="GET", + resource_path="/v2/settings/login/idps", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -458,9 +473,9 @@ def get_branding_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetBrandingSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetBrandingSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -531,9 +546,9 @@ def get_branding_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetBrandingSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetBrandingSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -604,9 +619,9 @@ def get_branding_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetBrandingSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetBrandingSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -643,11 +658,11 @@ def _get_branding_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -655,22 +670,22 @@ def _get_branding_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/branding', + method="GET", + resource_path="/v2/settings/branding", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -744,9 +759,9 @@ def get_domain_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetDomainSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetDomainSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -817,9 +832,9 @@ def get_domain_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetDomainSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetDomainSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -890,9 +905,9 @@ def get_domain_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetDomainSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetDomainSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -929,11 +944,11 @@ def _get_domain_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -941,22 +956,22 @@ def _get_domain_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/domain', + method="GET", + resource_path="/v2/settings/domain", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1022,9 +1037,9 @@ def get_general_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetGeneralSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetGeneralSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1087,9 +1102,9 @@ def get_general_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetGeneralSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetGeneralSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1152,9 +1167,9 @@ def get_general_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetGeneralSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetGeneralSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1193,22 +1208,22 @@ def _get_general_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings', + method="GET", + resource_path="/v2/settings", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1282,9 +1297,9 @@ def get_legal_and_support_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLegalAndSupportSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLegalAndSupportSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1355,9 +1370,9 @@ def get_legal_and_support_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLegalAndSupportSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLegalAndSupportSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1428,9 +1443,9 @@ def get_legal_and_support_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLegalAndSupportSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLegalAndSupportSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1467,11 +1482,11 @@ def _get_legal_and_support_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -1479,22 +1494,22 @@ def _get_legal_and_support_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/legal_support', + method="GET", + resource_path="/v2/settings/legal_support", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1568,9 +1583,9 @@ def get_lockout_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLockoutSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLockoutSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1641,9 +1656,9 @@ def get_lockout_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLockoutSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLockoutSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1714,9 +1729,9 @@ def get_lockout_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLockoutSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLockoutSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1753,11 +1768,11 @@ def _get_lockout_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -1765,22 +1780,22 @@ def _get_lockout_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/lockout', + method="GET", + resource_path="/v2/settings/lockout", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1854,9 +1869,9 @@ def get_login_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLoginSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLoginSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1927,9 +1942,9 @@ def get_login_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLoginSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLoginSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2000,9 +2015,9 @@ def get_login_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetLoginSettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetLoginSettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2039,11 +2054,11 @@ def _get_login_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -2051,22 +2066,22 @@ def _get_login_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/login', + method="GET", + resource_path="/v2/settings/login", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2140,9 +2155,9 @@ def get_password_complexity_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordComplexitySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordComplexitySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2213,9 +2228,9 @@ def get_password_complexity_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordComplexitySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordComplexitySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2286,9 +2301,9 @@ def get_password_complexity_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordComplexitySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordComplexitySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2325,11 +2340,11 @@ def _get_password_complexity_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -2337,22 +2352,22 @@ def _get_password_complexity_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/password/complexity', + method="GET", + resource_path="/v2/settings/password/complexity", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2426,9 +2441,9 @@ def get_password_expiry_settings( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordExpirySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordExpirySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2499,9 +2514,9 @@ def get_password_expiry_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordExpirySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordExpirySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2572,9 +2587,9 @@ def get_password_expiry_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetPasswordExpirySettingsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetPasswordExpirySettingsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2611,11 +2626,11 @@ def _get_password_expiry_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(('ctx.orgId', ctx_org_id)) + _query_params.append(("ctx.orgId", ctx_org_id)) if ctx_instance is not None: - _query_params.append(('ctx.instance', ctx_instance)) + _query_params.append(("ctx.instance", ctx_instance)) # process the header parameters # process the form parameters @@ -2623,22 +2638,22 @@ def _get_password_expiry_settings_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/settings/password/expiry', + method="GET", + resource_path="/v2/settings/password/expiry", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/user_service_api.py b/zitadel_client/api/user_service_api.py index 6b064a02..adcdaff1 100644 --- a/zitadel_client/api/user_service_api.py +++ b/zitadel_client/api/user_service_api.py @@ -11,47 +11,92 @@ Do not edit the class manually. """ # noqa: E501 -import warnings -from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union -from typing_extensions import Annotated -from pydantic import Field, StrictBool, StrictStr, field_validator -from typing import List, Optional +from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.models.user_service_add_idp_link_body import UserServiceAddIDPLinkBody -from zitadel_client.models.user_service_create_invite_code_body import UserServiceCreateInviteCodeBody -from zitadel_client.models.user_service_create_passkey_registration_link_body import UserServiceCreatePasskeyRegistrationLinkBody -from zitadel_client.models.user_service_list_idp_links_body import UserServiceListIDPLinksBody -from zitadel_client.models.user_service_password_reset_body import UserServicePasswordResetBody -from zitadel_client.models.user_service_register_passkey_body import UserServiceRegisterPasskeyBody -from zitadel_client.models.user_service_register_u2_f_body import UserServiceRegisterU2FBody -from zitadel_client.models.user_service_resend_email_code_body import UserServiceResendEmailCodeBody -from zitadel_client.models.user_service_resend_phone_code_body import UserServiceResendPhoneCodeBody -from zitadel_client.models.user_service_retrieve_identity_provider_intent_body import UserServiceRetrieveIdentityProviderIntentBody -from zitadel_client.models.user_service_send_email_code_body import UserServiceSendEmailCodeBody + +from zitadel_client.api_client import ApiClient, RequestSerialized +from zitadel_client.api_response import ApiResponse +from zitadel_client.models.user_service_add_idp_link_body import ( + UserServiceAddIDPLinkBody, +) +from zitadel_client.models.user_service_create_invite_code_body import ( + UserServiceCreateInviteCodeBody, +) +from zitadel_client.models.user_service_create_passkey_registration_link_body import ( + UserServiceCreatePasskeyRegistrationLinkBody, +) +from zitadel_client.models.user_service_list_idp_links_body import ( + UserServiceListIDPLinksBody, +) +from zitadel_client.models.user_service_password_reset_body import ( + UserServicePasswordResetBody, +) +from zitadel_client.models.user_service_register_passkey_body import ( + UserServiceRegisterPasskeyBody, +) +from zitadel_client.models.user_service_register_u2_f_body import ( + UserServiceRegisterU2FBody, +) +from zitadel_client.models.user_service_resend_email_code_body import ( + UserServiceResendEmailCodeBody, +) +from zitadel_client.models.user_service_resend_phone_code_body import ( + UserServiceResendPhoneCodeBody, +) +from zitadel_client.models.user_service_retrieve_identity_provider_intent_body import ( + UserServiceRetrieveIdentityProviderIntentBody, +) +from zitadel_client.models.user_service_send_email_code_body import ( + UserServiceSendEmailCodeBody, +) from zitadel_client.models.user_service_set_email_body import UserServiceSetEmailBody from zitadel_client.models.user_service_set_phone_body import UserServiceSetPhoneBody -from zitadel_client.models.user_service_update_human_user_body import UserServiceUpdateHumanUserBody -from zitadel_client.models.user_service_verify_email_body import UserServiceVerifyEmailBody -from zitadel_client.models.user_service_verify_invite_code_body import UserServiceVerifyInviteCodeBody -from zitadel_client.models.user_service_verify_passkey_registration_body import UserServiceVerifyPasskeyRegistrationBody -from zitadel_client.models.user_service_verify_phone_body import UserServiceVerifyPhoneBody -from zitadel_client.models.user_service_verify_totp_registration_body import UserServiceVerifyTOTPRegistrationBody -from zitadel_client.models.user_service_verify_u2_f_registration_body import UserServiceVerifyU2FRegistrationBody +from zitadel_client.models.user_service_update_human_user_body import ( + UserServiceUpdateHumanUserBody, +) +from zitadel_client.models.user_service_verify_email_body import ( + UserServiceVerifyEmailBody, +) +from zitadel_client.models.user_service_verify_invite_code_body import ( + UserServiceVerifyInviteCodeBody, +) +from zitadel_client.models.user_service_verify_passkey_registration_body import ( + UserServiceVerifyPasskeyRegistrationBody, +) +from zitadel_client.models.user_service_verify_phone_body import ( + UserServiceVerifyPhoneBody, +) +from zitadel_client.models.user_service_verify_totp_registration_body import ( + UserServiceVerifyTOTPRegistrationBody, +) +from zitadel_client.models.user_service_verify_u2_f_registration_body import ( + UserServiceVerifyU2FRegistrationBody, +) from zitadel_client.models.v2_add_human_user_request import V2AddHumanUserRequest from zitadel_client.models.v2_add_human_user_response import V2AddHumanUserResponse from zitadel_client.models.v2_add_idp_link_response import V2AddIDPLinkResponse from zitadel_client.models.v2_add_otp_email_response import V2AddOTPEmailResponse from zitadel_client.models.v2_add_otpsms_response import V2AddOTPSMSResponse -from zitadel_client.models.v2_create_invite_code_response import V2CreateInviteCodeResponse -from zitadel_client.models.v2_create_passkey_registration_link_response import V2CreatePasskeyRegistrationLinkResponse +from zitadel_client.models.v2_create_invite_code_response import ( + V2CreateInviteCodeResponse, +) +from zitadel_client.models.v2_create_passkey_registration_link_response import ( + V2CreatePasskeyRegistrationLinkResponse, +) from zitadel_client.models.v2_deactivate_user_response import V2DeactivateUserResponse from zitadel_client.models.v2_delete_user_response import V2DeleteUserResponse from zitadel_client.models.v2_get_user_by_id_response import V2GetUserByIDResponse -from zitadel_client.models.v2_human_mfa_init_skipped_response import V2HumanMFAInitSkippedResponse -from zitadel_client.models.v2_list_authentication_factors_response import V2ListAuthenticationFactorsResponse -from zitadel_client.models.v2_list_authentication_method_types_response import V2ListAuthenticationMethodTypesResponse +from zitadel_client.models.v2_human_mfa_init_skipped_response import ( + V2HumanMFAInitSkippedResponse, +) +from zitadel_client.models.v2_list_authentication_factors_response import ( + V2ListAuthenticationFactorsResponse, +) +from zitadel_client.models.v2_list_authentication_method_types_response import ( + V2ListAuthenticationMethodTypesResponse, +) from zitadel_client.models.v2_list_idp_links_response import V2ListIDPLinksResponse from zitadel_client.models.v2_list_passkeys_response import V2ListPasskeysResponse from zitadel_client.models.v2_list_users_request import V2ListUsersRequest @@ -69,28 +114,49 @@ from zitadel_client.models.v2_remove_phone_response import V2RemovePhoneResponse from zitadel_client.models.v2_remove_totp_response import V2RemoveTOTPResponse from zitadel_client.models.v2_remove_u2_f_response import V2RemoveU2FResponse -from zitadel_client.models.v2_resend_email_code_response import V2ResendEmailCodeResponse -from zitadel_client.models.v2_resend_invite_code_response import V2ResendInviteCodeResponse -from zitadel_client.models.v2_resend_phone_code_response import V2ResendPhoneCodeResponse -from zitadel_client.models.v2_retrieve_identity_provider_intent_response import V2RetrieveIdentityProviderIntentResponse +from zitadel_client.models.v2_resend_email_code_response import ( + V2ResendEmailCodeResponse, +) +from zitadel_client.models.v2_resend_invite_code_response import ( + V2ResendInviteCodeResponse, +) +from zitadel_client.models.v2_resend_phone_code_response import ( + V2ResendPhoneCodeResponse, +) +from zitadel_client.models.v2_retrieve_identity_provider_intent_response import ( + V2RetrieveIdentityProviderIntentResponse, +) from zitadel_client.models.v2_send_email_code_response import V2SendEmailCodeResponse from zitadel_client.models.v2_set_email_response import V2SetEmailResponse from zitadel_client.models.v2_set_password_response import V2SetPasswordResponse from zitadel_client.models.v2_set_phone_response import V2SetPhoneResponse -from zitadel_client.models.v2_start_identity_provider_intent_request import V2StartIdentityProviderIntentRequest -from zitadel_client.models.v2_start_identity_provider_intent_response import V2StartIdentityProviderIntentResponse +from zitadel_client.models.v2_start_identity_provider_intent_request import ( + V2StartIdentityProviderIntentRequest, +) +from zitadel_client.models.v2_start_identity_provider_intent_response import ( + V2StartIdentityProviderIntentResponse, +) from zitadel_client.models.v2_unlock_user_response import V2UnlockUserResponse -from zitadel_client.models.v2_update_human_user_response import V2UpdateHumanUserResponse -from zitadel_client.models.v2_user_service_set_password_body import V2UserServiceSetPasswordBody +from zitadel_client.models.v2_update_human_user_response import ( + V2UpdateHumanUserResponse, +) +from zitadel_client.models.v2_user_service_set_password_body import ( + V2UserServiceSetPasswordBody, +) from zitadel_client.models.v2_verify_email_response import V2VerifyEmailResponse -from zitadel_client.models.v2_verify_invite_code_response import V2VerifyInviteCodeResponse -from zitadel_client.models.v2_verify_passkey_registration_response import V2VerifyPasskeyRegistrationResponse +from zitadel_client.models.v2_verify_invite_code_response import ( + V2VerifyInviteCodeResponse, +) +from zitadel_client.models.v2_verify_passkey_registration_response import ( + V2VerifyPasskeyRegistrationResponse, +) from zitadel_client.models.v2_verify_phone_response import V2VerifyPhoneResponse -from zitadel_client.models.v2_verify_totp_registration_response import V2VerifyTOTPRegistrationResponse -from zitadel_client.models.v2_verify_u2_f_registration_response import V2VerifyU2FRegistrationResponse - -from zitadel_client.api_client import ApiClient, RequestSerialized -from zitadel_client.api_response import ApiResponse +from zitadel_client.models.v2_verify_totp_registration_response import ( + V2VerifyTOTPRegistrationResponse, +) +from zitadel_client.models.v2_verify_u2_f_registration_response import ( + V2VerifyU2FRegistrationResponse, +) from zitadel_client.rest import RESTResponseType @@ -161,9 +227,9 @@ def add_human_user( ) _response_types_map: Dict[str, Optional[str]] = { - '201': "V2AddHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "201": "V2AddHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -230,9 +296,9 @@ def add_human_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '201': "V2AddHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "201": "V2AddHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -299,9 +365,9 @@ def add_human_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '201': "V2AddHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "201": "V2AddHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -343,35 +409,35 @@ def _add_human_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/human', + method="POST", + resource_path="/v2/users/human", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -445,9 +511,9 @@ def add_idp_link( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -518,9 +584,9 @@ def add_idp_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -591,9 +657,9 @@ def add_idp_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -628,7 +694,7 @@ def _add_idp_link_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -638,35 +704,35 @@ def _add_idp_link_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/links', + method="POST", + resource_path="/v2/users/{userId}/links", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -736,9 +802,9 @@ def add_otp_email( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -805,9 +871,9 @@ def add_otp_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -874,9 +940,9 @@ def add_otp_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -910,7 +976,7 @@ def _add_otp_email_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -918,22 +984,22 @@ def _add_otp_email_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/otp_email', + method="POST", + resource_path="/v2/users/{userId}/otp_email", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1003,9 +1069,9 @@ def add_otpsms( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1072,9 +1138,9 @@ def add_otpsms_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1141,9 +1207,9 @@ def add_otpsms_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2AddOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2AddOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1177,7 +1243,7 @@ def _add_otpsms_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1185,22 +1251,22 @@ def _add_otpsms_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/otp_sms', + method="POST", + resource_path="/v2/users/{userId}/otp_sms", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1274,9 +1340,9 @@ def create_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1347,9 +1413,9 @@ def create_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1420,9 +1486,9 @@ def create_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreateInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreateInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1457,7 +1523,7 @@ def _create_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1467,35 +1533,35 @@ def _create_invite_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/invite_code', + method="POST", + resource_path="/v2/users/{userId}/invite_code", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1569,9 +1635,9 @@ def create_passkey_registration_link( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreatePasskeyRegistrationLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreatePasskeyRegistrationLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1642,9 +1708,9 @@ def create_passkey_registration_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreatePasskeyRegistrationLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreatePasskeyRegistrationLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1715,9 +1781,9 @@ def create_passkey_registration_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2CreatePasskeyRegistrationLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2CreatePasskeyRegistrationLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1752,7 +1818,7 @@ def _create_passkey_registration_link_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1762,35 +1828,35 @@ def _create_passkey_registration_link_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/passkeys/registration_link', + method="POST", + resource_path="/v2/users/{userId}/passkeys/registration_link", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1860,9 +1926,9 @@ def deactivate_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1929,9 +1995,9 @@ def deactivate_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1998,9 +2064,9 @@ def deactivate_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2034,7 +2100,7 @@ def _deactivate_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2042,22 +2108,22 @@ def _deactivate_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/deactivate', + method="POST", + resource_path="/v2/users/{userId}/deactivate", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2127,9 +2193,9 @@ def delete_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2196,9 +2262,9 @@ def delete_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2265,9 +2331,9 @@ def delete_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2DeleteUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2DeleteUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2301,7 +2367,7 @@ def _delete_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2309,22 +2375,22 @@ def _delete_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}', + method="DELETE", + resource_path="/v2/users/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2394,9 +2460,9 @@ def get_user_by_id( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2463,9 +2529,9 @@ def get_user_by_id_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2532,9 +2598,9 @@ def get_user_by_id_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2GetUserByIDResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2GetUserByIDResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2568,7 +2634,7 @@ def _get_user_by_id_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2576,22 +2642,22 @@ def _get_user_by_id_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/users/{userId}', + method="GET", + resource_path="/v2/users/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2661,9 +2727,9 @@ def human_mfa_init_skipped( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2HumanMFAInitSkippedResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2HumanMFAInitSkippedResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2730,9 +2796,9 @@ def human_mfa_init_skipped_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2HumanMFAInitSkippedResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2HumanMFAInitSkippedResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2799,9 +2865,9 @@ def human_mfa_init_skipped_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2HumanMFAInitSkippedResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2HumanMFAInitSkippedResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2835,7 +2901,7 @@ def _human_mfa_init_skipped_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2843,22 +2909,22 @@ def _human_mfa_init_skipped_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/mfa_init_skipped', + method="POST", + resource_path="/v2/users/{userId}/mfa_init_skipped", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2935,9 +3001,9 @@ def list_authentication_factors( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationFactorsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationFactorsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3011,9 +3077,9 @@ def list_authentication_factors_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationFactorsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationFactorsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3087,9 +3153,9 @@ def list_authentication_factors_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationFactorsResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationFactorsResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3112,8 +3178,8 @@ def _list_authentication_factors_serialize( _host = None _collection_formats: Dict[str, str] = { - 'authFactors': 'multi', - 'states': 'multi', + "authFactors": "multi", + "states": "multi", } _path_params: Dict[str, str] = {} @@ -3127,15 +3193,15 @@ def _list_authentication_factors_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters if auth_factors is not None: - _query_params.append(('authFactors', auth_factors)) + _query_params.append(("authFactors", auth_factors)) if states is not None: - _query_params.append(('states', states)) + _query_params.append(("states", states)) # process the header parameters # process the form parameters @@ -3143,22 +3209,22 @@ def _list_authentication_factors_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/authentication_factors/_search', + method="POST", + resource_path="/v2/users/{userId}/authentication_factors/_search", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3236,9 +3302,9 @@ def list_authentication_method_types( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationMethodTypesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationMethodTypesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3313,9 +3379,9 @@ def list_authentication_method_types_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationMethodTypesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationMethodTypesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3390,9 +3456,9 @@ def list_authentication_method_types_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListAuthenticationMethodTypesResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListAuthenticationMethodTypesResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3428,15 +3494,15 @@ def _list_authentication_method_types_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters if domain_query_include_without_domain is not None: - _query_params.append(('domainQuery.includeWithoutDomain', domain_query_include_without_domain)) + _query_params.append(("domainQuery.includeWithoutDomain", domain_query_include_without_domain)) if domain_query_domain is not None: - _query_params.append(('domainQuery.domain', domain_query_domain)) + _query_params.append(("domainQuery.domain", domain_query_domain)) # process the header parameters # process the form parameters @@ -3444,22 +3510,22 @@ def _list_authentication_method_types_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='GET', - resource_path='/v2/users/{userId}/authentication_methods', + method="GET", + resource_path="/v2/users/{userId}/authentication_methods", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3533,9 +3599,9 @@ def list_idp_links( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListIDPLinksResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListIDPLinksResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3606,9 +3672,9 @@ def list_idp_links_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListIDPLinksResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListIDPLinksResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3679,9 +3745,9 @@ def list_idp_links_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListIDPLinksResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListIDPLinksResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3716,7 +3782,7 @@ def _list_idp_links_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -3726,35 +3792,35 @@ def _list_idp_links_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/links/_search', + method="POST", + resource_path="/v2/users/{userId}/links/_search", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3824,9 +3890,9 @@ def list_passkeys( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListPasskeysResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListPasskeysResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3893,9 +3959,9 @@ def list_passkeys_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListPasskeysResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListPasskeysResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3962,9 +4028,9 @@ def list_passkeys_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListPasskeysResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListPasskeysResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3998,7 +4064,7 @@ def _list_passkeys_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4006,22 +4072,22 @@ def _list_passkeys_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/passkeys/_search', + method="POST", + resource_path="/v2/users/{userId}/passkeys/_search", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4091,10 +4157,10 @@ def list_users( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListUsersResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListUsersResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4161,10 +4227,10 @@ def list_users_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListUsersResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListUsersResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4231,10 +4297,10 @@ def list_users_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ListUsersResponse", - '400': "RpcStatus", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ListUsersResponse", + "400": "RpcStatus", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4276,35 +4342,35 @@ def _list_users_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users', + method="POST", + resource_path="/v2/users", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4374,9 +4440,9 @@ def lock_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2LockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2LockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4443,9 +4509,9 @@ def lock_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2LockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2LockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4512,9 +4578,9 @@ def lock_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2LockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2LockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4548,7 +4614,7 @@ def _lock_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4556,22 +4622,22 @@ def _lock_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/lock', + method="POST", + resource_path="/v2/users/{userId}/lock", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4645,9 +4711,9 @@ def password_reset( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2PasswordResetResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2PasswordResetResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4718,9 +4784,9 @@ def password_reset_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2PasswordResetResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2PasswordResetResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4791,9 +4857,9 @@ def password_reset_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2PasswordResetResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2PasswordResetResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4828,7 +4894,7 @@ def _password_reset_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4838,35 +4904,35 @@ def _password_reset_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/password_reset', + method="POST", + resource_path="/v2/users/{userId}/password_reset", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4936,9 +5002,9 @@ def reactivate_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ReactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ReactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5005,9 +5071,9 @@ def reactivate_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ReactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ReactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5074,9 +5140,9 @@ def reactivate_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ReactivateUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ReactivateUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5110,7 +5176,7 @@ def _reactivate_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5118,22 +5184,22 @@ def _reactivate_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/reactivate', + method="POST", + resource_path="/v2/users/{userId}/reactivate", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5207,9 +5273,9 @@ def register_passkey( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterPasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterPasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5280,9 +5346,9 @@ def register_passkey_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterPasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterPasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5353,9 +5419,9 @@ def register_passkey_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterPasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterPasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5390,7 +5456,7 @@ def _register_passkey_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5400,35 +5466,35 @@ def _register_passkey_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/passkeys', + method="POST", + resource_path="/v2/users/{userId}/passkeys", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5498,9 +5564,9 @@ def register_totp( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5567,9 +5633,9 @@ def register_totp_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5636,9 +5702,9 @@ def register_totp_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5672,7 +5738,7 @@ def _register_totp_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5680,22 +5746,22 @@ def _register_totp_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/totp', + method="POST", + resource_path="/v2/users/{userId}/totp", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5769,9 +5835,9 @@ def register_u2_f( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5842,9 +5908,9 @@ def register_u2_f_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5915,9 +5981,9 @@ def register_u2_f_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RegisterU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RegisterU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5952,7 +6018,7 @@ def _register_u2_f_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5962,35 +6028,35 @@ def _register_u2_f_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/u2f', + method="POST", + resource_path="/v2/users/{userId}/u2f", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6068,9 +6134,9 @@ def remove_idp_link( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6145,9 +6211,9 @@ def remove_idp_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6222,9 +6288,9 @@ def remove_idp_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveIDPLinkResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveIDPLinkResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6260,11 +6326,11 @@ def _remove_idp_link_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id if idp_id is not None: - _path_params['idpId'] = idp_id + _path_params["idpId"] = idp_id if linked_user_id is not None: - _path_params['linkedUserId'] = linked_user_id + _path_params["linkedUserId"] = linked_user_id # process the query parameters # process the header parameters # process the form parameters @@ -6272,22 +6338,22 @@ def _remove_idp_link_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/links/{idpId}/{linkedUserId}', + method="DELETE", + resource_path="/v2/users/{userId}/links/{idpId}/{linkedUserId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6357,9 +6423,9 @@ def remove_otp_email( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6426,9 +6492,9 @@ def remove_otp_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6495,9 +6561,9 @@ def remove_otp_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6531,7 +6597,7 @@ def _remove_otp_email_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -6539,22 +6605,22 @@ def _remove_otp_email_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/otp_email', + method="DELETE", + resource_path="/v2/users/{userId}/otp_email", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6624,9 +6690,9 @@ def remove_otpsms( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6693,9 +6759,9 @@ def remove_otpsms_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6762,9 +6828,9 @@ def remove_otpsms_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveOTPSMSResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveOTPSMSResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6798,7 +6864,7 @@ def _remove_otpsms_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -6806,22 +6872,22 @@ def _remove_otpsms_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/otp_sms', + method="DELETE", + resource_path="/v2/users/{userId}/otp_sms", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6895,9 +6961,9 @@ def remove_passkey( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6968,9 +7034,9 @@ def remove_passkey_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7041,9 +7107,9 @@ def remove_passkey_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePasskeyResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePasskeyResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7078,9 +7144,9 @@ def _remove_passkey_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id if passkey_id is not None: - _path_params['passkeyId'] = passkey_id + _path_params["passkeyId"] = passkey_id # process the query parameters # process the header parameters # process the form parameters @@ -7088,22 +7154,22 @@ def _remove_passkey_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/passkeys/{passkeyId}', + method="DELETE", + resource_path="/v2/users/{userId}/passkeys/{passkeyId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7173,9 +7239,9 @@ def remove_phone( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7242,9 +7308,9 @@ def remove_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7311,9 +7377,9 @@ def remove_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemovePhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemovePhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7347,7 +7413,7 @@ def _remove_phone_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -7355,22 +7421,22 @@ def _remove_phone_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/phone', + method="DELETE", + resource_path="/v2/users/{userId}/phone", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7440,9 +7506,9 @@ def remove_totp( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7509,9 +7575,9 @@ def remove_totp_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7578,9 +7644,9 @@ def remove_totp_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveTOTPResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveTOTPResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7614,7 +7680,7 @@ def _remove_totp_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -7622,22 +7688,22 @@ def _remove_totp_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/totp', + method="DELETE", + resource_path="/v2/users/{userId}/totp", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7711,9 +7777,9 @@ def remove_u2_f( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7784,9 +7850,9 @@ def remove_u2_f_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7857,9 +7923,9 @@ def remove_u2_f_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RemoveU2FResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RemoveU2FResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7894,9 +7960,9 @@ def _remove_u2_f_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id if u2f_id is not None: - _path_params['u2fId'] = u2f_id + _path_params["u2fId"] = u2f_id # process the query parameters # process the header parameters # process the form parameters @@ -7904,22 +7970,22 @@ def _remove_u2_f_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='DELETE', - resource_path='/v2/users/{userId}/u2f/{u2fId}', + method="DELETE", + resource_path="/v2/users/{userId}/u2f/{u2fId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7993,9 +8059,9 @@ def resend_email_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8066,9 +8132,9 @@ def resend_email_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8139,9 +8205,9 @@ def resend_email_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8176,7 +8242,7 @@ def _resend_email_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8186,35 +8252,35 @@ def _resend_email_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/email/resend', + method="POST", + resource_path="/v2/users/{userId}/email/resend", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8284,9 +8350,9 @@ def resend_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8353,9 +8419,9 @@ def resend_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8422,9 +8488,9 @@ def resend_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8458,7 +8524,7 @@ def _resend_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8466,22 +8532,22 @@ def _resend_invite_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/invite_code/resend', + method="POST", + resource_path="/v2/users/{userId}/invite_code/resend", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8555,9 +8621,9 @@ def resend_phone_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendPhoneCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendPhoneCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8628,9 +8694,9 @@ def resend_phone_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendPhoneCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendPhoneCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8701,9 +8767,9 @@ def resend_phone_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2ResendPhoneCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2ResendPhoneCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8738,7 +8804,7 @@ def _resend_phone_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8748,35 +8814,35 @@ def _resend_phone_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/phone/resend', + method="POST", + resource_path="/v2/users/{userId}/phone/resend", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8850,9 +8916,9 @@ def retrieve_identity_provider_intent( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RetrieveIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RetrieveIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8923,9 +8989,9 @@ def retrieve_identity_provider_intent_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RetrieveIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RetrieveIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8996,9 +9062,9 @@ def retrieve_identity_provider_intent_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2RetrieveIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2RetrieveIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9033,7 +9099,7 @@ def _retrieve_identity_provider_intent_serialize( # process the path parameters if idp_intent_id is not None: - _path_params['idpIntentId'] = idp_intent_id + _path_params["idpIntentId"] = idp_intent_id # process the query parameters # process the header parameters # process the form parameters @@ -9043,35 +9109,35 @@ def _retrieve_identity_provider_intent_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/idp_intents/{idpIntentId}', + method="POST", + resource_path="/v2/idp_intents/{idpIntentId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9145,9 +9211,9 @@ def send_email_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9218,9 +9284,9 @@ def send_email_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9291,9 +9357,9 @@ def send_email_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SendEmailCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SendEmailCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9328,7 +9394,7 @@ def _send_email_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9338,35 +9404,35 @@ def _send_email_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/email/send', + method="POST", + resource_path="/v2/users/{userId}/email/send", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9440,9 +9506,9 @@ def set_email( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9513,9 +9579,9 @@ def set_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9586,9 +9652,9 @@ def set_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9623,7 +9689,7 @@ def _set_email_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9633,35 +9699,35 @@ def _set_email_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/email', + method="POST", + resource_path="/v2/users/{userId}/email", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9735,9 +9801,9 @@ def set_password( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPasswordResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPasswordResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9808,9 +9874,9 @@ def set_password_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPasswordResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPasswordResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9881,9 +9947,9 @@ def set_password_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPasswordResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPasswordResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9918,7 +9984,7 @@ def _set_password_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9928,35 +9994,35 @@ def _set_password_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/password', + method="POST", + resource_path="/v2/users/{userId}/password", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10030,9 +10096,9 @@ def set_phone( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10103,9 +10169,9 @@ def set_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10176,9 +10242,9 @@ def set_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2SetPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2SetPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10213,7 +10279,7 @@ def _set_phone_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -10223,35 +10289,35 @@ def _set_phone_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/phone', + method="POST", + resource_path="/v2/users/{userId}/phone", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10321,9 +10387,9 @@ def start_identity_provider_intent( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2StartIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2StartIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10390,9 +10456,9 @@ def start_identity_provider_intent_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2StartIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2StartIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10459,9 +10525,9 @@ def start_identity_provider_intent_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2StartIdentityProviderIntentResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2StartIdentityProviderIntentResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10503,35 +10569,35 @@ def _start_identity_provider_intent_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/idp_intents', + method="POST", + resource_path="/v2/idp_intents", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10601,9 +10667,9 @@ def unlock_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UnlockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UnlockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10670,9 +10736,9 @@ def unlock_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UnlockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UnlockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10739,9 +10805,9 @@ def unlock_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UnlockUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UnlockUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10775,7 +10841,7 @@ def _unlock_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -10783,22 +10849,22 @@ def _unlock_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/unlock', + method="POST", + resource_path="/v2/users/{userId}/unlock", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10872,9 +10938,9 @@ def update_human_user( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UpdateHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UpdateHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10945,9 +11011,9 @@ def update_human_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UpdateHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UpdateHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11018,9 +11084,9 @@ def update_human_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2UpdateHumanUserResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2UpdateHumanUserResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11055,7 +11121,7 @@ def _update_human_user_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11065,35 +11131,35 @@ def _update_human_user_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='PUT', - resource_path='/v2/users/human/{userId}', + method="PUT", + resource_path="/v2/users/human/{userId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11167,9 +11233,9 @@ def verify_email( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11240,9 +11306,9 @@ def verify_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11313,9 +11379,9 @@ def verify_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyEmailResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyEmailResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11350,7 +11416,7 @@ def _verify_email_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11360,35 +11426,35 @@ def _verify_email_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/email/verify', + method="POST", + resource_path="/v2/users/{userId}/email/verify", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11462,9 +11528,9 @@ def verify_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11535,9 +11601,9 @@ def verify_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11608,9 +11674,9 @@ def verify_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyInviteCodeResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyInviteCodeResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11645,7 +11711,7 @@ def _verify_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11655,35 +11721,35 @@ def _verify_invite_code_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/invite_code/verify', + method="POST", + resource_path="/v2/users/{userId}/invite_code/verify", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11761,9 +11827,9 @@ def verify_passkey_registration( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPasskeyRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPasskeyRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11838,9 +11904,9 @@ def verify_passkey_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPasskeyRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPasskeyRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11915,9 +11981,9 @@ def verify_passkey_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPasskeyRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPasskeyRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11953,9 +12019,9 @@ def _verify_passkey_registration_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id if passkey_id is not None: - _path_params['passkeyId'] = passkey_id + _path_params["passkeyId"] = passkey_id # process the query parameters # process the header parameters # process the form parameters @@ -11965,35 +12031,35 @@ def _verify_passkey_registration_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/passkeys/{passkeyId}', + method="POST", + resource_path="/v2/users/{userId}/passkeys/{passkeyId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12067,9 +12133,9 @@ def verify_phone( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12140,9 +12206,9 @@ def verify_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12213,9 +12279,9 @@ def verify_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyPhoneResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyPhoneResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12250,7 +12316,7 @@ def _verify_phone_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -12260,35 +12326,35 @@ def _verify_phone_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/phone/verify', + method="POST", + resource_path="/v2/users/{userId}/phone/verify", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12362,9 +12428,9 @@ def verify_totp_registration( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyTOTPRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyTOTPRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12435,9 +12501,9 @@ def verify_totp_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyTOTPRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyTOTPRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12508,9 +12574,9 @@ def verify_totp_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyTOTPRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyTOTPRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12545,7 +12611,7 @@ def _verify_totp_registration_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -12555,35 +12621,35 @@ def _verify_totp_registration_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/totp/verify', + method="POST", + resource_path="/v2/users/{userId}/totp/verify", path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12661,9 +12727,9 @@ def verify_u2_f_registration( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyU2FRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyU2FRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12738,9 +12804,9 @@ def verify_u2_f_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyU2FRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyU2FRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12815,9 +12881,9 @@ def verify_u2_f_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "V2VerifyU2FRegistrationResponse", - '403': "RpcStatus", - '404': "RpcStatus", + "200": "V2VerifyU2FRegistrationResponse", + "403": "RpcStatus", + "404": "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12853,9 +12919,9 @@ def _verify_u2_f_registration_serialize( # process the path parameters if user_id is not None: - _path_params['userId'] = user_id + _path_params["userId"] = user_id if u2f_id is not None: - _path_params['u2fId'] = u2f_id + _path_params["u2fId"] = u2f_id # process the query parameters # process the header parameters # process the form parameters @@ -12865,35 +12931,35 @@ def _verify_u2_f_registration_serialize( # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( + if "Accept" not in _header_params: + _header_params["Accept"] = self.api_client.select_header_accept( [ - 'application/json' + "application/json" ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params['Content-Type'] = _content_type + _header_params["Content-Type"] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - 'application/json' + "application/json" ] ) ) if _default_content_type is not None: - _header_params['Content-Type'] = _default_content_type + _header_params["Content-Type"] = _default_content_type # authentication setting _auth_settings: List[str] = [ - 'zitadelAccessToken' + "zitadelAccessToken" ] return self.api_client.param_serialize( - method='POST', - resource_path='/v2/users/{userId}/u2f/{u2fId}', + method="POST", + resource_path="/v2/users/{userId}/u2f/{u2fId}", path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api_client.py b/zitadel_client/api_client.py index c21973a8..a605b861 100644 --- a/zitadel_client/api_client.py +++ b/zitadel_client/api_client.py @@ -7,7 +7,7 @@ import tempfile from enum import Enum from types import TracebackType -from typing import Tuple, Optional, List, Dict, Union, Any, TypeVar, Type, no_type_check +from typing import Any, Dict, List, Optional, Tuple, Type, TypeVar, Union, no_type_check from urllib.parse import quote from dateutil.parser import parse @@ -16,673 +16,653 @@ import zitadel_client.models import zitadel_client.rest_response from zitadel_client import rest -from zitadel_client.api_response import ApiResponse, T as ApiResponseT +from zitadel_client.api_response import ApiResponse +from zitadel_client.api_response import T as ApiResponseT from zitadel_client.auth.no_auth_authenticator import NoAuthAuthenticator from zitadel_client.configuration import Configuration -from zitadel_client.exceptions import ( - ApiException -) +from zitadel_client.exceptions import ApiException RequestSerialized = Tuple[str, str, Dict[str, str], Optional[str], List[str]] class ApiClient: - """Generic API client for OpenAPI client library builds. - - OpenAPI generic API client. This client handles the client-server communication, - and is invariant across implementations. Specifics of the methods and models - for each application are generated from the OpenAPI - templates. - - :param configuration: .Configuration object for this client - :param header_name: a header to pass when making calls to the API. - :param header_value: a header value to pass when making calls to - the API. - """ - - PRIMITIVE_TYPES = (float, bool, bytes, str, int) - NATIVE_TYPES_MAPPING = { - 'int': int, - 'long': int, - 'float': float, - 'str': str, - 'bool': bool, - 'date': datetime.date, - 'datetime': datetime.datetime, - 'decimal': decimal.Decimal, - 'object': object, - } - _pool = None - - def __init__( - self, - configuration: Configuration, - header_name: Optional[str]=None, - header_value: Optional[str]=None, - ) -> None: - self.configuration = configuration - - self.rest_client = rest.RESTClientObject(configuration) - self.default_headers = { - 'User-Agent': configuration.user_agent - } - if header_name is not None and header_value is not None: - self.default_headers[header_name] = header_value - self.client_side_validation = configuration.client_side_validation - - T = TypeVar("T", bound="ApiClient") - def __enter__(self: T) -> T: - return self - - def __exit__( - self, - exc_type: Optional[Type[BaseException]], - exc_value: Optional[BaseException], - traceback: Optional[TracebackType], - ) -> Optional[bool]: - return None - - def set_default_header(self, header_name: str, header_value: str) -> None: - self.default_headers[header_name] = header_value - - _default = None - - @no_type_check - def param_serialize( - self, - method, - resource_path, - path_params=None, - query_params=None, - header_params=None, - body=None, - post_params=None, - files=None, - auth_settings=None, - collection_formats=None, - _host=None, - _request_auth=None - ) -> RequestSerialized: - - """Builds the HTTP request params needed by the request. - :param _host: - :param auth_settings: - :param method: Method to call. - :param resource_path: Path to method endpoint. - :param path_params: Path parameters in the url. - :param query_params: Query parameters in the url. - :param header_params: Header parameters to be - placed in the request header. - :param body: Request body. - :param post_params: Request post form parameters, - for `application/x-www-form-urlencoded`, `multipart/form-data`. - :param auth_settings: Auth Settings names for the request. - :param collection_formats: dict of collection formats for path, query, - header, and post parameters. - :param _request_auth: set to override the auth_settings for an single - request; this effectively ignores the authentication - in the spec for a single request. - :return: tuple of form (path, http_method, query_params, header_params, - body, post_params, files) - """ - - config = self.configuration - - # header parameters - header_params = header_params or {} - header_params.update(self.default_headers) - if header_params: - header_params = self.sanitize_for_serialization(header_params) - header_params = dict( - self.parameters_to_tuples(header_params, collection_formats) - ) - - # path parameters - if path_params: - path_params = self.sanitize_for_serialization(path_params) - path_params = self.parameters_to_tuples( - path_params, - collection_formats - ) - for k, v in path_params: - # specified safe chars, encode everything - resource_path = resource_path.replace( - '{%s}' % k, - quote(str(v), safe=config.safe_chars_for_path_param) - ) + """Generic API client for OpenAPI client library builds. - # post parameters - if post_params or files: - post_params = post_params if post_params else [] - post_params = self.sanitize_for_serialization(post_params) - post_params = self.parameters_to_tuples( - post_params, - collection_formats - ) - if files: - post_params.extend(self.files_parameters(files)) - - header_params.update(self.configuration.authenticator.get_auth_headers()) - - if body: - body = self.sanitize_for_serialization(body) - - if _host is None: - url = self.configuration.host + resource_path - else: - url = _host + resource_path - - if query_params: - query_params = self.sanitize_for_serialization(query_params) - url_query = self.parameters_to_url_query( - query_params, - collection_formats - ) - url += "?" + url_query - - return method, url, header_params, body, post_params - - @no_type_check - def call_api( - self, - method, - url, - header_params=None, - body=None, - post_params=None, - _request_timeout=None - ) -> zitadel_client.rest_response.RESTResponse: - """Makes the HTTP request (synchronous) - :param post_params: - :param method: Method to call. - :param url: Path to method endpoint. - :param header_params: Header parameters to be - placed in the request header. - :param body: Request body. - :param post_params: Request post form parameters, - for `application/x-www-form-urlencoded`, `multipart/form-data`. - :param _request_timeout: timeout setting for this request. - :return: RESTResponse - """ + OpenAPI generic API client. This client handles the client-server communication, + and is invariant across implementations. Specifics of the methods and models + for each application are generated from the OpenAPI + templates. - try: - # perform request and return response - response_data = self.rest_client.request( - method, url, - headers=header_params, - body=body, post_params=post_params, - _request_timeout=_request_timeout - ) - - except ApiException as e: - raise e - - return response_data - - @no_type_check - def response_deserialize( - self, - response_data: zitadel_client.rest_response.RESTResponse, - response_types_map: Optional[Dict[str, ApiResponseT]] = None - ) -> ApiResponse[ApiResponseT]: - """Deserializes response into an object. - :param response_data: RESTResponse object to be deserialized. - :param response_types_map: dict of response types. - :return: ApiResponse + :param configuration: .Configuration object for this client + :param header_name: a header to pass when making calls to the API. + :param header_value: a header value to pass when making calls to + the API. """ - msg = "RESTResponse.read() must be called before passing it to response_deserialize()" - assert response_data.data is not None, msg - - response_type = response_types_map.get(str(response_data.status), None) - if not response_type and isinstance(response_data.status, int) and 100 <= response_data.status <= 599: - # if not found, look for '1XX', '2XX', etc. - response_type = response_types_map.get(str(response_data.status)[0] + "XX", None) - - # deserialize response data - response_text = None - return_data = None - try: - if response_type == "bytearray": - return_data = response_data.data - elif response_type == "file": - return_data = self.__deserialize_file(response_data) - elif response_type is not None: - match = None - content_type = response_data.getheader('content-type') - if content_type is not None: - match = re.search(r"charset=([a-zA-Z\-\d]+)[\s;]?", content_type) - encoding = match.group(1) if match else "utf-8" - response_text = response_data.data.decode(encoding) - return_data = self.deserialize(response_text, response_type, content_type) - finally: - if not 200 <= response_data.status <= 299: - raise ApiException.from_response( - http_resp=response_data, - body=response_text, - data=return_data, - ) - else: - return ApiResponse( - status_code=response_data.status, - data=return_data, - headers=response_data.getheaders(), - raw_data=response_data.data - ) - - @no_type_check - def sanitize_for_serialization(self, obj): - """Builds a JSON POST object. - - If obj is None, return None. - If obj is SecretStr, return obj.get_secret_value() - If obj is str, int, long, float, bool, return directly. - If obj is datetime.datetime, datetime.date - convert to string in iso8601 format. - If obj is decimal.Decimal return string representation. - If obj is list, sanitize each element in the list. - If obj is dict, return the dict. - If obj is OpenAPI model, return the properties' dict. - - :param obj: The data to serialize. - :return: The serialized form of data. - """ - if obj is None: - return None - elif isinstance(obj, Enum): - return obj.value - elif isinstance(obj, SecretStr): - return obj.get_secret_value() - elif isinstance(obj, self.PRIMITIVE_TYPES): - return obj - elif isinstance(obj, list): - return [ - self.sanitize_for_serialization(sub_obj) for sub_obj in obj - ] - elif isinstance(obj, tuple): - return tuple( - self.sanitize_for_serialization(sub_obj) for sub_obj in obj - ) - elif isinstance(obj, (datetime.datetime, datetime.date)): - return obj.isoformat() - elif isinstance(obj, decimal.Decimal): - return str(obj) - - elif isinstance(obj, dict): - obj_dict = obj - else: - # Convert model obj to dict except - # attributes `openapi_types`, `attribute_map` - # and attributes which value is not None. - # Convert attribute name to json key in - # model definition for request. - if hasattr(obj, 'to_dict') and callable(getattr(obj, 'to_dict')): - obj_dict = obj.to_dict() - else: - obj_dict = obj.__dict__ - - return { - key: self.sanitize_for_serialization(val) - for key, val in obj_dict.items() + PRIMITIVE_TYPES = (float, bool, bytes, str, int) + NATIVE_TYPES_MAPPING = { + "int": int, + "long": int, + "float": float, + "str": str, + "bool": bool, + "date": datetime.date, + "datetime": datetime.datetime, + "decimal": decimal.Decimal, + "object": object, } - - @no_type_check - def deserialize(self, response_text: str, response_type: str, content_type: Optional[str]): - """Deserializes response into an object. - - :param response_text: RESTResponse object to be deserialized. - :param response_type: class literal for - deserialized object, or string of class name. - :param content_type: content type of response. - - :return: deserialized object. - """ - - # fetch data from response object - if content_type is None: - try: - data = json.loads(response_text) - except ValueError: - data = response_text - elif re.match(r'^application/(json|[\w!#$&.+-^_]+\+json)\s*(;|$)', content_type, re.IGNORECASE): - if response_text == "": - data = "" - else: - data = json.loads(response_text) - elif re.match(r'^text\/[a-z.+-]+\s*(;|$)', content_type, re.IGNORECASE): - data = response_text - else: - raise ApiException( - status=0, - reason="Unsupported content type: {0}".format(content_type) - ) - - return self.__deserialize(data, response_type) - - @no_type_check - @staticmethod - def __deserialize(data, klass): - """Deserializes dict, list, str into an object. - - :param data: dict, list or str. - :param klass: class literal, or string of class name. - - :return: object. - """ - if data is None: - return None - - if isinstance(klass, str): - if klass.startswith('List['): - m = re.match(r'List\[(.*)]', klass) - assert m is not None, "Malformed List type definition" - sub_kls = m.group(1) - return [ApiClient.__deserialize(sub_data) - for sub_data in data] - - if klass.startswith('Dict['): - m = re.match(r'Dict\[([^,]*), (.*)]', klass) - assert m is not None, "Malformed Dict type definition" - sub_kls = m.group(2) - return {k: ApiClient.__deserialize(sub_kls) - for k, v in data.items()} - - # convert str to class - if klass in ApiClient.NATIVE_TYPES_MAPPING: - klass = ApiClient.NATIVE_TYPES_MAPPING[klass] - else: - klass = getattr(zitadel_client.models, klass) - - if klass in ApiClient.PRIMITIVE_TYPES: - return ApiClient.__deserialize_primitive(data, klass) - elif klass == object: - return ApiClient.__deserialize_object(data) - elif klass == datetime.date: - return ApiClient.__deserialize_date(data) - elif klass == datetime.datetime: - return ApiClient.__deserialize_datetime(data) - elif klass == decimal.Decimal: - return decimal.Decimal(data) - elif issubclass(klass, Enum): - return ApiClient.__deserialize_enum(data, klass) - else: - return ApiClient.__deserialize_model(data, klass) - - @no_type_check - @staticmethod - def parameters_to_tuples(params, collection_formats): - """Get parameters as list of tuples, formatting collections. - - :param params: Parameters as dict or list of two-tuples - :param dict collection_formats: Parameter collection formats - :return: Parameters as list of tuples, collections formatted - """ - new_params: List[Tuple[str, str]] = [] - if collection_formats is None: - collection_formats = {} - for k, v in params.items() if isinstance(params, dict) else params: - if k in collection_formats: - collection_format = collection_formats[k] - if collection_format == 'multi': - new_params.extend((k, value) for value in v) + _pool = None + + def __init__( + self, + configuration: Configuration, + header_name: Optional[str] = None, + header_value: Optional[str] = None, + ) -> None: + self.configuration = configuration + + self.rest_client = rest.RESTClientObject(configuration) + self.default_headers = {"User-Agent": configuration.user_agent} + if header_name is not None and header_value is not None: + self.default_headers[header_name] = header_value + self.client_side_validation = configuration.client_side_validation + + T = TypeVar("T", bound="ApiClient") + + def __enter__(self: T) -> T: + return self + + def __exit__( + self, + exc_type: Optional[Type[BaseException]], + exc_value: Optional[BaseException], + traceback: Optional[TracebackType], + ) -> Optional[bool]: + return None + + def set_default_header(self, header_name: str, header_value: str) -> None: + self.default_headers[header_name] = header_value + + _default = None + + @no_type_check + def param_serialize( + self, + method, + resource_path, + path_params=None, + query_params=None, + header_params=None, + body=None, + post_params=None, + files=None, + auth_settings=None, + collection_formats=None, + _host=None, + _request_auth=None, + ) -> RequestSerialized: + """Builds the HTTP request params needed by the request. + :param _host: + :param auth_settings: + :param method: Method to call. + :param resource_path: Path to method endpoint. + :param path_params: Path parameters in the url. + :param query_params: Query parameters in the url. + :param header_params: Header parameters to be + placed in the request header. + :param body: Request body. + :param post_params: Request post form parameters, + for `application/x-www-form-urlencoded`, `multipart/form-data`. + :param auth_settings: Auth Settings names for the request. + :param collection_formats: dict of collection formats for path, query, + header, and post parameters. + :param _request_auth: set to override the auth_settings for an single + request; this effectively ignores the authentication + in the spec for a single request. + :return: tuple of form (path, http_method, query_params, header_params, + body, post_params, files) + """ + + config = self.configuration + + # header parameters + header_params = header_params or {} + header_params.update(self.default_headers) + if header_params: + header_params = self.sanitize_for_serialization(header_params) + header_params = dict( + self.parameters_to_tuples(header_params, collection_formats) + ) + + # path parameters + if path_params: + path_params = self.sanitize_for_serialization(path_params) + path_params = self.parameters_to_tuples(path_params, collection_formats) + for k, v in path_params: + # specified safe chars, encode everything + resource_path = resource_path.replace( + "{%s}" % k, quote(str(v), safe=config.safe_chars_for_path_param) + ) + + # post parameters + if post_params or files: + post_params = post_params if post_params else [] + post_params = self.sanitize_for_serialization(post_params) + post_params = self.parameters_to_tuples(post_params, collection_formats) + if files: + post_params.extend(self.files_parameters(files)) + + header_params.update(self.configuration.authenticator.get_auth_headers()) + + if body: + body = self.sanitize_for_serialization(body) + + if _host is None: + url = self.configuration.host + resource_path else: - if collection_format == 'ssv': - delimiter = ' ' - elif collection_format == 'tsv': - delimiter = '\t' - elif collection_format == 'pipes': - delimiter = '|' - else: # csv is the default - delimiter = ',' - new_params.append( - (k, delimiter.join(str(value) for value in v))) - else: - new_params.append((k, v)) - return new_params - - @no_type_check - @staticmethod - def parameters_to_url_query(params, collection_formats): - """Get parameters as list of tuples, formatting collections. - - :param params: Parameters as dict or list of two-tuples - :param dict collection_formats: Parameter collection formats - :return: URL query string (e.g. a=Hello%20World&b=123) - """ - new_params: List[Tuple[str, str]] = [] - if collection_formats is None: - collection_formats = {} - for k, v in params.items() if isinstance(params, dict) else params: - if isinstance(v, bool): - v = str(v).lower() - if isinstance(v, (int, float)): - v = str(v) - if isinstance(v, dict): - v = json.dumps(v) - - if k in collection_formats: - collection_format = collection_formats[k] - if collection_format == 'multi': - new_params.extend((k, quote(str(value))) for value in v) + url = _host + resource_path + + if query_params: + query_params = self.sanitize_for_serialization(query_params) + url_query = self.parameters_to_url_query(query_params, collection_formats) + url += "?" + url_query + + return method, url, header_params, body, post_params + + @no_type_check + def call_api( + self, + method, + url, + header_params=None, + body=None, + post_params=None, + _request_timeout=None, + ) -> zitadel_client.rest_response.RESTResponse: + """Makes the HTTP request (synchronous) + :param post_params: + :param method: Method to call. + :param url: Path to method endpoint. + :param header_params: Header parameters to be + placed in the request header. + :param body: Request body. + :param post_params: Request post form parameters, + for `application/x-www-form-urlencoded`, `multipart/form-data`. + :param _request_timeout: timeout setting for this request. + :return: RESTResponse + """ + + try: + # perform request and return response + response_data = self.rest_client.request( + method, + url, + headers=header_params, + body=body, + post_params=post_params, + _request_timeout=_request_timeout, + ) + + except ApiException as e: + raise e + + return response_data + + @no_type_check + def response_deserialize( + self, + response_data: zitadel_client.rest_response.RESTResponse, + response_types_map: Optional[Dict[str, ApiResponseT]] = None, + ) -> ApiResponse[ApiResponseT]: + """Deserializes response into an object. + :param response_data: RESTResponse object to be deserialized. + :param response_types_map: dict of response types. + :return: ApiResponse + """ + + msg = "RESTResponse.read() must be called before passing it to response_deserialize()" + assert response_data.data is not None, msg + + response_type = response_types_map.get(str(response_data.status), None) + if ( + not response_type + and isinstance(response_data.status, int) + and 100 <= response_data.status <= 599 + ): + # if not found, look for '1XX', '2XX', etc. + response_type = response_types_map.get( + str(response_data.status)[0] + "XX", None + ) + + # deserialize response data + response_text = None + return_data = None + try: + if response_type == "bytearray": + return_data = response_data.data + elif response_type == "file": + return_data = self.__deserialize_file(response_data) + elif response_type is not None: + match = None + content_type = response_data.getheader("content-type") + if content_type is not None: + match = re.search(r"charset=([a-zA-Z\-\d]+)[\s;]?", content_type) + encoding = match.group(1) if match else "utf-8" + response_text = response_data.data.decode(encoding) + return_data = self.deserialize( + response_text, response_type, content_type + ) + finally: + if not 200 <= response_data.status <= 299: + raise ApiException.from_response( + http_resp=response_data, + body=response_text, + data=return_data, + ) + else: + return ApiResponse( + status_code=response_data.status, + data=return_data, + headers=response_data.getheaders(), + raw_data=response_data.data, + ) + + @no_type_check + def sanitize_for_serialization(self, obj): + """Builds a JSON POST object. + + If obj is None, return None. + If obj is SecretStr, return obj.get_secret_value() + If obj is str, int, long, float, bool, return directly. + If obj is datetime.datetime, datetime.date + convert to string in iso8601 format. + If obj is decimal.Decimal return string representation. + If obj is list, sanitize each element in the list. + If obj is dict, return the dict. + If obj is OpenAPI model, return the properties' dict. + + :param obj: The data to serialize. + :return: The serialized form of data. + """ + if obj is None: + return None + elif isinstance(obj, Enum): + return obj.value + elif isinstance(obj, SecretStr): + return obj.get_secret_value() + elif isinstance(obj, self.PRIMITIVE_TYPES): + return obj + elif isinstance(obj, list): + return [self.sanitize_for_serialization(sub_obj) for sub_obj in obj] + elif isinstance(obj, tuple): + return tuple(self.sanitize_for_serialization(sub_obj) for sub_obj in obj) + elif isinstance(obj, (datetime.datetime, datetime.date)): + return obj.isoformat() + elif isinstance(obj, decimal.Decimal): + return str(obj) + + elif isinstance(obj, dict): + obj_dict = obj else: - if collection_format == 'ssv': - delimiter = ' ' - elif collection_format == 'tsv': - delimiter = '\t' - elif collection_format == 'pipes': - delimiter = '|' - else: # csv is the default - delimiter = ',' - new_params.append( - (k, delimiter.join(quote(str(value)) for value in v)) - ) - else: - new_params.append((k, quote(str(v)))) - - return "&".join(["=".join(map(str, item)) for item in new_params]) - - @no_type_check - def files_parameters( - self, - files: Dict[str, Union[str, bytes, List[str], List[bytes], Tuple[str, bytes]]], - ): - """Builds form parameters. - - :param files: File parameters. - :return: Form parameters with files. - """ - params = [] - for k, v in files.items(): - if isinstance(v, str): - with open(v, 'rb') as f: - filename = os.path.basename(f.name) - filedata = f.read() - elif isinstance(v, bytes): - filename = k - filedata = v - elif isinstance(v, tuple): - filename, filedata = v - elif isinstance(v, list): - for file_param in v: - params.extend(self.files_parameters({k: file_param})) - continue - else: - raise ValueError("Unsupported file value") - mimetype = ( - mimetypes.guess_type(filename)[0] - or 'application/octet-stream' - ) - params.append( - tuple([k, tuple([filename, filedata, mimetype])]) - ) - return params - - @staticmethod - def select_header_accept(accepts: List[str]) -> Optional[str]: - """Returns `Accept` based on an array of accepts provided. - - :param accepts: List of headers. - :return: Accept (e.g. application/json). - """ - if not accepts: - return None - - for accept in accepts: - if re.search('json', accept, re.IGNORECASE): - return accept - - return accepts[0] - - @no_type_check - @staticmethod - def select_header_content_type(content_types): - """Returns `Content-Type` based on an array of content_types provided. - - :param content_types: List of content-types. - :return: Content-Type (e.g. application/json). - """ - if not content_types: - return None - - for content_type in content_types: - if re.search('json', content_type, re.IGNORECASE): - return content_type - - return content_types[0] - - @no_type_check - @staticmethod - def __deserialize_file(response): - """Deserializes body to file - - Saves response body into a file in a temporary folder, - using the filename from the `Content-Disposition` header if provided. - - handle file downloading - save response body into a tmp file and return the instance - - :param response: RESTResponse. - :return: file path. - """ - fd, path = tempfile.mkstemp() - os.close(fd) - os.remove(path) - - content_disposition = response.getheader("Content-Disposition") - if content_disposition: - m = re.search( - r'filename=[\'"]?([^\'"\s]+)[\'"]?', - content_disposition - ) - assert m is not None, "Unexpected 'content-disposition' header value" - filename = m.group(1) - path = os.path.join(os.path.dirname(path), filename) - - with open(path, "wb") as f: - f.write(response.data) - - return path - - @no_type_check - @staticmethod - def __deserialize_primitive(data, klass): - """Deserializes string to primitive type. - - :param data: str. - :param klass: class literal. - - :return: int, long, float, str, bool. - """ - try: - return klass(data) - except UnicodeEncodeError: - return str(data) - except TypeError: - return data - - @no_type_check - @staticmethod - def __deserialize_object(value): - """Return an original value. - - :return: object. - """ - return value - - @no_type_check - @staticmethod - def __deserialize_date(string): - """Deserializes string to date. - - :param string: str. - :return: date. - """ - try: - return parse(string).date() - except ImportError: - return string - except ValueError: - raise rest.ApiException( - status=0, - reason="Failed to parse `{0}` as date object".format(string) - ) - - @no_type_check - @staticmethod - def __deserialize_datetime(string): - """Deserializes string to datetime. - - The string should be in iso8601 datetime format. - - :param string: str. - :return: datetime. - """ - try: - return parse(string) - except ImportError: - return string - except ValueError: - raise rest.ApiException( - status=0, - reason=( - "Failed to parse `{0}` as datetime object" - .format(string) - ) - ) - - @no_type_check - @staticmethod - def __deserialize_enum(data, klass): - """Deserializes primitive type to enum. - - :param data: primitive type. - :param klass: class literal. - :return: enum value. - """ - try: - return klass(data) - except ValueError: - raise rest.ApiException( - status=0, - reason=( - "Failed to parse `{0}` as `{1}`" - .format(data, klass) + # Convert model obj to dict except + # attributes `openapi_types`, `attribute_map` + # and attributes which value is not None. + # Convert attribute name to json key in + # model definition for request. + if hasattr(obj, "to_dict") and callable(obj.to_dict): + obj_dict = obj.to_dict() + else: + obj_dict = obj.__dict__ + + return { + key: self.sanitize_for_serialization(val) for key, val in obj_dict.items() + } + + @no_type_check + def deserialize( + self, response_text: str, response_type: str, content_type: Optional[str] + ): + """Deserializes response into an object. + + :param response_text: RESTResponse object to be deserialized. + :param response_type: class literal for + deserialized object, or string of class name. + :param content_type: content type of response. + + :return: deserialized object. + """ + + # fetch data from response object + if content_type is None: + try: + data = json.loads(response_text) + except ValueError: + data = response_text + elif re.match( + r"^application/(json|[\w!#$&.+-^_]+\+json)\s*(;|$)", + content_type, + re.IGNORECASE, + ): + if response_text == "": + data = "" + else: + data = json.loads(response_text) + elif re.match(r"^text\/[a-z.+-]+\s*(;|$)", content_type, re.IGNORECASE): + data = response_text + else: + raise ApiException( + status=0, reason="Unsupported content type: {0}".format(content_type) + ) + + return self.__deserialize(data, response_type) + + @no_type_check + @staticmethod + def __deserialize(data, klass): + """Deserializes dict, list, str into an object. + + :param data: dict, list or str. + :param klass: class literal, or string of class name. + + :return: object. + """ + if data is None: + return None + + if isinstance(klass, str): + if klass.startswith("List["): + m = re.match(r"List\[(.*)]", klass) + assert m is not None, "Malformed List type definition" + sub_kls = m.group(1) + return [ApiClient.__deserialize(sub_data) for sub_data in data] + + if klass.startswith("Dict["): + m = re.match(r"Dict\[([^,]*), (.*)]", klass) + assert m is not None, "Malformed Dict type definition" + sub_kls = m.group(2) + return {k: ApiClient.__deserialize(sub_kls) for k, v in data.items()} + + # convert str to class + if klass in ApiClient.NATIVE_TYPES_MAPPING: + klass = ApiClient.NATIVE_TYPES_MAPPING[klass] + else: + klass = getattr(zitadel_client.models, klass) + + if klass in ApiClient.PRIMITIVE_TYPES: + return ApiClient.__deserialize_primitive(data, klass) + elif klass == object: + return ApiClient.__deserialize_object(data) + elif klass == datetime.date: + return ApiClient.__deserialize_date(data) + elif klass == datetime.datetime: + return ApiClient.__deserialize_datetime(data) + elif klass == decimal.Decimal: + return decimal.Decimal(data) + elif issubclass(klass, Enum): + return ApiClient.__deserialize_enum(data, klass) + else: + return ApiClient.__deserialize_model(data, klass) + + @no_type_check + @staticmethod + def parameters_to_tuples(params, collection_formats): + """Get parameters as list of tuples, formatting collections. + + :param params: Parameters as dict or list of two-tuples + :param dict collection_formats: Parameter collection formats + :return: Parameters as list of tuples, collections formatted + """ + new_params: List[Tuple[str, str]] = [] + if collection_formats is None: + collection_formats = {} + for k, v in params.items() if isinstance(params, dict) else params: + if k in collection_formats: + collection_format = collection_formats[k] + if collection_format == "multi": + new_params.extend((k, value) for value in v) + else: + if collection_format == "ssv": + delimiter = " " + elif collection_format == "tsv": + delimiter = "\t" + elif collection_format == "pipes": + delimiter = "|" + else: # csv is the default + delimiter = "," + new_params.append((k, delimiter.join(str(value) for value in v))) + else: + new_params.append((k, v)) + return new_params + + @no_type_check + @staticmethod + def parameters_to_url_query(params, collection_formats): + """Get parameters as list of tuples, formatting collections. + + :param params: Parameters as dict or list of two-tuples + :param dict collection_formats: Parameter collection formats + :return: URL query string (e.g. a=Hello%20World&b=123) + """ + new_params: List[Tuple[str, str]] = [] + if collection_formats is None: + collection_formats = {} + for k, v in params.items() if isinstance(params, dict) else params: + if isinstance(v, bool): + v = str(v).lower() + if isinstance(v, (int, float)): + v = str(v) + if isinstance(v, dict): + v = json.dumps(v) + + if k in collection_formats: + collection_format = collection_formats[k] + if collection_format == "multi": + new_params.extend((k, quote(str(value))) for value in v) + else: + if collection_format == "ssv": + delimiter = " " + elif collection_format == "tsv": + delimiter = "\t" + elif collection_format == "pipes": + delimiter = "|" + else: # csv is the default + delimiter = "," + new_params.append( + (k, delimiter.join(quote(str(value)) for value in v)) + ) + else: + new_params.append((k, quote(str(v)))) + + return "&".join(["=".join(map(str, item)) for item in new_params]) + + @no_type_check + def files_parameters( + self, + files: Dict[str, Union[str, bytes, List[str], List[bytes], Tuple[str, bytes]]], + ): + """Builds form parameters. + + :param files: File parameters. + :return: Form parameters with files. + """ + params = [] + for k, v in files.items(): + if isinstance(v, str): + with open(v, "rb") as f: + filename = os.path.basename(f.name) + filedata = f.read() + elif isinstance(v, bytes): + filename = k + filedata = v + elif isinstance(v, tuple): + filename, filedata = v + elif isinstance(v, list): + for file_param in v: + params.extend(self.files_parameters({k: file_param})) + continue + else: + raise ValueError("Unsupported file value") + mimetype = mimetypes.guess_type(filename)[0] or "application/octet-stream" + params.append(tuple([k, tuple([filename, filedata, mimetype])])) + return params + + @staticmethod + def select_header_accept(accepts: List[str]) -> Optional[str]: + """Returns `Accept` based on an array of accepts provided. + + :param accepts: List of headers. + :return: Accept (e.g. application/json). + """ + if not accepts: + return None + + for accept in accepts: + if re.search("json", accept, re.IGNORECASE): + return accept + + return accepts[0] + + @no_type_check + @staticmethod + def select_header_content_type(content_types): + """Returns `Content-Type` based on an array of content_types provided. + + :param content_types: List of content-types. + :return: Content-Type (e.g. application/json). + """ + if not content_types: + return None + + for content_type in content_types: + if re.search("json", content_type, re.IGNORECASE): + return content_type + + return content_types[0] + + @no_type_check + @staticmethod + def __deserialize_file(response): + """Deserializes body to file + + Saves response body into a file in a temporary folder, + using the filename from the `Content-Disposition` header if provided. + + handle file downloading + save response body into a tmp file and return the instance + + :param response: RESTResponse. + :return: file path. + """ + fd, path = tempfile.mkstemp() + os.close(fd) + os.remove(path) + + content_disposition = response.getheader("Content-Disposition") + if content_disposition: + m = re.search(r'filename=[\'"]?([^\'"\s]+)[\'"]?', content_disposition) + assert m is not None, "Unexpected 'content-disposition' header value" + filename = m.group(1) + path = os.path.join(os.path.dirname(path), filename) + + with open(path, "wb") as f: + f.write(response.data) + + return path + + @no_type_check + @staticmethod + def __deserialize_primitive(data, klass): + """Deserializes string to primitive type. + + :param data: str. + :param klass: class literal. + + :return: int, long, float, str, bool. + """ + try: + return klass(data) + except UnicodeEncodeError: + return str(data) + except TypeError: + return data + + @no_type_check + @staticmethod + def __deserialize_object(value): + """Return an original value. + + :return: object. + """ + return value + + @no_type_check + @staticmethod + def __deserialize_date(string): + """Deserializes string to date. + + :param string: str. + :return: date. + """ + try: + return parse(string).date() + except ImportError: + return string + except ValueError: + raise rest.ApiException( + status=0, reason="Failed to parse `{0}` as date object".format(string) + ) + + @no_type_check + @staticmethod + def __deserialize_datetime(string): + """Deserializes string to datetime. + + The string should be in iso8601 datetime format. + + :param string: str. + :return: datetime. + """ + try: + return parse(string) + except ImportError: + return string + except ValueError: + raise rest.ApiException( + status=0, + reason=("Failed to parse `{0}` as datetime object".format(string)), + ) + + @no_type_check + @staticmethod + def __deserialize_enum(data, klass): + """Deserializes primitive type to enum. + + :param data: primitive type. + :param klass: class literal. + :return: enum value. + """ + try: + return klass(data) + except ValueError: + raise rest.ApiException( + status=0, reason=("Failed to parse `{0}` as `{1}`".format(data, klass)) + ) + + @no_type_check + @staticmethod + def __deserialize_model(data, klass: Any): + """Deserializes list or dict to model. + + :param data: dict, list. + :param klass: class literal. + :return: model object. + """ + + return klass.from_dict(data) + + @no_type_check + @classmethod + def get_default(cls): + return ApiClient( + configuration=Configuration(authenticator=NoAuthAuthenticator()) ) - ) - - @no_type_check - @staticmethod - def __deserialize_model(data, klass: Any): - """Deserializes list or dict to model. - - :param data: dict, list. - :param klass: class literal. - :return: model object. - """ - - return klass.from_dict(data) - - @no_type_check - @classmethod - def get_default(cls): - return ApiClient(configuration=Configuration(authenticator=NoAuthAuthenticator())) diff --git a/zitadel_client/api_response.py b/zitadel_client/api_response.py index e05841b1..63fe7b52 100644 --- a/zitadel_client/api_response.py +++ b/zitadel_client/api_response.py @@ -1,22 +1,20 @@ from __future__ import annotations -from typing import Optional, Generic, Mapping, TypeVar +from typing import Generic, Mapping, Optional, TypeVar -from pydantic import Field, StrictInt, StrictBytes, BaseModel +from pydantic import BaseModel, Field, StrictBytes, StrictInt T = TypeVar("T") class ApiResponse(BaseModel, Generic[T]): - """ - API response object - """ + """ + API response object + """ - status_code: StrictInt = Field(description="HTTP status code") - headers: Optional[Mapping[str, str]] = Field(None, description="HTTP headers") - data: T = Field(description="Deserialized data given the data type") - raw_data: StrictBytes = Field(description="Raw data (HTTP response body)") + status_code: StrictInt = Field(description="HTTP status code") + headers: Optional[Mapping[str, str]] = Field(None, description="HTTP headers") + data: T = Field(description="Deserialized data given the data type") + raw_data: StrictBytes = Field(description="Raw data (HTTP response body)") - model_config = { - "arbitrary_types_allowed": True - } + model_config = {"arbitrary_types_allowed": True} diff --git a/zitadel_client/auth/authenticator.py b/zitadel_client/auth/authenticator.py index e6a26ea7..4f911c8b 100644 --- a/zitadel_client/auth/authenticator.py +++ b/zitadel_client/auth/authenticator.py @@ -1,67 +1,68 @@ from abc import ABC, abstractmethod from datetime import datetime, timezone -from typing import Dict, Generic, TypeVar, Any # noqa: F401 +from typing import Any, Dict, Generic, TypeVar # noqa: F401 -class Authenticator(ABC): - """ - Abstract base class for authenticators. - - This class defines the basic structure for any authenticator by requiring the implementation - of a method to retrieve authentication headers, and provides a way to store and retrieve the host. - """ - def __init__(self, host: str): +class Authenticator(ABC): """ - Initializes the Authenticator with the specified host. + Abstract base class for authenticators. - :param host: The base URL or endpoint for the service. + This class defines the basic structure for any authenticator by requiring the implementation + of a method to retrieve authentication headers, and provides a way to store and retrieve the host. """ - self.host = host - @abstractmethod - def get_auth_headers(self) -> Dict[str, str]: - """ - Retrieves the authentication headers to be sent with requests. + def __init__(self, host: str): + """ + Initializes the Authenticator with the specified host. - Subclasses must override this method to return the appropriate headers. + :param host: The base URL or endpoint for the service. + """ + self.host = host - :return: A dictionary mapping header names to their values. - """ - pass + @abstractmethod + def get_auth_headers(self) -> Dict[str, str]: + """ + Retrieves the authentication headers to be sent with requests. - def get_host(self) -> str: - """ - Returns the stored host. + Subclasses must override this method to return the appropriate headers. - :return: The host as a string. - """ - return self.host + :return: A dictionary mapping header names to their values. + """ + pass + + def get_host(self) -> str: + """ + Returns the stored host. + + :return: The host as a string. + """ + return self.host class Token: - def __init__(self, access_token: str, expires_at: datetime): - """ - Initializes a new Token instance. + def __init__(self, access_token: str, expires_at: datetime): + """ + Initializes a new Token instance. - Parameters: - - access_token (str): The JWT or OAuth token. - - expires_at (datetime): The expiration time of the token. It should be timezone-aware. - If a naive datetime is provided, it will be converted to an aware datetime in UTC. - """ - self.access_token = access_token + Parameters: + - access_token (str): The JWT or OAuth token. + - expires_at (datetime): The expiration time of the token. It should be timezone-aware. + If a naive datetime is provided, it will be converted to an aware datetime in UTC. + """ + self.access_token = access_token - # Ensure expires_at is timezone-aware. If naive, assume UTC. - if expires_at.tzinfo is None: - self.expires_at = expires_at.replace(tzinfo=timezone.utc) - else: - self.expires_at = expires_at + # Ensure expires_at is timezone-aware. If naive, assume UTC. + if expires_at.tzinfo is None: + self.expires_at = expires_at.replace(tzinfo=timezone.utc) + else: + self.expires_at = expires_at - def is_expired(self) -> bool: - """ - Checks if the token is expired by comparing the current UTC time - with the token's expiration time. + def is_expired(self) -> bool: + """ + Checks if the token is expired by comparing the current UTC time + with the token's expiration time. - Returns: - - bool: True if expired, False otherwise. - """ - return datetime.now(timezone.utc) >= self.expires_at + Returns: + - bool: True if expired, False otherwise. + """ + return datetime.now(timezone.utc) >= self.expires_at diff --git a/zitadel_client/auth/client_credentials_authenticator.py b/zitadel_client/auth/client_credentials_authenticator.py index af89e1ce..45d9dfda 100644 --- a/zitadel_client/auth/client_credentials_authenticator.py +++ b/zitadel_client/auth/client_credentials_authenticator.py @@ -1,76 +1,93 @@ -from typing import override, Set, Dict +from typing import Dict, Set, override from authlib.integrations.requests_client import OAuth2Session -from zitadel_client.auth.oauth_authenticator import OAuthAuthenticator, OAuthAuthenticatorBuilder +from zitadel_client.auth.oauth_authenticator import ( + OAuthAuthenticator, + OAuthAuthenticatorBuilder, +) from zitadel_client.auth.open_id import OpenId class ClientCredentialsAuthenticator(OAuthAuthenticator): - """ - OAuth authenticator implementing the client credentials flow. - - Uses client_id and client_secret to obtain an access token from the OAuth2 token endpoint. - """ - - def __init__(self, open_id: OpenId, client_id: str, client_secret: str, auth_scopes: Set[str]): - """ - Constructs a ClientCredentialsAuthenticator. - - :param open_id: The base URL for the OAuth provider. - :param client_id: The OAuth client identifier. - :param client_secret: The OAuth client secret. - :param auth_scopes: The scope(s) for the token request. - """ - super().__init__(open_id, - OAuth2Session(client_id=client_id, client_secret=client_secret, scope=" ".join(auth_scopes))) - - @override - def get_grant(self) -> Dict[str, str]: - """ - Returns the grant parameters for the client credentials flow. - - :return: A dictionary with the grant type for client credentials. """ - return {"grant_type": "client_credentials"} + OAuth authenticator implementing the client credentials flow. - @staticmethod - def builder(host: str, client_id: str, client_secret: str) -> "ClientCredentialsAuthenticatorBuilder": + Uses client_id and client_secret to obtain an access token from the OAuth2 token endpoint. """ - Returns a builder for constructing a ClientCredentialsAuthenticator. - :param host: The base URL for the OAuth provider. - :param client_id: The OAuth client identifier. - :param client_secret: The OAuth client secret. - :return: A ClientCredentialsAuthenticatorBuilder instance. + def __init__( + self, open_id: OpenId, client_id: str, client_secret: str, auth_scopes: Set[str] + ): + """ + Constructs a ClientCredentialsAuthenticator. + + :param open_id: The base URL for the OAuth provider. + :param client_id: The OAuth client identifier. + :param client_secret: The OAuth client secret. + :param auth_scopes: The scope(s) for the token request. + """ + super().__init__( + open_id, + OAuth2Session( + client_id=client_id, + client_secret=client_secret, + scope=" ".join(auth_scopes), + ), + ) + + @override + def get_grant(self) -> Dict[str, str]: + """ + Returns the grant parameters for the client credentials flow. + + :return: A dictionary with the grant type for client credentials. + """ + return {"grant_type": "client_credentials"} + + @staticmethod + def builder( + host: str, client_id: str, client_secret: str + ) -> "ClientCredentialsAuthenticatorBuilder": + """ + Returns a builder for constructing a ClientCredentialsAuthenticator. + + :param host: The base URL for the OAuth provider. + :param client_id: The OAuth client identifier. + :param client_secret: The OAuth client secret. + :return: A ClientCredentialsAuthenticatorBuilder instance. + """ + return ClientCredentialsAuthenticatorBuilder(host, client_id, client_secret) + + +class ClientCredentialsAuthenticatorBuilder( + OAuthAuthenticatorBuilder["ClientCredentialsAuthenticatorBuilder"] +): """ - return ClientCredentialsAuthenticatorBuilder(host, client_id, client_secret) + Builder class for constructing ClientCredentialsAuthenticator instances. - -class ClientCredentialsAuthenticatorBuilder(OAuthAuthenticatorBuilder["ClientCredentialsAuthenticatorBuilder"]): - """ - Builder class for constructing ClientCredentialsAuthenticator instances. - - This builder extends the OAuthAuthenticatorBuilder with client credentials (client_id and client_secret) - required for the client credentials flow. - """ - - def __init__(self, host: str, client_id: str, client_secret: str): - """ - Initializes the ClientCredentialsAuthenticatorBuilder with host, client ID, and client secret. - - :param host: The base URL for the OAuth provider. - :param client_id: The OAuth client identifier. - :param client_secret: The OAuth client secret. - """ - super().__init__(host) - self.client_id = client_id - self.client_secret = client_secret - - def build(self) -> ClientCredentialsAuthenticator: + This builder extends the OAuthAuthenticatorBuilder with client credentials (client_id and client_secret) + required for the client credentials flow. """ - Constructs and returns a ClientCredentialsAuthenticator instance using the configured parameters. - :return: A configured ClientCredentialsAuthenticator. - """ - return ClientCredentialsAuthenticator(self.open_id, self.client_id, self.client_secret, self.auth_scopes) + def __init__(self, host: str, client_id: str, client_secret: str): + """ + Initializes the ClientCredentialsAuthenticatorBuilder with host, client ID, and client secret. + + :param host: The base URL for the OAuth provider. + :param client_id: The OAuth client identifier. + :param client_secret: The OAuth client secret. + """ + super().__init__(host) + self.client_id = client_id + self.client_secret = client_secret + + def build(self) -> ClientCredentialsAuthenticator: + """ + Constructs and returns a ClientCredentialsAuthenticator instance using the configured parameters. + + :return: A configured ClientCredentialsAuthenticator. + """ + return ClientCredentialsAuthenticator( + self.open_id, self.client_id, self.client_secret, self.auth_scopes + ) diff --git a/zitadel_client/auth/no_auth_authenticator.py b/zitadel_client/auth/no_auth_authenticator.py index f76eee9f..c6df71f3 100644 --- a/zitadel_client/auth/no_auth_authenticator.py +++ b/zitadel_client/auth/no_auth_authenticator.py @@ -4,25 +4,25 @@ class NoAuthAuthenticator(Authenticator): - """ - A simple authenticator that performs no authentication. - - This authenticator is useful for cases where no token or credentials are required. - It simply returns an empty dictionary for authentication headers. - """ - - def __init__(self, host: str = "http://localhost"): """ - Initializes the NoAuthAuthenticator with a default host. + A simple authenticator that performs no authentication. - :param host: The base URL for the service. Defaults to "http://localhost". + This authenticator is useful for cases where no token or credentials are required. + It simply returns an empty dictionary for authentication headers. """ - super().__init__(host) - def get_auth_headers(self) -> Dict[str, str]: - """ - Returns an empty dictionary since no authentication is performed. + def __init__(self, host: str = "http://localhost"): + """ + Initializes the NoAuthAuthenticator with a default host. - :return: An empty dictionary. - """ - return {} + :param host: The base URL for the service. Defaults to "http://localhost". + """ + super().__init__(host) + + def get_auth_headers(self) -> Dict[str, str]: + """ + Returns an empty dictionary since no authentication is performed. + + :return: An empty dictionary. + """ + return {} diff --git a/zitadel_client/auth/oauth_authenticator.py b/zitadel_client/auth/oauth_authenticator.py index 2ea644d8..ea6f76dd 100644 --- a/zitadel_client/auth/oauth_authenticator.py +++ b/zitadel_client/auth/oauth_authenticator.py @@ -1,104 +1,106 @@ from abc import ABC, abstractmethod from datetime import datetime, timedelta, timezone -from typing import Dict, Optional, Generic, TypeVar, Any # noqa: F401 +from typing import Any, Dict, Generic, Optional, TypeVar # noqa: F401 from authlib.integrations.requests_client import OAuth2Session -from zitadel_client.auth.authenticator import Token, Authenticator +from zitadel_client.auth.authenticator import Authenticator, Token from zitadel_client.auth.open_id import OpenId class OAuthAuthenticator(Authenticator, ABC): - """ - Base class for OAuth-based authentication using Authlib. - - Attributes: - open_id: An object providing OAuth endpoint information. - oauth_session: An OAuth2Session instance used for fetching tokens. - """ - - def __init__(self, open_id: OpenId, oauth_session: OAuth2Session): - """ - Constructs an OAuthAuthenticator. - - :param open_id: An object that must implement get_host_endpoint() and get_token_endpoint(). - :param oauth_session: The scope for the token request. """ - super().__init__(open_id.get_host_endpoint()) - self.open_id = open_id - self.token: Optional[Token] = None - self.oauth_session = oauth_session + Base class for OAuth-based authentication using Authlib. - def get_auth_token(self) -> str: - """ - Returns the current access token, refreshing it if necessary. + Attributes: + open_id: An object providing OAuth endpoint information. + oauth_session: An OAuth2Session instance used for fetching tokens. """ - if self.token is None or self.token.is_expired(): - self.refresh_token() - assert self.token is not None - return self.token.access_token + def __init__(self, open_id: OpenId, oauth_session: OAuth2Session): + """ + Constructs an OAuthAuthenticator. + + :param open_id: An object that must implement get_host_endpoint() and get_token_endpoint(). + :param oauth_session: The scope for the token request. + """ + super().__init__(open_id.get_host_endpoint()) + self.open_id = open_id + self.token: Optional[Token] = None + self.oauth_session = oauth_session + + def get_auth_token(self) -> str: + """ + Returns the current access token, refreshing it if necessary. + """ + if self.token is None or self.token.is_expired(): + self.refresh_token() + + assert self.token is not None + return self.token.access_token + + def get_auth_headers(self) -> Dict[str, str]: + """ + Retrieves authentication headers. + + :return: A dictionary containing the 'Authorization' header. + """ + return {"Authorization": "Bearer " + self.get_auth_token()} + + @abstractmethod + def get_grant(self) -> Dict[str, str]: + """ + Builds and returns a dictionary of grant parameters required for the token request. + + For example, this might include parameters like grant_type, client_assertion, etc. + """ + pass + + def refresh_token(self) -> Token: + """ + Refreshes the access token using the OAuth flow. + It uses get_grant() to obtain all necessary parameters, such as the grant type and any assertions. + + :return: A new Token. + """ + try: + token_response = self.oauth_session.fetch_token( + url=(self.open_id.get_token_endpoint()), **(self.get_grant()) + ) + access_token = token_response["access_token"] + expires_in = token_response.get("expires_in", 3600) + expires_at = datetime.now(timezone.utc) + timedelta(seconds=expires_in) + self.token = Token(access_token, expires_at) + return self.token + except Exception as e: + raise Exception("Failed to refresh token: " + str(e)) from e - def get_auth_headers(self) -> Dict[str, str]: - """ - Retrieves authentication headers. - :return: A dictionary containing the 'Authorization' header. - """ - return {"Authorization": "Bearer " + self.get_auth_token()} - - @abstractmethod - def get_grant(self) -> Dict[str, str]: - """ - Builds and returns a dictionary of grant parameters required for the token request. +T = TypeVar("T", bound="OAuthAuthenticatorBuilder[Any]") - For example, this might include parameters like grant_type, client_assertion, etc. - """ - pass - def refresh_token(self) -> Token: +class OAuthAuthenticatorBuilder(ABC, Generic[T]): """ - Refreshes the access token using the OAuth flow. - It uses get_grant() to obtain all necessary parameters, such as the grant type and any assertions. + Abstract builder class for constructing OAuth authenticator instances. - :return: A new Token. + This builder provides common configuration options such as the OpenId instance and authentication scopes. """ - try: - token_response = self.oauth_session.fetch_token(url=(self.open_id.get_token_endpoint()), - **(self.get_grant())) - access_token = token_response["access_token"] - expires_in = token_response.get("expires_in", 3600) - expires_at = datetime.now(timezone.utc) + timedelta(seconds=expires_in) - self.token = Token(access_token, expires_at) - return self.token - except Exception as e: - raise Exception("Failed to refresh token: " + str(e)) from e - - -T = TypeVar("T", bound="OAuthAuthenticatorBuilder[Any]") -class OAuthAuthenticatorBuilder(ABC, Generic[T]): - """ - Abstract builder class for constructing OAuth authenticator instances. + def __init__(self, host: str): + """ + Initializes the OAuthAuthenticatorBuilder with a given host. - This builder provides common configuration options such as the OpenId instance and authentication scopes. - """ + :param host: The base URL for the OAuth provider. + """ + self.open_id = OpenId(host) + self.auth_scopes = {"openid", "urn:zitadel:iam:org:project:id:zitadel:aud"} - def __init__(self, host: str): - """ - Initializes the OAuthAuthenticatorBuilder with a given host. + def scopes(self: T, *auth_scopes: str) -> T: + """ + Sets the authentication scopes for the OAuth authenticator. - :param host: The base URL for the OAuth provider. - """ - self.open_id = OpenId(host) - self.auth_scopes = {"openid", "urn:zitadel:iam:org:project:id:zitadel:aud"} - - def scopes(self: T, *auth_scopes: str) -> T: - """ - Sets the authentication scopes for the OAuth authenticator. - - :param auth_scopes: A variable number of scope strings. - :return: The builder instance to allow for method chaining. - """ - self.auth_scopes = set(auth_scopes) - return self + :param auth_scopes: A variable number of scope strings. + :return: The builder instance to allow for method chaining. + """ + self.auth_scopes = set(auth_scopes) + return self diff --git a/zitadel_client/auth/open_id.py b/zitadel_client/auth/open_id.py index 56818e48..02764878 100644 --- a/zitadel_client/auth/open_id.py +++ b/zitadel_client/auth/open_id.py @@ -6,53 +6,56 @@ class OpenId: - """ - OpenId retrieves OpenID Connect configuration from a given host. - - It builds the well-known configuration URL from the provided hostname, - fetches the configuration, and extracts the token endpoint. - """ - host_endpoint: str - token_endpoint: str - - def __init__(self, hostname: str): - if not (hostname.startswith("http://") or hostname.startswith("https://")): - hostname = "https://" + hostname - - self.host_endpoint = hostname - well_known_url = self.build_well_known_url(hostname) - - try: - with urllib.request.urlopen(well_known_url) as response: - if response.status != 200: - raise Exception(f"Failed to fetch OpenID configuration: HTTP {response.status}") - config = json.loads(response.read().decode('utf-8')) - except urllib.error.URLError as e: - raise Exception(f"URL error occurred: {e}") - except json.JSONDecodeError: - raise Exception("Failed to decode JSON response") - - token_endpoint = config.get("token_endpoint") - if not token_endpoint: - raise Exception("token_endpoint not found in OpenID configuration") - - self.token_endpoint = token_endpoint - - @staticmethod - def build_well_known_url(hostname: str) -> str: """ - Builds the well-known OpenID configuration URL for the given hostname. - """ - return urljoin(hostname, "/.well-known/openid-configuration") + OpenId retrieves OpenID Connect configuration from a given host. - def get_host_endpoint(self) -> str: - """ - Returns the host endpoint URL. + It builds the well-known configuration URL from the provided hostname, + fetches the configuration, and extracts the token endpoint. """ - return self.host_endpoint - def get_token_endpoint(self) -> str: - """ - Returns the token endpoint URL extracted from the OpenID configuration. - """ - return self.token_endpoint + host_endpoint: str + token_endpoint: str + + def __init__(self, hostname: str): + if not (hostname.startswith("http://") or hostname.startswith("https://")): + hostname = "https://" + hostname + + self.host_endpoint = hostname + well_known_url = self.build_well_known_url(hostname) + + try: + with urllib.request.urlopen(well_known_url) as response: + if response.status != 200: + raise Exception( + f"Failed to fetch OpenID configuration: HTTP {response.status}" + ) + config = json.loads(response.read().decode("utf-8")) + except urllib.error.URLError as e: + raise Exception(f"URL error occurred: {e}") + except json.JSONDecodeError: + raise Exception("Failed to decode JSON response") + + token_endpoint = config.get("token_endpoint") + if not token_endpoint: + raise Exception("token_endpoint not found in OpenID configuration") + + self.token_endpoint = token_endpoint + + @staticmethod + def build_well_known_url(hostname: str) -> str: + """ + Builds the well-known OpenID configuration URL for the given hostname. + """ + return urljoin(hostname, "/.well-known/openid-configuration") + + def get_host_endpoint(self) -> str: + """ + Returns the host endpoint URL. + """ + return self.host_endpoint + + def get_token_endpoint(self) -> str: + """ + Returns the token endpoint URL extracted from the OpenID configuration. + """ + return self.token_endpoint diff --git a/zitadel_client/auth/personal_access_token_authenticator.py b/zitadel_client/auth/personal_access_token_authenticator.py index 75b7be96..000c06d6 100644 --- a/zitadel_client/auth/personal_access_token_authenticator.py +++ b/zitadel_client/auth/personal_access_token_authenticator.py @@ -5,20 +5,20 @@ class PersonalAccessTokenAuthenticator(Authenticator): - """ - Personal Access Token Authenticator. + """ + Personal Access Token Authenticator. - Uses a static personal access token for API authentication. - """ + Uses a static personal access token for API authentication. + """ - def __init__(self, host: str, token: str): - super().__init__(URLUtil.build_hostname(host)) - self.token = token + def __init__(self, host: str, token: str): + super().__init__(URLUtil.build_hostname(host)) + self.token = token - def get_auth_headers(self) -> Dict[str, str]: - """ - Returns the authentication headers using the personal access token. + def get_auth_headers(self) -> Dict[str, str]: + """ + Returns the authentication headers using the personal access token. - :return: A dictionary containing the 'Authorization' header. - """ - return {"Authorization": "Bearer " + self.token} + :return: A dictionary containing the 'Authorization' header. + """ + return {"Authorization": "Bearer " + self.token} diff --git a/zitadel_client/auth/web_token_authenticator.py b/zitadel_client/auth/web_token_authenticator.py index c8f1db41..2f896782 100644 --- a/zitadel_client/auth/web_token_authenticator.py +++ b/zitadel_client/auth/web_token_authenticator.py @@ -1,171 +1,210 @@ import json from datetime import datetime, timedelta, timezone -from typing import Set, Dict, Optional +from typing import Dict, Optional, Set from authlib.integrations.requests_client import OAuth2Session -from authlib.jose import jwt, JoseError +from authlib.jose import JoseError, jwt -from zitadel_client.auth.oauth_authenticator import OAuthAuthenticator, OAuthAuthenticatorBuilder +from zitadel_client.auth.oauth_authenticator import ( + OAuthAuthenticator, + OAuthAuthenticatorBuilder, +) from zitadel_client.auth.open_id import OpenId class WebTokenAuthenticator(OAuthAuthenticator): - """ - OAuth authenticator implementing the JWT bearer flow. - - This implementation builds a JWT assertion dynamically in get_grant(). - """ - - def __init__(self, open_id: OpenId, auth_scopes: Set[str], - jwt_issuer: str, jwt_subject: str, jwt_audience: str, - private_key: str, jwt_lifetime: timedelta = timedelta(hours=1), jwt_algorithm: str = "RS256", - key_id: str | None = None): - """ - Constructs a JWTAuthenticator. - - :param open_id: The base URL for the OAuth provider. - :param auth_scopes: The scope(s) for the token request. - :param jwt_issuer: The JWT issuer. - :param jwt_subject: The JWT subject. - :param jwt_audience: The JWT audience. - :param private_key: The private key used to sign the JWT. - :param jwt_lifetime: Lifetime of the JWT in seconds. - :param jwt_algorithm: The JWT signing algorithm (default "RS256"). - """ - super().__init__(open_id, OAuth2Session(scope=" ".join(auth_scopes))) - self.jwt_issuer = jwt_issuer - self.jwt_subject = jwt_subject - self.jwt_audience = jwt_audience - self.private_key = private_key - self.jwt_lifetime = jwt_lifetime - self.jwt_algorithm = jwt_algorithm - self.key_id = key_id - - def get_grant(self) -> Dict[str, str]: - """ - Builds and returns the grant parameters for the JWT bearer flow. - - Dynamically generates a JWT assertion that includes time-sensitive claims. - - :return: A dictionary with the JWT bearer grant parameters. - :raises Exception: If JWT generation fails. - """ - now = datetime.now(timezone.utc) - try: - return { - "grant_type": "urn:ietf:params:oauth:grant-type:jwt-bearer", - "assertion": (jwt.encode({"alg": self.jwt_algorithm, "typ": "JWT", "kid": self.key_id, }, { - "iss": self.jwt_issuer, - "sub": self.jwt_subject, - "aud": self.jwt_audience, - "iat": int(now.timestamp()), - "exp": int((now + self.jwt_lifetime).timestamp()) - }, self.private_key)) - } - except JoseError as e: - raise Exception("Failed to generate JWT assertion: " + str(e)) from e - - @classmethod - def from_json(cls, host: str, json_path: str) -> "WebTokenAuthenticator": - """ - Create a WebTokenAuthenticatorBuilder instance from a JSON configuration file. - - Expected JSON format: - { - "type": "serviceaccount", - "keyId": "", - "key": "", - "userId": "" - } - - :param host: Base URL for the API endpoints. - :param json_path: File path to the JSON configuration file. - :return: A new instance of WebTokenAuthenticator. - :raises Exception: If the file cannot be read, the JSON is invalid, - or required keys are missing. - """ - try: - with open(json_path, "r") as file: - config = json.load(file) - except Exception as e: - raise Exception(f"Unable to read JSON file: {json_path}") from e - - user_id = config.get("userId") - private_key = config.get("key") - key_id = config.get("keyId") - if not user_id or not key_id or not private_key: - raise Exception("Missing required keys 'userId', 'key_id' or 'key' in JSON file.") - - return (WebTokenAuthenticator.builder(host, user_id, private_key)).key_identifier(key_id).build() - - @staticmethod - def builder(host: str, user_id: str, private_key: str) -> "WebTokenAuthenticatorBuilder": """ - Returns a builder for constructing a JWTAuthenticator. + OAuth authenticator implementing the JWT bearer flow. - :param host: The base URL for the OAuth provider. - :param user_id: The user identifier, used as both the issuer and subject. - :param private_key: The private key used to sign the JWT. - :return: A JWTAuthenticatorBuilder instance. + This implementation builds a JWT assertion dynamically in get_grant(). """ - return WebTokenAuthenticatorBuilder(host, user_id, user_id, host, private_key) - -class WebTokenAuthenticatorBuilder(OAuthAuthenticatorBuilder["WebTokenAuthenticatorBuilder"]): - """ - Builder for JWTAuthenticator. - - Provides a fluent API for configuring and constructing a JWTAuthenticator instance. - """ - - def __init__(self, host: str, jwt_issuer: str, jwt_subject: str, jwt_audience: str, private_key: str, key_id: Optional[str] = None): - """ - Initializes the JWTAuthenticatorBuilder with required parameters. - - :param host: The base URL for API endpoints. - :param jwt_issuer: The issuer claim for the JWT. - :param jwt_subject: The subject claim for the JWT. - :param jwt_audience: The audience claim for the JWT. - :param private_key: The PEM-formatted private key used for signing the JWT. + def __init__( + self, + open_id: OpenId, + auth_scopes: Set[str], + jwt_issuer: str, + jwt_subject: str, + jwt_audience: str, + private_key: str, + jwt_lifetime: timedelta = timedelta(hours=1), + jwt_algorithm: str = "RS256", + key_id: str | None = None, + ): + """ + Constructs a JWTAuthenticator. + + :param open_id: The base URL for the OAuth provider. + :param auth_scopes: The scope(s) for the token request. + :param jwt_issuer: The JWT issuer. + :param jwt_subject: The JWT subject. + :param jwt_audience: The JWT audience. + :param private_key: The private key used to sign the JWT. + :param jwt_lifetime: Lifetime of the JWT in seconds. + :param jwt_algorithm: The JWT signing algorithm (default "RS256"). + """ + super().__init__(open_id, OAuth2Session(scope=" ".join(auth_scopes))) + self.jwt_issuer = jwt_issuer + self.jwt_subject = jwt_subject + self.jwt_audience = jwt_audience + self.private_key = private_key + self.jwt_lifetime = jwt_lifetime + self.jwt_algorithm = jwt_algorithm + self.key_id = key_id + + def get_grant(self) -> Dict[str, str]: + """ + Builds and returns the grant parameters for the JWT bearer flow. + + Dynamically generates a JWT assertion that includes time-sensitive claims. + + :return: A dictionary with the JWT bearer grant parameters. + :raises Exception: If JWT generation fails. + """ + now = datetime.now(timezone.utc) + try: + return { + "grant_type": "urn:ietf:params:oauth:grant-type:jwt-bearer", + "assertion": ( + jwt.encode( + { + "alg": self.jwt_algorithm, + "typ": "JWT", + "kid": self.key_id, + }, + { + "iss": self.jwt_issuer, + "sub": self.jwt_subject, + "aud": self.jwt_audience, + "iat": int(now.timestamp()), + "exp": int((now + self.jwt_lifetime).timestamp()), + }, + self.private_key, + ) + ), + } + except JoseError as e: + raise Exception("Failed to generate JWT assertion: " + str(e)) from e + + @classmethod + def from_json(cls, host: str, json_path: str) -> "WebTokenAuthenticator": + """ + Create a WebTokenAuthenticatorBuilder instance from a JSON configuration file. + + Expected JSON format: + { + "type": "serviceaccount", + "keyId": "", + "key": "", + "userId": "" + } + + :param host: Base URL for the API endpoints. + :param json_path: File path to the JSON configuration file. + :return: A new instance of WebTokenAuthenticator. + :raises Exception: If the file cannot be read, the JSON is invalid, + or required keys are missing. + """ + try: + with open(json_path, "r") as file: + config = json.load(file) + except Exception as e: + raise Exception(f"Unable to read JSON file: {json_path}") from e + + user_id = config.get("userId") + private_key = config.get("key") + key_id = config.get("keyId") + if not user_id or not key_id or not private_key: + raise Exception( + "Missing required keys 'userId', 'key_id' or 'key' in JSON file." + ) + + return ( + (WebTokenAuthenticator.builder(host, user_id, private_key)) + .key_identifier(key_id) + .build() + ) + + @staticmethod + def builder( + host: str, user_id: str, private_key: str + ) -> "WebTokenAuthenticatorBuilder": + """ + Returns a builder for constructing a JWTAuthenticator. + + :param host: The base URL for the OAuth provider. + :param user_id: The user identifier, used as both the issuer and subject. + :param private_key: The private key used to sign the JWT. + :return: A JWTAuthenticatorBuilder instance. + """ + return WebTokenAuthenticatorBuilder(host, user_id, user_id, host, private_key) + + +class WebTokenAuthenticatorBuilder( + OAuthAuthenticatorBuilder["WebTokenAuthenticatorBuilder"] +): """ - super().__init__(host) - self.jwt_issuer = jwt_issuer - self.jwt_subject = jwt_subject - self.jwt_audience = jwt_audience - self.private_key = private_key - self.jwt_lifetime = timedelta(hours=1) - self.key_id = key_id - - def token_lifetime_seconds(self, seconds: int) -> "WebTokenAuthenticatorBuilder": - """ - Sets the JWT token lifetime in seconds. - - :param seconds: Lifetime of the JWT in seconds. - :return: The builder instance. - """ - self.jwt_lifetime = timedelta(seconds=seconds) - return self + Builder for JWTAuthenticator. - def build(self) -> WebTokenAuthenticator: + Provides a fluent API for configuring and constructing a JWTAuthenticator instance. """ - Builds and returns a new JWTAuthenticator instance using the configured parameters. - This method inlines the JWT assertion generation logic and passes all required - configuration to the JWTAuthenticator constructor. - - :return: A new JWTAuthenticator instance. - """ - return WebTokenAuthenticator( - open_id=self.open_id, - auth_scopes=self.auth_scopes, - jwt_issuer=self.jwt_issuer, - jwt_subject=self.jwt_subject, - jwt_audience=self.jwt_audience, - private_key=self.private_key, - jwt_lifetime=self.jwt_lifetime, - key_id=self.key_id - ) - - def key_identifier(self, key_id: str | None) -> "WebTokenAuthenticatorBuilder": - self.key_id = key_id - return self + def __init__( + self, + host: str, + jwt_issuer: str, + jwt_subject: str, + jwt_audience: str, + private_key: str, + key_id: Optional[str] = None, + ): + """ + Initializes the JWTAuthenticatorBuilder with required parameters. + + :param host: The base URL for API endpoints. + :param jwt_issuer: The issuer claim for the JWT. + :param jwt_subject: The subject claim for the JWT. + :param jwt_audience: The audience claim for the JWT. + :param private_key: The PEM-formatted private key used for signing the JWT. + """ + super().__init__(host) + self.jwt_issuer = jwt_issuer + self.jwt_subject = jwt_subject + self.jwt_audience = jwt_audience + self.private_key = private_key + self.jwt_lifetime = timedelta(hours=1) + self.key_id = key_id + + def token_lifetime_seconds(self, seconds: int) -> "WebTokenAuthenticatorBuilder": + """ + Sets the JWT token lifetime in seconds. + + :param seconds: Lifetime of the JWT in seconds. + :return: The builder instance. + """ + self.jwt_lifetime = timedelta(seconds=seconds) + return self + + def build(self) -> WebTokenAuthenticator: + """ + Builds and returns a new JWTAuthenticator instance using the configured parameters. + + This method inlines the JWT assertion generation logic and passes all required + configuration to the JWTAuthenticator constructor. + + :return: A new JWTAuthenticator instance. + """ + return WebTokenAuthenticator( + open_id=self.open_id, + auth_scopes=self.auth_scopes, + jwt_issuer=self.jwt_issuer, + jwt_subject=self.jwt_subject, + jwt_audience=self.jwt_audience, + private_key=self.private_key, + jwt_lifetime=self.jwt_lifetime, + key_id=self.key_id, + ) + + def key_identifier(self, key_id: str | None) -> "WebTokenAuthenticatorBuilder": + self.key_id = key_id + return self diff --git a/zitadel_client/configuration.py b/zitadel_client/configuration.py index 76197c63..94200594 100644 --- a/zitadel_client/configuration.py +++ b/zitadel_client/configuration.py @@ -12,195 +12,198 @@ from zitadel_client.auth.authenticator import Authenticator from zitadel_client.version import Version + class Configuration: - """This class contains various settings of the API client. - """ - USER_AGENT = f"zitadel-client/{Version.VERSION} (lang=python; lang_version={platform.python_version()}; os={platform.system()}; arch={platform.machine()})".lower() - - def __init__( - self, - authenticator: Authenticator, - ssl_ca_cert: Optional[str] = None, - retries: Optional[int] = None, - ca_cert_data: Optional[Union[str, bytes]] = None, - *, - debug: Optional[bool] = None, - ) -> None: - """Constructor - """ - self._user_agent = Configuration.USER_AGENT - self.authenticator = authenticator - self.refresh_api_key_hook = None - self.logger = {"package_logger": logging.getLogger("zitadel_client"), - "urllib3_logger": logging.getLogger("urllib3")} - self.logger_format = '%(asctime)s %(levelname)s %(message)s' - self.logger_stream_handler = None - self.logger_file_handler: Optional[FileHandler] = None - self.logger_file = None - if debug is not None: - self.debug = debug - else: - self.__debug = False - self.verify_ssl = True - self.ssl_ca_cert = ssl_ca_cert - self.ca_cert_data = ca_cert_data - self.cert_file = None - self.key_file = None - self.assert_hostname = None - self.tls_server_name = None - - self.connection_pool_maxsize = multiprocessing.cpu_count() * 5 - """urllib3 connection pool's maximum number of connections saved + """This class contains various settings of the API client.""" + + USER_AGENT = f"zitadel-client/{Version.VERSION} (lang=python; lang_version={platform.python_version()}; os={platform.system()}; arch={platform.machine()})".lower() + + def __init__( + self, + authenticator: Authenticator, + ssl_ca_cert: Optional[str] = None, + retries: Optional[int] = None, + ca_cert_data: Optional[Union[str, bytes]] = None, + *, + debug: Optional[bool] = None, + ) -> None: + """Constructor""" + self._user_agent = Configuration.USER_AGENT + self.authenticator = authenticator + self.refresh_api_key_hook = None + self.logger = { + "package_logger": logging.getLogger("zitadel_client"), + "urllib3_logger": logging.getLogger("urllib3"), + } + self.logger_format = "%(asctime)s %(levelname)s %(message)s" + self.logger_stream_handler = None + self.logger_file_handler: Optional[FileHandler] = None + self.logger_file = None + if debug is not None: + self.debug = debug + else: + self.__debug = False + self.verify_ssl = True + self.ssl_ca_cert = ssl_ca_cert + self.ca_cert_data = ca_cert_data + self.cert_file = None + self.key_file = None + self.assert_hostname = None + self.tls_server_name = None + + self.connection_pool_maxsize = multiprocessing.cpu_count() * 5 + """urllib3 connection pool's maximum number of connections saved per pool. urllib3 uses 1 connection as default value, but this is not the best value when you are making a lot of possibly parallel requests to the same host, which is often the case here. cpu_count * 5 is used as default value to increase performance. """ - self.safe_chars_for_path_param = '' - self.retries = retries - # Enable client side validation - self.client_side_validation = True - self.socket_options = None - self.datetime_format = "%Y-%m-%dT%H:%M:%S.%f%z" - self.date_format = "%Y-%m-%d" - - def __deepcopy__(self, memo: Dict[int, Any]) -> Self: - cls = self.__class__ - result = cls.__new__(cls) - memo[id(self)] = result - for k, v in self.__dict__.items(): - if k not in ('logger', 'logger_file_handler'): - setattr(result, k, copy.deepcopy(v, memo)) - # shallow copy of loggers - result.logger = copy.copy(self.logger) - # use setters to configure loggers - result.logger_file = self.logger_file - result.debug = self.debug - return result - - def __setattr__(self, name: str, value: Any) -> None: - object.__setattr__(self, name, value) - - @property - def logger_file(self) -> Optional[str]: - """The logger file. - - If the logger_file is None, then add stream handler and remove file - handler. Otherwise, add file handler and remove stream handler. - - :param value: The logger_file path. - :type: str - """ - return self.__logger_file - - @logger_file.setter - def logger_file(self, value: Optional[str]) -> None: - """The logger file. - - If the logger_file is None, then add stream handler and remove file - handler. Otherwise, add file handler and remove stream handler. - - :param value: The logger_file path. - :type: str - """ - self.__logger_file = value - if self.__logger_file: - # If set logging file, - # then add file handler and remove stream handler. - self.logger_file_handler = logging.FileHandler(self.__logger_file) - self.logger_file_handler.setFormatter(self.logger_formatter) - for _, logger in self.logger.items(): - logger.addHandler(self.logger_file_handler) - - @property - def debug(self) -> bool: - """Debug status - - :param value: The debug status, True or False. - :type: bool - """ - return self.__debug - - @debug.setter - def debug(self, value: bool) -> None: - """Debug status - - :param value: The debug status, True or False. - :type: bool - """ - self.__debug = value - if self.__debug: - # if debug status is True, turn on debug logging - for _, logger in self.logger.items(): - logger.setLevel(logging.DEBUG) - # turn on httplib debug - httplib.HTTPConnection.debuglevel = 1 - else: - # if debug status is False, turn off debug logging, - # setting log level to default `logging.WARNING` - for _, logger in self.logger.items(): - logger.setLevel(logging.WARNING) - # turn off httplib debug - httplib.HTTPConnection.debuglevel = 0 - - @property - def logger_format(self) -> str: - """The logger format. - - The logger_formatter will be updated when sets logger_format. - - :param value: The format string. - :type: str - """ - return self.__logger_format - - @logger_format.setter - def logger_format(self, value: str) -> None: - """The logger format. - - The logger_formatter will be updated when sets logger_format. - - :param value: The format string. - :type: str - """ - self.__logger_format = value - self.logger_formatter = logging.Formatter(self.__logger_format) - - @staticmethod - def to_debug_report() -> str: - """Gets the essential information for debugging. - - :return: The report for debugging. - """ - return "Python SDK Debug Report:\n" \ - "OS: {env}\n" \ - "Python Version: {pyversion}\n" \ - "Version of the API: 1.0.0\n" \ - "SDK Package Version: 0.0.1". \ - format(env=sys.platform, pyversion=sys.version) - - @property - def host(self) -> str: - """Return generated host.""" - return self.authenticator.get_host() - - @property - def user_agent(self) -> str: - """ - Get the user agent string. - - Returns: - str: The current value of the user agent. - """ - return self._user_agent - - @user_agent.setter - def user_agent(self, value: str) -> None: - """ - Set the user agent string. - - Args: - value (str): The new user agent string to set. - """ - self._user_agent = value + self.safe_chars_for_path_param = "" + self.retries = retries + # Enable client side validation + self.client_side_validation = True + self.socket_options = None + self.datetime_format = "%Y-%m-%dT%H:%M:%S.%f%z" + self.date_format = "%Y-%m-%d" + + def __deepcopy__(self, memo: Dict[int, Any]) -> Self: + cls = self.__class__ + result = cls.__new__(cls) + memo[id(self)] = result + for k, v in self.__dict__.items(): + if k not in ("logger", "logger_file_handler"): + setattr(result, k, copy.deepcopy(v, memo)) + # shallow copy of loggers + result.logger = copy.copy(self.logger) + # use setters to configure loggers + result.logger_file = self.logger_file + result.debug = self.debug + return result + + def __setattr__(self, name: str, value: Any) -> None: + object.__setattr__(self, name, value) + + @property + def logger_file(self) -> Optional[str]: + """The logger file. + + If the logger_file is None, then add stream handler and remove file + handler. Otherwise, add file handler and remove stream handler. + + :param value: The logger_file path. + :type: str + """ + return self.__logger_file + + @logger_file.setter + def logger_file(self, value: Optional[str]) -> None: + """The logger file. + + If the logger_file is None, then add stream handler and remove file + handler. Otherwise, add file handler and remove stream handler. + + :param value: The logger_file path. + :type: str + """ + self.__logger_file = value + if self.__logger_file: + # If set logging file, + # then add file handler and remove stream handler. + self.logger_file_handler = logging.FileHandler(self.__logger_file) + self.logger_file_handler.setFormatter(self.logger_formatter) + for _, logger in self.logger.items(): + logger.addHandler(self.logger_file_handler) + + @property + def debug(self) -> bool: + """Debug status + + :param value: The debug status, True or False. + :type: bool + """ + return self.__debug + + @debug.setter + def debug(self, value: bool) -> None: + """Debug status + + :param value: The debug status, True or False. + :type: bool + """ + self.__debug = value + if self.__debug: + # if debug status is True, turn on debug logging + for _, logger in self.logger.items(): + logger.setLevel(logging.DEBUG) + # turn on httplib debug + httplib.HTTPConnection.debuglevel = 1 + else: + # if debug status is False, turn off debug logging, + # setting log level to default `logging.WARNING` + for _, logger in self.logger.items(): + logger.setLevel(logging.WARNING) + # turn off httplib debug + httplib.HTTPConnection.debuglevel = 0 + + @property + def logger_format(self) -> str: + """The logger format. + + The logger_formatter will be updated when sets logger_format. + + :param value: The format string. + :type: str + """ + return self.__logger_format + + @logger_format.setter + def logger_format(self, value: str) -> None: + """The logger format. + + The logger_formatter will be updated when sets logger_format. + + :param value: The format string. + :type: str + """ + self.__logger_format = value + self.logger_formatter = logging.Formatter(self.__logger_format) + + @staticmethod + def to_debug_report() -> str: + """Gets the essential information for debugging. + + :return: The report for debugging. + """ + return ( + "Python SDK Debug Report:\n" + "OS: {env}\n" + "Python Version: {pyversion}\n" + "Version of the API: 1.0.0\n" + "SDK Package Version: 0.0.1".format(env=sys.platform, pyversion=sys.version) + ) + + @property + def host(self) -> str: + """Return generated host.""" + return self.authenticator.get_host() + + @property + def user_agent(self) -> str: + """ + Get the user agent string. + + Returns: + str: The current value of the user agent. + """ + return self._user_agent + + @user_agent.setter + def user_agent(self, value: str) -> None: + """ + Set the user agent string. + + Args: + value (str): The new user agent string to set. + """ + self._user_agent = value diff --git a/zitadel_client/exceptions.py b/zitadel_client/exceptions.py index e343db70..68b6babe 100644 --- a/zitadel_client/exceptions.py +++ b/zitadel_client/exceptions.py @@ -1,4 +1,4 @@ -from typing import Any, Optional, List +from typing import Any, List, Optional from typing_extensions import Self @@ -6,201 +6,208 @@ class OpenApiException(Exception): - """The base exception class for all OpenAPIExceptions""" + """The base exception class for all OpenAPIExceptions""" class ApiTypeError(OpenApiException, TypeError): - def __init__(self, msg: str, path_to_item: Optional[List[str]]=None, valid_classes: Optional[Any]=None, key_type: Optional[bool]=None) -> None: - """ Raises an exception for TypeErrors - - Args: - msg (str): the exception message - - Keyword Args: - path_to_item (list): a list of keys an indices to get to the - current_item + def __init__( + self, + msg: str, + path_to_item: Optional[List[str]] = None, + valid_classes: Optional[Any] = None, + key_type: Optional[bool] = None, + ) -> None: + """Raises an exception for TypeErrors + + Args: + msg (str): the exception message + + Keyword Args: + path_to_item (list): a list of keys an indices to get to the + current_item + None if unset + valid_classes (tuple): the primitive classes that current item + should be an instance of + None if unset + key_type (bool): False if our value is a value in a dict + True if it is a key in a dict + False if our item is an item in a list None if unset - valid_classes (tuple): the primitive classes that current item - should be an instance of - None if unset - key_type (bool): False if our value is a value in a dict - True if it is a key in a dict - False if our item is an item in a list - None if unset - """ - self.path_to_item = path_to_item - self.valid_classes = valid_classes - self.key_type = key_type - full_msg = msg - if path_to_item: - full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) - super(ApiTypeError, self).__init__(full_msg) + """ + self.path_to_item = path_to_item + self.valid_classes = valid_classes + self.key_type = key_type + full_msg = msg + if path_to_item: + full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) + super(ApiTypeError, self).__init__(full_msg) class ApiValueError(OpenApiException, ValueError): - def __init__(self, msg: str, path_to_item: Optional[List[str]] =None) -> None: - """ - Args: - msg (str): the exception message + def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: + """ + Args: + msg (str): the exception message - Keyword Args: - path_to_item (list) the path to the exception in the - received_data dict. None if unset - """ + Keyword Args: + path_to_item (list) the path to the exception in the + received_data dict. None if unset + """ - self.path_to_item = path_to_item - full_msg = msg - if path_to_item: - full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) - super(ApiValueError, self).__init__(full_msg) + self.path_to_item = path_to_item + full_msg = msg + if path_to_item: + full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) + super(ApiValueError, self).__init__(full_msg) class ApiAttributeError(OpenApiException, AttributeError): - def __init__(self, msg: str, path_to_item: Optional[List[str]]=None) -> None: - """ - Raised when an attribute reference or assignment fails. + def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: + """ + Raised when an attribute reference or assignment fails. - Args: - msg (str): the exception message + Args: + msg (str): the exception message - Keyword Args: - path_to_item (None/list) the path to the exception in the - received_data dict - """ - self.path_to_item = path_to_item - full_msg = msg - if path_to_item: - full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) - super(ApiAttributeError, self).__init__(full_msg) + Keyword Args: + path_to_item (None/list) the path to the exception in the + received_data dict + """ + self.path_to_item = path_to_item + full_msg = msg + if path_to_item: + full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) + super(ApiAttributeError, self).__init__(full_msg) class ApiKeyError(OpenApiException, KeyError): - def __init__(self, msg: str, path_to_item: Optional[List[str]]=None) -> None: - """ - Args: - msg (str): the exception message - - Keyword Args: - path_to_item (None/list) the path to the exception in the - received_data dict - """ - self.path_to_item = path_to_item - full_msg = msg - if path_to_item: - full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) - super(ApiKeyError, self).__init__(full_msg) + def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: + """ + Args: + msg (str): the exception message + + Keyword Args: + path_to_item (None/list) the path to the exception in the + received_data dict + """ + self.path_to_item = path_to_item + full_msg = msg + if path_to_item: + full_msg = "{0} at {1}".format(msg, render_path(path_to_item)) + super(ApiKeyError, self).__init__(full_msg) class ApiException(OpenApiException): - - def __init__( - self, - status: Optional[int]=None, - reason: Optional[str]=None, - http_resp: Optional[zitadel_client.rest_response.RESTResponse]=None, - *, - body: Optional[str] = None, - data: Optional[Any] = None, - ) -> None: - self.status = status - self.reason = reason - self.body = body - self.data = data - self.headers = None - - if http_resp: - if self.status is None: - self.status = http_resp.status - if self.reason is None: - self.reason = http_resp.reason - if self.body is None and http_resp.data is not None: - try: - self.body = http_resp.data.decode('utf-8') - except Exception: - pass - self.headers = http_resp.getheaders() - - @classmethod - def from_response( - cls, - *, - http_resp: zitadel_client.rest_response.RESTResponse, - body: Optional[str], - data: Optional[Any], - ) -> Self: - if http_resp.status == 400: - raise BadRequestException(http_resp=http_resp, body=body, data=data) - - if http_resp.status == 401: - raise UnauthorizedException(http_resp=http_resp, body=body, data=data) - - if http_resp.status == 403: - raise ForbiddenException(http_resp=http_resp, body=body, data=data) - - if http_resp.status == 404: - raise NotFoundException(http_resp=http_resp, body=body, data=data) - - # Added new conditions for 409 and 422 - if http_resp.status == 409: - raise ConflictException(http_resp=http_resp, body=body, data=data) - - if http_resp.status == 422: - raise UnprocessableEntityException(http_resp=http_resp, body=body, data=data) - - if 500 <= http_resp.status <= 599: - raise ServiceException(http_resp=http_resp, body=body, data=data) - raise ApiException(http_resp=http_resp, body=body, data=data) - - def __str__(self) -> str: - """Custom error messages for exception""" - error_message = "({0})\n" \ - "Reason: {1}\n".format(self.status, self.reason) - if self.headers: - error_message += "HTTP response headers: {0}\n".format( - self.headers) - - if self.data or self.body: - error_message += "HTTP response body: {0}\n".format(self.data or self.body) - - return error_message + def __init__( + self, + status: Optional[int] = None, + reason: Optional[str] = None, + http_resp: Optional[zitadel_client.rest_response.RESTResponse] = None, + *, + body: Optional[str] = None, + data: Optional[Any] = None, + ) -> None: + self.status = status + self.reason = reason + self.body = body + self.data = data + self.headers = None + + if http_resp: + if self.status is None: + self.status = http_resp.status + if self.reason is None: + self.reason = http_resp.reason + if self.body is None and http_resp.data is not None: + try: + self.body = http_resp.data.decode("utf-8") + except Exception: + pass + self.headers = http_resp.getheaders() + + @classmethod + def from_response( + cls, + *, + http_resp: zitadel_client.rest_response.RESTResponse, + body: Optional[str], + data: Optional[Any], + ) -> Self: + if http_resp.status == 400: + raise BadRequestException(http_resp=http_resp, body=body, data=data) + + if http_resp.status == 401: + raise UnauthorizedException(http_resp=http_resp, body=body, data=data) + + if http_resp.status == 403: + raise ForbiddenException(http_resp=http_resp, body=body, data=data) + + if http_resp.status == 404: + raise NotFoundException(http_resp=http_resp, body=body, data=data) + + # Added new conditions for 409 and 422 + if http_resp.status == 409: + raise ConflictException(http_resp=http_resp, body=body, data=data) + + if http_resp.status == 422: + raise UnprocessableEntityException( + http_resp=http_resp, body=body, data=data + ) + + if 500 <= http_resp.status <= 599: + raise ServiceException(http_resp=http_resp, body=body, data=data) + raise ApiException(http_resp=http_resp, body=body, data=data) + + def __str__(self) -> str: + """Custom error messages for exception""" + error_message = "({0})\nReason: {1}\n".format(self.status, self.reason) + if self.headers: + error_message += "HTTP response headers: {0}\n".format(self.headers) + + if self.data or self.body: + error_message += "HTTP response body: {0}\n".format(self.data or self.body) + + return error_message class BadRequestException(ApiException): - pass + pass class NotFoundException(ApiException): - pass + pass class UnauthorizedException(ApiException): - pass + pass class ForbiddenException(ApiException): - pass + pass class ServiceException(ApiException): - pass + pass class ConflictException(ApiException): - """Exception for HTTP 409 Conflict.""" - pass + """Exception for HTTP 409 Conflict.""" + + pass class UnprocessableEntityException(ApiException): - """Exception for HTTP 422 Unprocessable Entity.""" - pass + """Exception for HTTP 422 Unprocessable Entity.""" + + pass def render_path(path_to_item: List[str]) -> str: - """Returns a string representation of a path""" - result = "" - for pth in path_to_item: - if isinstance(pth, int): - result += "[{0}]".format(pth) - else: - result += "['{0}']".format(pth) - return result + """Returns a string representation of a path""" + result = "" + for pth in path_to_item: + if isinstance(pth, int): + result += "[{0}]".format(pth) + else: + result += "['{0}']".format(pth) + return result diff --git a/zitadel_client/models/add_organization_request_admin.py b/zitadel_client/models/add_organization_request_admin.py index cdad6dc8..39060b2d 100644 --- a/zitadel_client/models/add_organization_request_admin.py +++ b/zitadel_client/models/add_organization_request_admin.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_add_human_user_request import V2AddHumanUserRequest -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_add_human_user_request import V2AddHumanUserRequest + + class AddOrganizationRequestAdmin(BaseModel): """ AddOrganizationRequestAdmin @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of human if self.human: - _dict['human'] = self.human.to_dict() + _dict["human"] = self.human.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/add_organization_response_created_admin.py b/zitadel_client/models/add_organization_response_created_admin.py index c1e40266..fe5a77ae 100644 --- a/zitadel_client/models/add_organization_response_created_admin.py +++ b/zitadel_client/models/add_organization_response_created_admin.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class AddOrganizationResponseCreatedAdmin(BaseModel): """ AddOrganizationResponseCreatedAdmin diff --git a/zitadel_client/models/objectv2_list_details.py b/zitadel_client/models/objectv2_list_details.py index e8ec2b1f..b50c68ca 100644 --- a/zitadel_client/models/objectv2_list_details.py +++ b/zitadel_client/models/objectv2_list_details.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class Objectv2ListDetails(BaseModel): """ Objectv2ListDetails diff --git a/zitadel_client/models/objectv2_list_query.py b/zitadel_client/models/objectv2_list_query.py index 2948b7a8..d637a344 100644 --- a/zitadel_client/models/objectv2_list_query.py +++ b/zitadel_client/models/objectv2_list_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class Objectv2ListQuery(BaseModel): """ Object unspecific list filters like offset, limit and asc/desc. diff --git a/zitadel_client/models/oidc_service_create_callback_body.py b/zitadel_client/models/oidc_service_create_callback_body.py index b4d5c512..44482e8d 100644 --- a/zitadel_client/models/oidc_service_create_callback_body.py +++ b/zitadel_client/models/oidc_service_create_callback_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_authorization_error import V2AuthorizationError from zitadel_client.models.v2_session import V2Session -from typing import Optional, Set -from typing_extensions import Self + class OIDCServiceCreateCallbackBody(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of session if self.session: - _dict['session'] = self.session.to_dict() + _dict["session"] = self.session.to_dict() # override the default output from pydantic by calling `to_dict()` of error if self.error: - _dict['error'] = self.error.to_dict() + _dict["error"] = self.error.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/otp_email_send_code.py b/zitadel_client/models/otp_email_send_code.py index 220b4ad2..7b2dafe7 100644 --- a/zitadel_client/models/otp_email_send_code.py +++ b/zitadel_client/models/otp_email_send_code.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class OTPEmailSendCode(BaseModel): """ diff --git a/zitadel_client/models/protobuf_any.py b/zitadel_client/models/protobuf_any.py index e902c3ba..844800ad 100644 --- a/zitadel_client/models/protobuf_any.py +++ b/zitadel_client/models/protobuf_any.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class ProtobufAny(BaseModel): """ ProtobufAny diff --git a/zitadel_client/models/request_challenges_otp_email.py b/zitadel_client/models/request_challenges_otp_email.py index 37aa6718..beb17b99 100644 --- a/zitadel_client/models/request_challenges_otp_email.py +++ b/zitadel_client/models/request_challenges_otp_email.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.otp_email_send_code import OTPEmailSendCode -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.otp_email_send_code import OTPEmailSendCode + + class RequestChallengesOTPEmail(BaseModel): """ RequestChallengesOTPEmail @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/request_challenges_otpsms.py b/zitadel_client/models/request_challenges_otpsms.py index 664b2f36..636eeb76 100644 --- a/zitadel_client/models/request_challenges_otpsms.py +++ b/zitadel_client/models/request_challenges_otpsms.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class RequestChallengesOTPSMS(BaseModel): """ RequestChallengesOTPSMS diff --git a/zitadel_client/models/rpc_status.py b/zitadel_client/models/rpc_status.py index de4a3dc3..52416df5 100644 --- a/zitadel_client/models/rpc_status.py +++ b/zitadel_client/models/rpc_status.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictInt, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.protobuf_any import ProtobufAny -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.protobuf_any import ProtobufAny + + class RpcStatus(BaseModel): """ RpcStatus @@ -80,7 +82,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_details in self.details: if _item_details: _items.append(_item_details.to_dict()) - _dict['details'] = _items + _dict["details"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/session_service_delete_session_body.py b/zitadel_client/models/session_service_delete_session_body.py index 148272fe..857b9190 100644 --- a/zitadel_client/models/session_service_delete_session_body.py +++ b/zitadel_client/models/session_service_delete_session_body.py @@ -13,20 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class SessionServiceDeleteSessionBody(BaseModel): """ SessionServiceDeleteSessionBody """ # noqa: E501 - session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, previously returned on the create / update request. The token is required unless the authenticated user terminates the own session or is granted the `session.delete` permission.\"", alias="sessionToken") + session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, previously returned on the create / update request. The token is required unless the authenticated user terminates the own session or is granted the `session.delete` permission."', alias="sessionToken") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["sessionToken"] diff --git a/zitadel_client/models/session_service_set_session_body.py b/zitadel_client/models/session_service_set_session_body.py index 2b809506..be384929 100644 --- a/zitadel_client/models/session_service_set_session_body.py +++ b/zitadel_client/models/session_service_set_session_body.py @@ -13,27 +13,28 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union + +from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing_extensions import Annotated, Self -from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated from zitadel_client.models.v2_checks import V2Checks from zitadel_client.models.v2_request_challenges import V2RequestChallenges -from typing import Optional, Set -from typing_extensions import Self + class SessionServiceSetSessionBody(BaseModel): """ SessionServiceSetSessionBody """ # noqa: E501 - session_token: Optional[Annotated[str, Field(min_length=1, strict=True, max_length=200)]] = Field(default=None, description="\"DEPRECATED: this field is ignored.\"", alias="sessionToken") + session_token: Optional[Annotated[str, Field(min_length=1, strict=True, max_length=200)]] = Field(default=None, description='"DEPRECATED: this field is ignored."', alias="sessionToken") checks: Optional[V2Checks] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list to be stored on the session\"") + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list to be stored on the session"') challenges: Optional[V2RequestChallenges] = None - lifetime: Optional[StrictStr] = Field(default=None, description="\"duration (in seconds) after which the session will be automatically invalidated\"") + lifetime: Optional[StrictStr] = Field(default=None, description='"duration (in seconds) after which the session will be automatically invalidated"') additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["sessionToken", "checks", "metadata", "challenges", "lifetime"] @@ -80,10 +81,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of checks if self.checks: - _dict['checks'] = self.checks.to_dict() + _dict["checks"] = self.checks.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict['challenges'] = self.challenges.to_dict() + _dict["challenges"] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_agent_header_values.py b/zitadel_client/models/user_agent_header_values.py index 60badd37..8a68dfe9 100644 --- a/zitadel_client/models/user_agent_header_values.py +++ b/zitadel_client/models/user_agent_header_values.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class UserAgentHeaderValues(BaseModel): """ A header may have multiple values. In Go, headers are defined as map[string][]string, but protobuf doesn't allow this scheme. diff --git a/zitadel_client/models/user_service_add_idp_link_body.py b/zitadel_client/models/user_service_add_idp_link_body.py index f3986236..759798fd 100644 --- a/zitadel_client/models/user_service_add_idp_link_body.py +++ b/zitadel_client/models/user_service_add_idp_link_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_idp_link import V2IDPLink -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_idp_link import V2IDPLink + + class UserServiceAddIDPLinkBody(BaseModel): """ UserServiceAddIDPLinkBody @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of idp_link if self.idp_link: - _dict['idpLink'] = self.idp_link.to_dict() + _dict["idpLink"] = self.idp_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_create_invite_code_body.py b/zitadel_client/models/user_service_create_invite_code_body.py index ced49144..4ed3d194 100644 --- a/zitadel_client/models/user_service_create_invite_code_body.py +++ b/zitadel_client/models/user_service_create_invite_code_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_send_invite_code import V2SendInviteCode -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_send_invite_code import V2SendInviteCode + + class UserServiceCreateInviteCodeBody(BaseModel): """ UserServiceCreateInviteCodeBody @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_create_passkey_registration_link_body.py b/zitadel_client/models/user_service_create_passkey_registration_link_body.py index 774e3307..bc206b3e 100644 --- a/zitadel_client/models/user_service_create_passkey_registration_link_body.py +++ b/zitadel_client/models/user_service_create_passkey_registration_link_body.py @@ -13,16 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_send_passkey_registration_link import V2SendPasskeyRegistrationLink -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_send_passkey_registration_link import ( + V2SendPasskeyRegistrationLink, +) + + class UserServiceCreatePasskeyRegistrationLinkBody(BaseModel): """ UserServiceCreatePasskeyRegistrationLinkBody @@ -75,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_link if self.send_link: - _dict['sendLink'] = self.send_link.to_dict() + _dict["sendLink"] = self.send_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_list_idp_links_body.py b/zitadel_client/models/user_service_list_idp_links_body.py index 8cebd7ea..8b011301 100644 --- a/zitadel_client/models/user_service_list_idp_links_body.py +++ b/zitadel_client/models/user_service_list_idp_links_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_list_query import V2ListQuery -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_list_query import V2ListQuery + + class UserServiceListIDPLinksBody(BaseModel): """ UserServiceListIDPLinksBody @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict['query'] = self.query.to_dict() + _dict["query"] = self.query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_password_reset_body.py b/zitadel_client/models/user_service_password_reset_body.py index 9084ff35..e54fb199 100644 --- a/zitadel_client/models/user_service_password_reset_body.py +++ b/zitadel_client/models/user_service_password_reset_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_send_password_reset_link import V2SendPasswordResetLink -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_send_password_reset_link import V2SendPasswordResetLink + + class UserServicePasswordResetBody(BaseModel): """ UserServicePasswordResetBody @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_link if self.send_link: - _dict['sendLink'] = self.send_link.to_dict() + _dict["sendLink"] = self.send_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_register_passkey_body.py b/zitadel_client/models/user_service_register_passkey_body.py index 84c01b7f..e53619ae 100644 --- a/zitadel_client/models/user_service_register_passkey_body.py +++ b/zitadel_client/models/user_service_register_passkey_body.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_passkey_authenticator import V2PasskeyAuthenticator from zitadel_client.models.v2_passkey_registration_code import V2PasskeyRegistrationCode -from typing import Optional, Set -from typing_extensions import Self + class UserServiceRegisterPasskeyBody(BaseModel): """ @@ -30,7 +32,7 @@ class UserServiceRegisterPasskeyBody(BaseModel): """ # noqa: E501 code: Optional[V2PasskeyRegistrationCode] = None authenticator: Optional[V2PasskeyAuthenticator] = V2PasskeyAuthenticator.PASSKEY_AUTHENTICATOR_UNSPECIFIED - domain: Optional[StrictStr] = Field(default=None, description="\"Domain on which the user is authenticated.\"") + domain: Optional[StrictStr] = Field(default=None, description='"Domain on which the user is authenticated."') additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["code", "authenticator", "domain"] @@ -77,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of code if self.code: - _dict['code'] = self.code.to_dict() + _dict["code"] = self.code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_register_u2_f_body.py b/zitadel_client/models/user_service_register_u2_f_body.py index f37edf8f..caab5532 100644 --- a/zitadel_client/models/user_service_register_u2_f_body.py +++ b/zitadel_client/models/user_service_register_u2_f_body.py @@ -13,20 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class UserServiceRegisterU2FBody(BaseModel): """ UserServiceRegisterU2FBody """ # noqa: E501 - domain: Optional[StrictStr] = Field(default=None, description="\"Domain on which the user is authenticated.\"") + domain: Optional[StrictStr] = Field(default=None, description='"Domain on which the user is authenticated."') additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["domain"] diff --git a/zitadel_client/models/user_service_resend_email_code_body.py b/zitadel_client/models/user_service_resend_email_code_body.py index bd265b7c..b208bb2b 100644 --- a/zitadel_client/models/user_service_resend_email_code_body.py +++ b/zitadel_client/models/user_service_resend_email_code_body.py @@ -13,16 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_send_email_verification_code import ( + V2SendEmailVerificationCode, +) + + class UserServiceResendEmailCodeBody(BaseModel): """ UserServiceResendEmailCodeBody @@ -75,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_resend_phone_code_body.py b/zitadel_client/models/user_service_resend_phone_code_body.py index 5b3d7360..87ef1f71 100644 --- a/zitadel_client/models/user_service_resend_phone_code_body.py +++ b/zitadel_client/models/user_service_resend_phone_code_body.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class UserServiceResendPhoneCodeBody(BaseModel): """ UserServiceResendPhoneCodeBody diff --git a/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py b/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py index 87d663e1..695f9e1e 100644 --- a/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py +++ b/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceRetrieveIdentityProviderIntentBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_send_email_code_body.py b/zitadel_client/models/user_service_send_email_code_body.py index f5821634..5aacd431 100644 --- a/zitadel_client/models/user_service_send_email_code_body.py +++ b/zitadel_client/models/user_service_send_email_code_body.py @@ -13,16 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_send_email_verification_code import ( + V2SendEmailVerificationCode, +) + + class UserServiceSendEmailCodeBody(BaseModel): """ UserServiceSendEmailCodeBody @@ -75,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_set_email_body.py b/zitadel_client/models/user_service_set_email_body.py index 5789a0ba..a86c75d5 100644 --- a/zitadel_client/models/user_service_set_email_body.py +++ b/zitadel_client/models/user_service_set_email_body.py @@ -13,16 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + +from zitadel_client.models.v2_send_email_verification_code import ( + V2SendEmailVerificationCode, +) + class UserServiceSetEmailBody(BaseModel): """ @@ -78,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_set_phone_body.py b/zitadel_client/models/user_service_set_phone_body.py index 160bf53d..442ae575 100644 --- a/zitadel_client/models/user_service_set_phone_body.py +++ b/zitadel_client/models/user_service_set_phone_body.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceSetPhoneBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_update_human_user_body.py b/zitadel_client/models/user_service_update_human_user_body.py index 54f2bacb..8f57daea 100644 --- a/zitadel_client/models/user_service_update_human_user_body.py +++ b/zitadel_client/models/user_service_update_human_user_body.py @@ -13,19 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.userv2_set_password import Userv2SetPassword from zitadel_client.models.v2_set_human_email1 import V2SetHumanEmail1 from zitadel_client.models.v2_set_human_phone1 import V2SetHumanPhone1 from zitadel_client.models.v2_set_human_profile1 import V2SetHumanProfile1 -from typing import Optional, Set -from typing_extensions import Self + class UserServiceUpdateHumanUserBody(BaseModel): """ @@ -82,16 +83,16 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict['profile'] = self.profile.to_dict() + _dict["profile"] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict['email'] = self.email.to_dict() + _dict["email"] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict['phone'] = self.phone.to_dict() + _dict["phone"] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_verify_email_body.py b/zitadel_client/models/user_service_verify_email_body.py index 4bda6041..05ba9950 100644 --- a/zitadel_client/models/user_service_verify_email_body.py +++ b/zitadel_client/models/user_service_verify_email_body.py @@ -13,21 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceVerifyEmailBody(BaseModel): """ UserServiceVerifyEmailBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the set email request\"", alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the set email request"', alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_invite_code_body.py b/zitadel_client/models/user_service_verify_invite_code_body.py index d3475e44..6c52bff4 100644 --- a/zitadel_client/models/user_service_verify_invite_code_body.py +++ b/zitadel_client/models/user_service_verify_invite_code_body.py @@ -13,21 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceVerifyInviteCodeBody(BaseModel): """ UserServiceVerifyInviteCodeBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the invite code request\"", alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the invite code request"', alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_passkey_registration_body.py b/zitadel_client/models/user_service_verify_passkey_registration_body.py index e20dbe89..9e36b5c5 100644 --- a/zitadel_client/models/user_service_verify_passkey_registration_body.py +++ b/zitadel_client/models/user_service_verify_passkey_registration_body.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceVerifyPasskeyRegistrationBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_verify_phone_body.py b/zitadel_client/models/user_service_verify_phone_body.py index 68e0f2b8..d9ec25a4 100644 --- a/zitadel_client/models/user_service_verify_phone_body.py +++ b/zitadel_client/models/user_service_verify_phone_body.py @@ -13,21 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceVerifyPhoneBody(BaseModel): """ UserServiceVerifyPhoneBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the set phone request\"", alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the set phone request"', alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_totp_registration_body.py b/zitadel_client/models/user_service_verify_totp_registration_body.py index 37e47395..a212ee94 100644 --- a/zitadel_client/models/user_service_verify_totp_registration_body.py +++ b/zitadel_client/models/user_service_verify_totp_registration_body.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List -from typing import Optional, Set from typing_extensions import Self + class UserServiceVerifyTOTPRegistrationBody(BaseModel): """ UserServiceVerifyTOTPRegistrationBody diff --git a/zitadel_client/models/user_service_verify_u2_f_registration_body.py b/zitadel_client/models/user_service_verify_u2_f_registration_body.py index 20776919..fb879771 100644 --- a/zitadel_client/models/user_service_verify_u2_f_registration_body.py +++ b/zitadel_client/models/user_service_verify_u2_f_registration_body.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class UserServiceVerifyU2FRegistrationBody(BaseModel): """ diff --git a/zitadel_client/models/userv2_set_password.py b/zitadel_client/models/userv2_set_password.py index c50334c6..df5f5cb0 100644 --- a/zitadel_client/models/userv2_set_password.py +++ b/zitadel_client/models/userv2_set_password.py @@ -13,17 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_password import V2Password -from typing import Optional, Set -from typing_extensions import Self + class Userv2SetPassword(BaseModel): """ @@ -32,7 +33,7 @@ class Userv2SetPassword(BaseModel): password: Optional[V2Password] = None hashed_password: Optional[V2HashedPassword] = Field(default=None, alias="hashedPassword") current_password: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(alias="currentPassword") - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during password reset request\"", alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during password reset request"', alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["password", "hashedPassword", "currentPassword", "verificationCode"] @@ -79,10 +80,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict['hashedPassword'] = self.hashed_password.to_dict() + _dict["hashedPassword"] = self.hashed_password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/userv2_type.py b/zitadel_client/models/userv2_type.py index 49671a54..cf1398d6 100644 --- a/zitadel_client/models/userv2_type.py +++ b/zitadel_client/models/userv2_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class Userv2Type(str, Enum): """ allowed enum values """ - TYPE_UNSPECIFIED = 'TYPE_UNSPECIFIED' - TYPE_HUMAN = 'TYPE_HUMAN' - TYPE_MACHINE = 'TYPE_MACHINE' + TYPE_UNSPECIFIED = "TYPE_UNSPECIFIED" + TYPE_HUMAN = "TYPE_HUMAN" + TYPE_MACHINE = "TYPE_MACHINE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_access_token_type.py b/zitadel_client/models/v2_access_token_type.py index cf0a1bbe..e4acc12c 100644 --- a/zitadel_client/models/v2_access_token_type.py +++ b/zitadel_client/models/v2_access_token_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,8 +28,8 @@ class V2AccessTokenType(str, Enum): """ allowed enum values """ - ACCESS_TOKEN_TYPE_BEARER = 'ACCESS_TOKEN_TYPE_BEARER' - ACCESS_TOKEN_TYPE_JWT = 'ACCESS_TOKEN_TYPE_JWT' + ACCESS_TOKEN_TYPE_BEARER = "ACCESS_TOKEN_TYPE_BEARER" + ACCESS_TOKEN_TYPE_JWT = "ACCESS_TOKEN_TYPE_JWT" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_add_human_user_request.py b/zitadel_client/models/v2_add_human_user_request.py index 00620946..b2e679db 100644 --- a/zitadel_client/models/v2_add_human_user_request.py +++ b/zitadel_client/models/v2_add_human_user_request.py @@ -13,13 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_password import V2Password @@ -27,9 +29,10 @@ from zitadel_client.models.v2_set_human_phone import V2SetHumanPhone from zitadel_client.models.v2_set_human_profile import V2SetHumanProfile from zitadel_client.models.v2_set_metadata_entry import V2SetMetadataEntry -from zitadel_client.models.zitadelobjectv2_organization import Zitadelobjectv2Organization -from typing import Optional, Set -from typing_extensions import Self +from zitadel_client.models.zitadelobjectv2_organization import ( + Zitadelobjectv2Organization, +) + class V2AddHumanUserRequest(BaseModel): """ @@ -92,36 +95,36 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of organization if self.organization: - _dict['organization'] = self.organization.to_dict() + _dict["organization"] = self.organization.to_dict() # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict['profile'] = self.profile.to_dict() + _dict["profile"] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict['email'] = self.email.to_dict() + _dict["email"] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict['phone'] = self.phone.to_dict() + _dict["phone"] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in metadata (list) _items = [] if self.metadata: for _item_metadata in self.metadata: if _item_metadata: _items.append(_item_metadata.to_dict()) - _dict['metadata'] = _items + _dict["metadata"] = _items # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict['hashedPassword'] = self.hashed_password.to_dict() + _dict["hashedPassword"] = self.hashed_password.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in idp_links (list) _items = [] if self.idp_links: for _item_idp_links in self.idp_links: if _item_idp_links: _items.append(_item_idp_links.to_dict()) - _dict['idpLinks'] = _items + _dict["idpLinks"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_human_user_request1.py b/zitadel_client/models/v2_add_human_user_request1.py index 8841918d..8dc7e36d 100644 --- a/zitadel_client/models/v2_add_human_user_request1.py +++ b/zitadel_client/models/v2_add_human_user_request1.py @@ -13,13 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_organization import V2Organization @@ -28,8 +30,7 @@ from zitadel_client.models.v2_set_human_phone1 import V2SetHumanPhone1 from zitadel_client.models.v2_set_human_profile1 import V2SetHumanProfile1 from zitadel_client.models.v2_set_metadata_entry1 import V2SetMetadataEntry1 -from typing import Optional, Set -from typing_extensions import Self + class V2AddHumanUserRequest1(BaseModel): """ @@ -92,36 +93,36 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of organization if self.organization: - _dict['organization'] = self.organization.to_dict() + _dict["organization"] = self.organization.to_dict() # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict['profile'] = self.profile.to_dict() + _dict["profile"] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict['email'] = self.email.to_dict() + _dict["email"] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict['phone'] = self.phone.to_dict() + _dict["phone"] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in metadata (list) _items = [] if self.metadata: for _item_metadata in self.metadata: if _item_metadata: _items.append(_item_metadata.to_dict()) - _dict['metadata'] = _items + _dict["metadata"] = _items # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict['hashedPassword'] = self.hashed_password.to_dict() + _dict["hashedPassword"] = self.hashed_password.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in idp_links (list) _items = [] if self.idp_links: for _item_idp_links in self.idp_links: if _item_idp_links: _items.append(_item_idp_links.to_dict()) - _dict['idpLinks'] = _items + _dict["idpLinks"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_human_user_response.py b/zitadel_client/models/v2_add_human_user_response.py index d1fcd30b..6d663207 100644 --- a/zitadel_client/models/v2_add_human_user_response.py +++ b/zitadel_client/models/v2_add_human_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2AddHumanUserResponse(BaseModel): """ V2AddHumanUserResponse @@ -77,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_idp_link_response.py b/zitadel_client/models/v2_add_idp_link_response.py index 955aacdb..1041772e 100644 --- a/zitadel_client/models/v2_add_idp_link_response.py +++ b/zitadel_client/models/v2_add_idp_link_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2AddIDPLinkResponse(BaseModel): """ V2AddIDPLinkResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_organization_request.py b/zitadel_client/models/v2_add_organization_request.py index 34eaa6af..1bc150ff 100644 --- a/zitadel_client/models/v2_add_organization_request.py +++ b/zitadel_client/models/v2_add_organization_request.py @@ -13,16 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from zitadel_client.models.add_organization_request_admin import AddOrganizationRequestAdmin -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + +from zitadel_client.models.add_organization_request_admin import ( + AddOrganizationRequestAdmin, +) + class V2AddOrganizationRequest(BaseModel): """ @@ -80,7 +83,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_admins in self.admins: if _item_admins: _items.append(_item_admins.to_dict()) - _dict['admins'] = _items + _dict["admins"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_organization_response.py b/zitadel_client/models/v2_add_organization_response.py index 0febd28a..479335bb 100644 --- a/zitadel_client/models/v2_add_organization_response.py +++ b/zitadel_client/models/v2_add_organization_response.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.add_organization_response_created_admin import AddOrganizationResponseCreatedAdmin -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.add_organization_response_created_admin import ( + AddOrganizationResponseCreatedAdmin, +) +from zitadel_client.models.v2_details import V2Details + + class V2AddOrganizationResponse(BaseModel): """ V2AddOrganizationResponse @@ -77,14 +81,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in created_admins (list) _items = [] if self.created_admins: for _item_created_admins in self.created_admins: if _item_created_admins: _items.append(_item_created_admins.to_dict()) - _dict['createdAdmins'] = _items + _dict["createdAdmins"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_otp_email_response.py b/zitadel_client/models/v2_add_otp_email_response.py index 8cfb8e95..99bebbc2 100644 --- a/zitadel_client/models/v2_add_otp_email_response.py +++ b/zitadel_client/models/v2_add_otp_email_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2AddOTPEmailResponse(BaseModel): """ V2AddOTPEmailResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_otpsms_response.py b/zitadel_client/models/v2_add_otpsms_response.py index 78d522e4..8ec00fbc 100644 --- a/zitadel_client/models/v2_add_otpsms_response.py +++ b/zitadel_client/models/v2_add_otpsms_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2AddOTPSMSResponse(BaseModel): """ V2AddOTPSMSResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_and_query.py b/zitadel_client/models/v2_and_query.py index f2ee96bd..5bc00396 100644 --- a/zitadel_client/models/v2_and_query.py +++ b/zitadel_client/models/v2_and_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2AndQuery(BaseModel): """ Connect multiple sub-condition with and AND operator. @@ -77,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict['queries'] = _items + _dict["queries"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -105,6 +106,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 + # TODO: Rewrite to not use raise_errors V2AndQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_apple_config.py b/zitadel_client/models/v2_apple_config.py index 0664072c..d3fc1779 100644 --- a/zitadel_client/models/v2_apple_config.py +++ b/zitadel_client/models/v2_apple_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2AppleConfig(BaseModel): """ V2AppleConfig diff --git a/zitadel_client/models/v2_auth_factor.py b/zitadel_client/models/v2_auth_factor.py index e88776c2..fc86d799 100644 --- a/zitadel_client/models/v2_auth_factor.py +++ b/zitadel_client/models/v2_auth_factor.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_auth_factor_state import V2AuthFactorState from zitadel_client.models.v2_auth_factor_u2_f import V2AuthFactorU2F -from typing import Optional, Set -from typing_extensions import Self + class V2AuthFactor(BaseModel): """ @@ -79,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of u2f if self.u2f: - _dict['u2f'] = self.u2f.to_dict() + _dict["u2f"] = self.u2f.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_auth_factor_state.py b/zitadel_client/models/v2_auth_factor_state.py index 06c961dc..2dff7140 100644 --- a/zitadel_client/models/v2_auth_factor_state.py +++ b/zitadel_client/models/v2_auth_factor_state.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2AuthFactorState(str, Enum): """ allowed enum values """ - AUTH_FACTOR_STATE_UNSPECIFIED = 'AUTH_FACTOR_STATE_UNSPECIFIED' - AUTH_FACTOR_STATE_NOT_READY = 'AUTH_FACTOR_STATE_NOT_READY' - AUTH_FACTOR_STATE_READY = 'AUTH_FACTOR_STATE_READY' - AUTH_FACTOR_STATE_REMOVED = 'AUTH_FACTOR_STATE_REMOVED' + AUTH_FACTOR_STATE_UNSPECIFIED = "AUTH_FACTOR_STATE_UNSPECIFIED" + AUTH_FACTOR_STATE_NOT_READY = "AUTH_FACTOR_STATE_NOT_READY" + AUTH_FACTOR_STATE_READY = "AUTH_FACTOR_STATE_READY" + AUTH_FACTOR_STATE_REMOVED = "AUTH_FACTOR_STATE_REMOVED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_auth_factor_u2_f.py b/zitadel_client/models/v2_auth_factor_u2_f.py index 87089abe..9c73c479 100644 --- a/zitadel_client/models/v2_auth_factor_u2_f.py +++ b/zitadel_client/models/v2_auth_factor_u2_f.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2AuthFactorU2F(BaseModel): """ V2AuthFactorU2F diff --git a/zitadel_client/models/v2_auth_request.py b/zitadel_client/models/v2_auth_request.py index 94ec17dc..ce0e6af7 100644 --- a/zitadel_client/models/v2_auth_request.py +++ b/zitadel_client/models/v2_auth_request.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_prompt import V2Prompt -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_prompt import V2Prompt + + class V2AuthRequest(BaseModel): """ V2AuthRequest diff --git a/zitadel_client/models/v2_authentication_method_type.py b/zitadel_client/models/v2_authentication_method_type.py index edba9411..b8775c5d 100644 --- a/zitadel_client/models/v2_authentication_method_type.py +++ b/zitadel_client/models/v2_authentication_method_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,14 +28,14 @@ class V2AuthenticationMethodType(str, Enum): """ allowed enum values """ - AUTHENTICATION_METHOD_TYPE_UNSPECIFIED = 'AUTHENTICATION_METHOD_TYPE_UNSPECIFIED' - AUTHENTICATION_METHOD_TYPE_PASSWORD = 'AUTHENTICATION_METHOD_TYPE_PASSWORD' - AUTHENTICATION_METHOD_TYPE_PASSKEY = 'AUTHENTICATION_METHOD_TYPE_PASSKEY' - AUTHENTICATION_METHOD_TYPE_IDP = 'AUTHENTICATION_METHOD_TYPE_IDP' - AUTHENTICATION_METHOD_TYPE_TOTP = 'AUTHENTICATION_METHOD_TYPE_TOTP' - AUTHENTICATION_METHOD_TYPE_U2_F = 'AUTHENTICATION_METHOD_TYPE_U2F' - AUTHENTICATION_METHOD_TYPE_OTP_SMS = 'AUTHENTICATION_METHOD_TYPE_OTP_SMS' - AUTHENTICATION_METHOD_TYPE_OTP_EMAIL = 'AUTHENTICATION_METHOD_TYPE_OTP_EMAIL' + AUTHENTICATION_METHOD_TYPE_UNSPECIFIED = "AUTHENTICATION_METHOD_TYPE_UNSPECIFIED" + AUTHENTICATION_METHOD_TYPE_PASSWORD = "AUTHENTICATION_METHOD_TYPE_PASSWORD" + AUTHENTICATION_METHOD_TYPE_PASSKEY = "AUTHENTICATION_METHOD_TYPE_PASSKEY" + AUTHENTICATION_METHOD_TYPE_IDP = "AUTHENTICATION_METHOD_TYPE_IDP" + AUTHENTICATION_METHOD_TYPE_TOTP = "AUTHENTICATION_METHOD_TYPE_TOTP" + AUTHENTICATION_METHOD_TYPE_U2_F = "AUTHENTICATION_METHOD_TYPE_U2F" + AUTHENTICATION_METHOD_TYPE_OTP_SMS = "AUTHENTICATION_METHOD_TYPE_OTP_SMS" + AUTHENTICATION_METHOD_TYPE_OTP_EMAIL = "AUTHENTICATION_METHOD_TYPE_OTP_EMAIL" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_authorization_error.py b/zitadel_client/models/v2_authorization_error.py index 93f0efc9..4dce8055 100644 --- a/zitadel_client/models/v2_authorization_error.py +++ b/zitadel_client/models/v2_authorization_error.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_error_reason import V2ErrorReason -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_error_reason import V2ErrorReason + + class V2AuthorizationError(BaseModel): """ V2AuthorizationError diff --git a/zitadel_client/models/v2_auto_linking_option.py b/zitadel_client/models/v2_auto_linking_option.py index d3cb820f..3ed6125b 100644 --- a/zitadel_client/models/v2_auto_linking_option.py +++ b/zitadel_client/models/v2_auto_linking_option.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class V2AutoLinkingOption(str, Enum): """ allowed enum values """ - AUTO_LINKING_OPTION_UNSPECIFIED = 'AUTO_LINKING_OPTION_UNSPECIFIED' - AUTO_LINKING_OPTION_USERNAME = 'AUTO_LINKING_OPTION_USERNAME' - AUTO_LINKING_OPTION_EMAIL = 'AUTO_LINKING_OPTION_EMAIL' + AUTO_LINKING_OPTION_UNSPECIFIED = "AUTO_LINKING_OPTION_UNSPECIFIED" + AUTO_LINKING_OPTION_USERNAME = "AUTO_LINKING_OPTION_USERNAME" + AUTO_LINKING_OPTION_EMAIL = "AUTO_LINKING_OPTION_EMAIL" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_azure_ad_config.py b/zitadel_client/models/v2_azure_ad_config.py index f262adbc..9076d13f 100644 --- a/zitadel_client/models/v2_azure_ad_config.py +++ b/zitadel_client/models/v2_azure_ad_config.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_azure_ad_tenant import V2AzureADTenant -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_azure_ad_tenant import V2AzureADTenant + + class V2AzureADConfig(BaseModel): """ V2AzureADConfig @@ -77,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of tenant if self.tenant: - _dict['tenant'] = self.tenant.to_dict() + _dict["tenant"] = self.tenant.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_azure_ad_tenant.py b/zitadel_client/models/v2_azure_ad_tenant.py index a1d45d67..4c54cfda 100644 --- a/zitadel_client/models/v2_azure_ad_tenant.py +++ b/zitadel_client/models/v2_azure_ad_tenant.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_azure_ad_tenant_type import V2AzureADTenantType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_azure_ad_tenant_type import V2AzureADTenantType + + class V2AzureADTenant(BaseModel): """ V2AzureADTenant diff --git a/zitadel_client/models/v2_azure_ad_tenant_type.py b/zitadel_client/models/v2_azure_ad_tenant_type.py index 7804f2f8..07217537 100644 --- a/zitadel_client/models/v2_azure_ad_tenant_type.py +++ b/zitadel_client/models/v2_azure_ad_tenant_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class V2AzureADTenantType(str, Enum): """ allowed enum values """ - AZURE_AD_TENANT_TYPE_COMMON = 'AZURE_AD_TENANT_TYPE_COMMON' - AZURE_AD_TENANT_TYPE_ORGANISATIONS = 'AZURE_AD_TENANT_TYPE_ORGANISATIONS' - AZURE_AD_TENANT_TYPE_CONSUMERS = 'AZURE_AD_TENANT_TYPE_CONSUMERS' + AZURE_AD_TENANT_TYPE_COMMON = "AZURE_AD_TENANT_TYPE_COMMON" + AZURE_AD_TENANT_TYPE_ORGANISATIONS = "AZURE_AD_TENANT_TYPE_ORGANISATIONS" + AZURE_AD_TENANT_TYPE_CONSUMERS = "AZURE_AD_TENANT_TYPE_CONSUMERS" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_branding_settings.py b/zitadel_client/models/v2_branding_settings.py index cb772681..03aefe83 100644 --- a/zitadel_client/models/v2_branding_settings.py +++ b/zitadel_client/models/v2_branding_settings.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType from zitadel_client.models.v2_theme import V2Theme from zitadel_client.models.v2_theme_mode import V2ThemeMode -from typing import Optional, Set -from typing_extensions import Self + class V2BrandingSettings(BaseModel): """ @@ -32,7 +34,7 @@ class V2BrandingSettings(BaseModel): light_theme: Optional[V2Theme] = Field(default=None, alias="lightTheme") dark_theme: Optional[V2Theme] = Field(default=None, alias="darkTheme") font_url: Optional[StrictStr] = Field(default=None, description="url to the font used", alias="fontUrl") - hide_login_name_suffix: Optional[StrictBool] = Field(default=None, description="hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set", alias="hideLoginNameSuffix") + hide_login_name_suffix: Optional[StrictBool] = Field(default=None, description='hides the org suffix on the login form if the scope "urn:zitadel:iam:org:domain:primary:{domainname}" is set', alias="hideLoginNameSuffix") disable_watermark: Optional[StrictBool] = Field(default=None, description="boolean to disable the watermark", alias="disableWatermark") resource_owner_type: Optional[V2ResourceOwnerType] = Field(default=V2ResourceOwnerType.RESOURCE_OWNER_TYPE_UNSPECIFIED, alias="resourceOwnerType") theme_mode: Optional[V2ThemeMode] = Field(default=V2ThemeMode.THEME_MODE_UNSPECIFIED, alias="themeMode") @@ -82,10 +84,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of light_theme if self.light_theme: - _dict['lightTheme'] = self.light_theme.to_dict() + _dict["lightTheme"] = self.light_theme.to_dict() # override the default output from pydantic by calling `to_dict()` of dark_theme if self.dark_theme: - _dict['darkTheme'] = self.dark_theme.to_dict() + _dict["darkTheme"] = self.dark_theme.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_challenges.py b/zitadel_client/models/v2_challenges.py index ce333de2..12cbe8b3 100644 --- a/zitadel_client/models/v2_challenges.py +++ b/zitadel_client/models/v2_challenges.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_challenges_web_auth_n import V2ChallengesWebAuthN -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_challenges_web_auth_n import V2ChallengesWebAuthN + + class V2Challenges(BaseModel): """ V2Challenges @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict['webAuthN'] = self.web_auth_n.to_dict() + _dict["webAuthN"] = self.web_auth_n.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_challenges_web_auth_n.py b/zitadel_client/models/v2_challenges_web_auth_n.py index 0a08b137..ef0f69ac 100644 --- a/zitadel_client/models/v2_challenges_web_auth_n.py +++ b/zitadel_client/models/v2_challenges_web_auth_n.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2ChallengesWebAuthN(BaseModel): """ V2ChallengesWebAuthN diff --git a/zitadel_client/models/v2_check_idp_intent.py b/zitadel_client/models/v2_check_idp_intent.py index 2eafe74e..b2206b0f 100644 --- a/zitadel_client/models/v2_check_idp_intent.py +++ b/zitadel_client/models/v2_check_idp_intent.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CheckIDPIntent(BaseModel): """ diff --git a/zitadel_client/models/v2_check_otp.py b/zitadel_client/models/v2_check_otp.py index 43eeec27..ae2a4b16 100644 --- a/zitadel_client/models/v2_check_otp.py +++ b/zitadel_client/models/v2_check_otp.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CheckOTP(BaseModel): """ diff --git a/zitadel_client/models/v2_check_password.py b/zitadel_client/models/v2_check_password.py index b7029e1d..ca754eb8 100644 --- a/zitadel_client/models/v2_check_password.py +++ b/zitadel_client/models/v2_check_password.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CheckPassword(BaseModel): """ diff --git a/zitadel_client/models/v2_check_totp.py b/zitadel_client/models/v2_check_totp.py index 84dd5a83..0fe76f0a 100644 --- a/zitadel_client/models/v2_check_totp.py +++ b/zitadel_client/models/v2_check_totp.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CheckTOTP(BaseModel): """ diff --git a/zitadel_client/models/v2_check_user.py b/zitadel_client/models/v2_check_user.py index 5bc7869b..d084853d 100644 --- a/zitadel_client/models/v2_check_user.py +++ b/zitadel_client/models/v2_check_user.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CheckUser(BaseModel): """ diff --git a/zitadel_client/models/v2_check_web_auth_n.py b/zitadel_client/models/v2_check_web_auth_n.py index 2fbc6165..dacf3493 100644 --- a/zitadel_client/models/v2_check_web_auth_n.py +++ b/zitadel_client/models/v2_check_web_auth_n.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing import Optional, Set from typing_extensions import Self + class V2CheckWebAuthN(BaseModel): """ V2CheckWebAuthN diff --git a/zitadel_client/models/v2_checks.py b/zitadel_client/models/v2_checks.py index 05041810..fd1b7f05 100644 --- a/zitadel_client/models/v2_checks.py +++ b/zitadel_client/models/v2_checks.py @@ -13,20 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_check_idp_intent import V2CheckIDPIntent from zitadel_client.models.v2_check_otp import V2CheckOTP from zitadel_client.models.v2_check_password import V2CheckPassword from zitadel_client.models.v2_check_totp import V2CheckTOTP from zitadel_client.models.v2_check_user import V2CheckUser from zitadel_client.models.v2_check_web_auth_n import V2CheckWebAuthN -from typing import Optional, Set -from typing_extensions import Self + class V2Checks(BaseModel): """ @@ -85,25 +87,25 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict['user'] = self.user.to_dict() + _dict["user"] = self.user.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict['webAuthN'] = self.web_auth_n.to_dict() + _dict["webAuthN"] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_intent if self.idp_intent: - _dict['idpIntent'] = self.idp_intent.to_dict() + _dict["idpIntent"] = self.idp_intent.to_dict() # override the default output from pydantic by calling `to_dict()` of totp if self.totp: - _dict['totp'] = self.totp.to_dict() + _dict["totp"] = self.totp.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict['otpSms'] = self.otp_sms.to_dict() + _dict["otpSms"] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict['otpEmail'] = self.otp_email.to_dict() + _dict["otpEmail"] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_callback_response.py b/zitadel_client/models/v2_create_callback_response.py index 94b8444b..888c57bf 100644 --- a/zitadel_client/models/v2_create_callback_response.py +++ b/zitadel_client/models/v2_create_callback_response.py @@ -13,22 +13,24 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2CreateCallbackResponse(BaseModel): """ V2CreateCallbackResponse """ # noqa: E501 details: Optional[V2Details] = None - callback_url: Optional[StrictStr] = Field(default=None, description="Callback URL where the user should be redirected, using a \"302 FOUND\" status. Contains details for the application to obtain the tokens on success, or error details on failure. Note that this field must be treated as credentials, as the contained code can be used to obtain tokens on behalve of the user.", alias="callbackUrl") + callback_url: Optional[StrictStr] = Field(default=None, description='Callback URL where the user should be redirected, using a "302 FOUND" status. Contains details for the application to obtain the tokens on success, or error details on failure. Note that this field must be treated as credentials, as the contained code can be used to obtain tokens on behalve of the user.', alias="callbackUrl") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "callbackUrl"] @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_invite_code_response.py b/zitadel_client/models/v2_create_invite_code_response.py index f956ae2c..5296e592 100644 --- a/zitadel_client/models/v2_create_invite_code_response.py +++ b/zitadel_client/models/v2_create_invite_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2CreateInviteCodeResponse(BaseModel): """ V2CreateInviteCodeResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_passkey_registration_link_response.py b/zitadel_client/models/v2_create_passkey_registration_link_response.py index c39aa5a8..64ee26ea 100644 --- a/zitadel_client/models/v2_create_passkey_registration_link_response.py +++ b/zitadel_client/models/v2_create_passkey_registration_link_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_passkey_registration_code import V2PasskeyRegistrationCode -from typing import Optional, Set -from typing_extensions import Self + class V2CreatePasskeyRegistrationLinkResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of code if self.code: - _dict['code'] = self.code.to_dict() + _dict["code"] = self.code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_session_request.py b/zitadel_client/models/v2_create_session_request.py index b4c02bc9..6ffa311f 100644 --- a/zitadel_client/models/v2_create_session_request.py +++ b/zitadel_client/models/v2_create_session_request.py @@ -13,28 +13,29 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union + +from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing_extensions import Annotated, Self -from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated from zitadel_client.models.v2_checks import V2Checks from zitadel_client.models.v2_request_challenges import V2RequestChallenges from zitadel_client.models.v2_user_agent import V2UserAgent -from typing import Optional, Set -from typing_extensions import Self + class V2CreateSessionRequest(BaseModel): """ V2CreateSessionRequest """ # noqa: E501 checks: Optional[V2Checks] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list to be stored on the session\"") + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list to be stored on the session"') challenges: Optional[V2RequestChallenges] = None user_agent: Optional[V2UserAgent] = Field(default=None, alias="userAgent") - lifetime: Optional[StrictStr] = Field(default=None, description="\"duration (in seconds) after which the session will be automatically invalidated\"") + lifetime: Optional[StrictStr] = Field(default=None, description='"duration (in seconds) after which the session will be automatically invalidated"') additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["checks", "metadata", "challenges", "userAgent", "lifetime"] @@ -81,13 +82,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of checks if self.checks: - _dict['checks'] = self.checks.to_dict() + _dict["checks"] = self.checks.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict['challenges'] = self.challenges.to_dict() + _dict["challenges"] = self.challenges.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent if self.user_agent: - _dict['userAgent'] = self.user_agent.to_dict() + _dict["userAgent"] = self.user_agent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_session_response.py b/zitadel_client/models/v2_create_session_response.py index 1bff1d89..cfd475e8 100644 --- a/zitadel_client/models/v2_create_session_response.py +++ b/zitadel_client/models/v2_create_session_response.py @@ -13,24 +13,26 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_challenges import V2Challenges from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set -from typing_extensions import Self + class V2CreateSessionResponse(BaseModel): """ V2CreateSessionResponse """ # noqa: E501 details: Optional[V2Details] = None - session_id: Optional[StrictStr] = Field(default=None, description="\"id of the session\"", alias="sessionId") - session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, which is required for delete session, get session or the request of other resources.\"", alias="sessionToken") + session_id: Optional[StrictStr] = Field(default=None, description='"id of the session"', alias="sessionId") + session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, which is required for delete session, get session or the request of other resources."', alias="sessionToken") challenges: Optional[V2Challenges] = None additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "sessionId", "sessionToken", "challenges"] @@ -78,10 +80,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict['challenges'] = self.challenges.to_dict() + _dict["challenges"] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_creation_date_query.py b/zitadel_client/models/v2_creation_date_query.py index fc8aee2c..07814506 100644 --- a/zitadel_client/models/v2_creation_date_query.py +++ b/zitadel_client/models/v2_creation_date_query.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.zitadelv1_timestamp_query_method import Zitadelv1TimestampQueryMethod -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.zitadelv1_timestamp_query_method import ( + Zitadelv1TimestampQueryMethod, +) + + class V2CreationDateQuery(BaseModel): """ V2CreationDateQuery diff --git a/zitadel_client/models/v2_creator_query.py b/zitadel_client/models/v2_creator_query.py index 8797525e..7e9cceec 100644 --- a/zitadel_client/models/v2_creator_query.py +++ b/zitadel_client/models/v2_creator_query.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2CreatorQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_deactivate_user_response.py b/zitadel_client/models/v2_deactivate_user_response.py index 67f64f9e..44ee9e9c 100644 --- a/zitadel_client/models/v2_deactivate_user_response.py +++ b/zitadel_client/models/v2_deactivate_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2DeactivateUserResponse(BaseModel): """ V2DeactivateUserResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_delete_session_response.py b/zitadel_client/models/v2_delete_session_response.py index 16e14a85..6be2d6f9 100644 --- a/zitadel_client/models/v2_delete_session_response.py +++ b/zitadel_client/models/v2_delete_session_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2DeleteSessionResponse(BaseModel): """ V2DeleteSessionResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_delete_user_response.py b/zitadel_client/models/v2_delete_user_response.py index ec2f8304..359050ca 100644 --- a/zitadel_client/models/v2_delete_user_response.py +++ b/zitadel_client/models/v2_delete_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2DeleteUserResponse(BaseModel): """ V2DeleteUserResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_details.py b/zitadel_client/models/v2_details.py index 9680a123..935c7500 100644 --- a/zitadel_client/models/v2_details.py +++ b/zitadel_client/models/v2_details.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2Details(BaseModel): """ V2Details diff --git a/zitadel_client/models/v2_display_name_query.py b/zitadel_client/models/v2_display_name_query.py index 83e50748..7303f367 100644 --- a/zitadel_client/models/v2_display_name_query.py +++ b/zitadel_client/models/v2_display_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2DisplayNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_domain_settings.py b/zitadel_client/models/v2_domain_settings.py index 2cc692fe..17f08bff 100644 --- a/zitadel_client/models/v2_domain_settings.py +++ b/zitadel_client/models/v2_domain_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType + + class V2DomainSettings(BaseModel): """ V2DomainSettings diff --git a/zitadel_client/models/v2_email_query.py b/zitadel_client/models/v2_email_query.py index 5df4c98d..19d1d4c2 100644 --- a/zitadel_client/models/v2_email_query.py +++ b/zitadel_client/models/v2_email_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2EmailQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_embedded_iframe_settings.py b/zitadel_client/models/v2_embedded_iframe_settings.py index df23fc1a..7cfaaecc 100644 --- a/zitadel_client/models/v2_embedded_iframe_settings.py +++ b/zitadel_client/models/v2_embedded_iframe_settings.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2EmbeddedIframeSettings(BaseModel): """ V2EmbeddedIframeSettings diff --git a/zitadel_client/models/v2_error_reason.py b/zitadel_client/models/v2_error_reason.py index 59deea75..4231a97b 100644 --- a/zitadel_client/models/v2_error_reason.py +++ b/zitadel_client/models/v2_error_reason.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,23 +28,23 @@ class V2ErrorReason(str, Enum): """ allowed enum values """ - ERROR_REASON_UNSPECIFIED = 'ERROR_REASON_UNSPECIFIED' - ERROR_REASON_INVALID_REQUEST = 'ERROR_REASON_INVALID_REQUEST' - ERROR_REASON_UNAUTHORIZED_CLIENT = 'ERROR_REASON_UNAUTHORIZED_CLIENT' - ERROR_REASON_ACCESS_DENIED = 'ERROR_REASON_ACCESS_DENIED' - ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE = 'ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE' - ERROR_REASON_INVALID_SCOPE = 'ERROR_REASON_INVALID_SCOPE' - ERROR_REASON_SERVER_ERROR = 'ERROR_REASON_SERVER_ERROR' - ERROR_REASON_TEMPORARY_UNAVAILABLE = 'ERROR_REASON_TEMPORARY_UNAVAILABLE' - ERROR_REASON_INTERACTION_REQUIRED = 'ERROR_REASON_INTERACTION_REQUIRED' - ERROR_REASON_LOGIN_REQUIRED = 'ERROR_REASON_LOGIN_REQUIRED' - ERROR_REASON_ACCOUNT_SELECTION_REQUIRED = 'ERROR_REASON_ACCOUNT_SELECTION_REQUIRED' - ERROR_REASON_CONSENT_REQUIRED = 'ERROR_REASON_CONSENT_REQUIRED' - ERROR_REASON_INVALID_REQUEST_URI = 'ERROR_REASON_INVALID_REQUEST_URI' - ERROR_REASON_INVALID_REQUEST_OBJECT = 'ERROR_REASON_INVALID_REQUEST_OBJECT' - ERROR_REASON_REQUEST_NOT_SUPPORTED = 'ERROR_REASON_REQUEST_NOT_SUPPORTED' - ERROR_REASON_REQUEST_URI_NOT_SUPPORTED = 'ERROR_REASON_REQUEST_URI_NOT_SUPPORTED' - ERROR_REASON_REGISTRATION_NOT_SUPPORTED = 'ERROR_REASON_REGISTRATION_NOT_SUPPORTED' + ERROR_REASON_UNSPECIFIED = "ERROR_REASON_UNSPECIFIED" + ERROR_REASON_INVALID_REQUEST = "ERROR_REASON_INVALID_REQUEST" + ERROR_REASON_UNAUTHORIZED_CLIENT = "ERROR_REASON_UNAUTHORIZED_CLIENT" + ERROR_REASON_ACCESS_DENIED = "ERROR_REASON_ACCESS_DENIED" + ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE = "ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE" + ERROR_REASON_INVALID_SCOPE = "ERROR_REASON_INVALID_SCOPE" + ERROR_REASON_SERVER_ERROR = "ERROR_REASON_SERVER_ERROR" + ERROR_REASON_TEMPORARY_UNAVAILABLE = "ERROR_REASON_TEMPORARY_UNAVAILABLE" + ERROR_REASON_INTERACTION_REQUIRED = "ERROR_REASON_INTERACTION_REQUIRED" + ERROR_REASON_LOGIN_REQUIRED = "ERROR_REASON_LOGIN_REQUIRED" + ERROR_REASON_ACCOUNT_SELECTION_REQUIRED = "ERROR_REASON_ACCOUNT_SELECTION_REQUIRED" + ERROR_REASON_CONSENT_REQUIRED = "ERROR_REASON_CONSENT_REQUIRED" + ERROR_REASON_INVALID_REQUEST_URI = "ERROR_REASON_INVALID_REQUEST_URI" + ERROR_REASON_INVALID_REQUEST_OBJECT = "ERROR_REASON_INVALID_REQUEST_OBJECT" + ERROR_REASON_REQUEST_NOT_SUPPORTED = "ERROR_REASON_REQUEST_NOT_SUPPORTED" + ERROR_REASON_REQUEST_URI_NOT_SUPPORTED = "ERROR_REASON_REQUEST_URI_NOT_SUPPORTED" + ERROR_REASON_REGISTRATION_NOT_SUPPORTED = "ERROR_REASON_REGISTRATION_NOT_SUPPORTED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_factors.py b/zitadel_client/models/v2_factors.py index 0eef209d..5fcbc1cf 100644 --- a/zitadel_client/models/v2_factors.py +++ b/zitadel_client/models/v2_factors.py @@ -13,20 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_intent_factor import V2IntentFactor from zitadel_client.models.v2_otp_factor import V2OTPFactor from zitadel_client.models.v2_password_factor import V2PasswordFactor from zitadel_client.models.v2_totp_factor import V2TOTPFactor from zitadel_client.models.v2_user_factor import V2UserFactor from zitadel_client.models.v2_web_auth_n_factor import V2WebAuthNFactor -from typing import Optional, Set -from typing_extensions import Self + class V2Factors(BaseModel): """ @@ -85,25 +87,25 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict['user'] = self.user.to_dict() + _dict["user"] = self.user.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict['password'] = self.password.to_dict() + _dict["password"] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict['webAuthN'] = self.web_auth_n.to_dict() + _dict["webAuthN"] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of intent if self.intent: - _dict['intent'] = self.intent.to_dict() + _dict["intent"] = self.intent.to_dict() # override the default output from pydantic by calling `to_dict()` of totp if self.totp: - _dict['totp'] = self.totp.to_dict() + _dict["totp"] = self.totp.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict['otpSms'] = self.otp_sms.to_dict() + _dict["otpSms"] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict['otpEmail'] = self.otp_email.to_dict() + _dict["otpEmail"] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_feature_flag.py b/zitadel_client/models/v2_feature_flag.py index 7059d860..df9768d5 100644 --- a/zitadel_client/models/v2_feature_flag.py +++ b/zitadel_client/models/v2_feature_flag.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_source import V2Source -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_source import V2Source + + class V2FeatureFlag(BaseModel): """ FeatureFlag is a simple boolean Feature setting, without further payload. diff --git a/zitadel_client/models/v2_first_name_query.py b/zitadel_client/models/v2_first_name_query.py index 910c09b8..564f7c49 100644 --- a/zitadel_client/models/v2_first_name_query.py +++ b/zitadel_client/models/v2_first_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2FirstNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_gender.py b/zitadel_client/models/v2_gender.py index af93b739..13dac193 100644 --- a/zitadel_client/models/v2_gender.py +++ b/zitadel_client/models/v2_gender.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2Gender(str, Enum): """ allowed enum values """ - GENDER_UNSPECIFIED = 'GENDER_UNSPECIFIED' - GENDER_FEMALE = 'GENDER_FEMALE' - GENDER_MALE = 'GENDER_MALE' - GENDER_DIVERSE = 'GENDER_DIVERSE' + GENDER_UNSPECIFIED = "GENDER_UNSPECIFIED" + GENDER_FEMALE = "GENDER_FEMALE" + GENDER_MALE = "GENDER_MALE" + GENDER_DIVERSE = "GENDER_DIVERSE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_generic_oidc_config.py b/zitadel_client/models/v2_generic_oidc_config.py index 0f54e42b..99da1802 100644 --- a/zitadel_client/models/v2_generic_oidc_config.py +++ b/zitadel_client/models/v2_generic_oidc_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GenericOIDCConfig(BaseModel): """ V2GenericOIDCConfig diff --git a/zitadel_client/models/v2_get_active_identity_providers_response.py b/zitadel_client/models/v2_get_active_identity_providers_response.py index 98c08b75..971f2d35 100644 --- a/zitadel_client/models/v2_get_active_identity_providers_response.py +++ b/zitadel_client/models/v2_get_active_identity_providers_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_identity_provider import V2IdentityProvider from zitadel_client.models.v2_list_details import V2ListDetails -from typing import Optional, Set -from typing_extensions import Self + class V2GetActiveIdentityProvidersResponse(BaseModel): """ @@ -76,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in identity_providers (list) _items = [] if self.identity_providers: for _item_identity_providers in self.identity_providers: if _item_identity_providers: _items.append(_item_identity_providers.to_dict()) - _dict['identityProviders'] = _items + _dict["identityProviders"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_auth_request_response.py b/zitadel_client/models/v2_get_auth_request_response.py index cc2f46e0..2524c5df 100644 --- a/zitadel_client/models/v2_get_auth_request_response.py +++ b/zitadel_client/models/v2_get_auth_request_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_auth_request import V2AuthRequest -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_auth_request import V2AuthRequest + + class V2GetAuthRequestResponse(BaseModel): """ V2GetAuthRequestResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of auth_request if self.auth_request: - _dict['authRequest'] = self.auth_request.to_dict() + _dict["authRequest"] = self.auth_request.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_branding_settings_response.py b/zitadel_client/models/v2_get_branding_settings_response.py index 3dda06e5..43fb2413 100644 --- a/zitadel_client/models/v2_get_branding_settings_response.py +++ b/zitadel_client/models/v2_get_branding_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_branding_settings import V2BrandingSettings from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set -from typing_extensions import Self + class V2GetBrandingSettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_domain_settings_response.py b/zitadel_client/models/v2_get_domain_settings_response.py index 498ce153..1484ad5e 100644 --- a/zitadel_client/models/v2_get_domain_settings_response.py +++ b/zitadel_client/models/v2_get_domain_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_domain_settings import V2DomainSettings -from typing import Optional, Set -from typing_extensions import Self + class V2GetDomainSettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_general_settings_response.py b/zitadel_client/models/v2_get_general_settings_response.py index 4d65df54..76aecb58 100644 --- a/zitadel_client/models/v2_get_general_settings_response.py +++ b/zitadel_client/models/v2_get_general_settings_response.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GetGeneralSettingsResponse(BaseModel): """ V2GetGeneralSettingsResponse diff --git a/zitadel_client/models/v2_get_idpby_id_response.py b/zitadel_client/models/v2_get_idpby_id_response.py index d26cc51d..9968c753 100644 --- a/zitadel_client/models/v2_get_idpby_id_response.py +++ b/zitadel_client/models/v2_get_idpby_id_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_idp import V2IDP -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_idp import V2IDP + + class V2GetIDPByIDResponse(BaseModel): """ V2GetIDPByIDResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of idp if self.idp: - _dict['idp'] = self.idp.to_dict() + _dict["idp"] = self.idp.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_instance_features_response.py b/zitadel_client/models/v2_get_instance_features_response.py index a18836ba..1f66a772 100644 --- a/zitadel_client/models/v2_get_instance_features_response.py +++ b/zitadel_client/models/v2_get_instance_features_response.py @@ -13,18 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_feature_flag import V2FeatureFlag -from zitadel_client.models.v2_improved_performance_feature_flag import V2ImprovedPerformanceFeatureFlag +from zitadel_client.models.v2_improved_performance_feature_flag import ( + V2ImprovedPerformanceFeatureFlag, +) from zitadel_client.models.v2_login_v2_feature_flag import V2LoginV2FeatureFlag -from typing import Optional, Set -from typing_extensions import Self + class V2GetInstanceFeaturesResponse(BaseModel): """ @@ -91,49 +95,49 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of login_default_org if self.login_default_org: - _dict['loginDefaultOrg'] = self.login_default_org.to_dict() + _dict["loginDefaultOrg"] = self.login_default_org.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_trigger_introspection_projections if self.oidc_trigger_introspection_projections: - _dict['oidcTriggerIntrospectionProjections'] = self.oidc_trigger_introspection_projections.to_dict() + _dict["oidcTriggerIntrospectionProjections"] = self.oidc_trigger_introspection_projections.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_legacy_introspection if self.oidc_legacy_introspection: - _dict['oidcLegacyIntrospection'] = self.oidc_legacy_introspection.to_dict() + _dict["oidcLegacyIntrospection"] = self.oidc_legacy_introspection.to_dict() # override the default output from pydantic by calling `to_dict()` of user_schema if self.user_schema: - _dict['userSchema'] = self.user_schema.to_dict() + _dict["userSchema"] = self.user_schema.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_token_exchange if self.oidc_token_exchange: - _dict['oidcTokenExchange'] = self.oidc_token_exchange.to_dict() + _dict["oidcTokenExchange"] = self.oidc_token_exchange.to_dict() # override the default output from pydantic by calling `to_dict()` of actions if self.actions: - _dict['actions'] = self.actions.to_dict() + _dict["actions"] = self.actions.to_dict() # override the default output from pydantic by calling `to_dict()` of improved_performance if self.improved_performance: - _dict['improvedPerformance'] = self.improved_performance.to_dict() + _dict["improvedPerformance"] = self.improved_performance.to_dict() # override the default output from pydantic by calling `to_dict()` of web_key if self.web_key: - _dict['webKey'] = self.web_key.to_dict() + _dict["webKey"] = self.web_key.to_dict() # override the default output from pydantic by calling `to_dict()` of debug_oidc_parent_error if self.debug_oidc_parent_error: - _dict['debugOidcParentError'] = self.debug_oidc_parent_error.to_dict() + _dict["debugOidcParentError"] = self.debug_oidc_parent_error.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_single_v1_session_termination if self.oidc_single_v1_session_termination: - _dict['oidcSingleV1SessionTermination'] = self.oidc_single_v1_session_termination.to_dict() + _dict["oidcSingleV1SessionTermination"] = self.oidc_single_v1_session_termination.to_dict() # override the default output from pydantic by calling `to_dict()` of disable_user_token_event if self.disable_user_token_event: - _dict['disableUserTokenEvent'] = self.disable_user_token_event.to_dict() + _dict["disableUserTokenEvent"] = self.disable_user_token_event.to_dict() # override the default output from pydantic by calling `to_dict()` of enable_back_channel_logout if self.enable_back_channel_logout: - _dict['enableBackChannelLogout'] = self.enable_back_channel_logout.to_dict() + _dict["enableBackChannelLogout"] = self.enable_back_channel_logout.to_dict() # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict['loginV2'] = self.login_v2.to_dict() + _dict["loginV2"] = self.login_v2.to_dict() # override the default output from pydantic by calling `to_dict()` of permission_check_v2 if self.permission_check_v2: - _dict['permissionCheckV2'] = self.permission_check_v2.to_dict() + _dict["permissionCheckV2"] = self.permission_check_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_legal_and_support_settings_response.py b/zitadel_client/models/v2_get_legal_and_support_settings_response.py index 0df41781..4bb0d64f 100644 --- a/zitadel_client/models/v2_get_legal_and_support_settings_response.py +++ b/zitadel_client/models/v2_get_legal_and_support_settings_response.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from zitadel_client.models.v2_legal_and_support_settings import V2LegalAndSupportSettings -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details +from zitadel_client.models.v2_legal_and_support_settings import ( + V2LegalAndSupportSettings, +) + + class V2GetLegalAndSupportSettingsResponse(BaseModel): """ V2GetLegalAndSupportSettingsResponse @@ -76,10 +80,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_lockout_settings_response.py b/zitadel_client/models/v2_get_lockout_settings_response.py index 94d33420..e906adb6 100644 --- a/zitadel_client/models/v2_get_lockout_settings_response.py +++ b/zitadel_client/models/v2_get_lockout_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_lockout_settings import V2LockoutSettings -from typing import Optional, Set -from typing_extensions import Self + class V2GetLockoutSettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_login_settings_response.py b/zitadel_client/models/v2_get_login_settings_response.py index 40843924..dbfba327 100644 --- a/zitadel_client/models/v2_get_login_settings_response.py +++ b/zitadel_client/models/v2_get_login_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_login_settings import V2LoginSettings -from typing import Optional, Set -from typing_extensions import Self + class V2GetLoginSettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_organization_features_response.py b/zitadel_client/models/v2_get_organization_features_response.py index 1407e76e..639feb0c 100644 --- a/zitadel_client/models/v2_get_organization_features_response.py +++ b/zitadel_client/models/v2_get_organization_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2GetOrganizationFeaturesResponse(BaseModel): """ V2GetOrganizationFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_password_complexity_settings_response.py b/zitadel_client/models/v2_get_password_complexity_settings_response.py index 0ae5be98..04c82ee2 100644 --- a/zitadel_client/models/v2_get_password_complexity_settings_response.py +++ b/zitadel_client/models/v2_get_password_complexity_settings_response.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from zitadel_client.models.v2_password_complexity_settings import V2PasswordComplexitySettings -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details +from zitadel_client.models.v2_password_complexity_settings import ( + V2PasswordComplexitySettings, +) + + class V2GetPasswordComplexitySettingsResponse(BaseModel): """ V2GetPasswordComplexitySettingsResponse @@ -76,10 +80,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_password_expiry_settings_response.py b/zitadel_client/models/v2_get_password_expiry_settings_response.py index f6270cb0..292bb24c 100644 --- a/zitadel_client/models/v2_get_password_expiry_settings_response.py +++ b/zitadel_client/models/v2_get_password_expiry_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_password_expiry_settings import V2PasswordExpirySettings -from typing import Optional, Set -from typing_extensions import Self + class V2GetPasswordExpirySettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_security_settings_response.py b/zitadel_client/models/v2_get_security_settings_response.py index 027e087e..7a2d9264 100644 --- a/zitadel_client/models/v2_get_security_settings_response.py +++ b/zitadel_client/models/v2_get_security_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_security_settings import V2SecuritySettings -from typing import Optional, Set -from typing_extensions import Self + class V2GetSecuritySettingsResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict['settings'] = self.settings.to_dict() + _dict["settings"] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_session_response.py b/zitadel_client/models/v2_get_session_response.py index e6dc8732..f61163aa 100644 --- a/zitadel_client/models/v2_get_session_response.py +++ b/zitadel_client/models/v2_get_session_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_session1 import V2Session1 -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_session1 import V2Session1 + + class V2GetSessionResponse(BaseModel): """ V2GetSessionResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of session if self.session: - _dict['session'] = self.session.to_dict() + _dict["session"] = self.session.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_system_features_response.py b/zitadel_client/models/v2_get_system_features_response.py index b449337d..fa199558 100644 --- a/zitadel_client/models/v2_get_system_features_response.py +++ b/zitadel_client/models/v2_get_system_features_response.py @@ -13,18 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_feature_flag import V2FeatureFlag -from zitadel_client.models.v2_improved_performance_feature_flag import V2ImprovedPerformanceFeatureFlag +from zitadel_client.models.v2_improved_performance_feature_flag import ( + V2ImprovedPerformanceFeatureFlag, +) from zitadel_client.models.v2_login_v2_feature_flag import V2LoginV2FeatureFlag -from typing import Optional, Set -from typing_extensions import Self + class V2GetSystemFeaturesResponse(BaseModel): """ @@ -89,43 +93,43 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of login_default_org if self.login_default_org: - _dict['loginDefaultOrg'] = self.login_default_org.to_dict() + _dict["loginDefaultOrg"] = self.login_default_org.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_trigger_introspection_projections if self.oidc_trigger_introspection_projections: - _dict['oidcTriggerIntrospectionProjections'] = self.oidc_trigger_introspection_projections.to_dict() + _dict["oidcTriggerIntrospectionProjections"] = self.oidc_trigger_introspection_projections.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_legacy_introspection if self.oidc_legacy_introspection: - _dict['oidcLegacyIntrospection'] = self.oidc_legacy_introspection.to_dict() + _dict["oidcLegacyIntrospection"] = self.oidc_legacy_introspection.to_dict() # override the default output from pydantic by calling `to_dict()` of user_schema if self.user_schema: - _dict['userSchema'] = self.user_schema.to_dict() + _dict["userSchema"] = self.user_schema.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_token_exchange if self.oidc_token_exchange: - _dict['oidcTokenExchange'] = self.oidc_token_exchange.to_dict() + _dict["oidcTokenExchange"] = self.oidc_token_exchange.to_dict() # override the default output from pydantic by calling `to_dict()` of actions if self.actions: - _dict['actions'] = self.actions.to_dict() + _dict["actions"] = self.actions.to_dict() # override the default output from pydantic by calling `to_dict()` of improved_performance if self.improved_performance: - _dict['improvedPerformance'] = self.improved_performance.to_dict() + _dict["improvedPerformance"] = self.improved_performance.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_single_v1_session_termination if self.oidc_single_v1_session_termination: - _dict['oidcSingleV1SessionTermination'] = self.oidc_single_v1_session_termination.to_dict() + _dict["oidcSingleV1SessionTermination"] = self.oidc_single_v1_session_termination.to_dict() # override the default output from pydantic by calling `to_dict()` of disable_user_token_event if self.disable_user_token_event: - _dict['disableUserTokenEvent'] = self.disable_user_token_event.to_dict() + _dict["disableUserTokenEvent"] = self.disable_user_token_event.to_dict() # override the default output from pydantic by calling `to_dict()` of enable_back_channel_logout if self.enable_back_channel_logout: - _dict['enableBackChannelLogout'] = self.enable_back_channel_logout.to_dict() + _dict["enableBackChannelLogout"] = self.enable_back_channel_logout.to_dict() # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict['loginV2'] = self.login_v2.to_dict() + _dict["loginV2"] = self.login_v2.to_dict() # override the default output from pydantic by calling `to_dict()` of permission_check_v2 if self.permission_check_v2: - _dict['permissionCheckV2'] = self.permission_check_v2.to_dict() + _dict["permissionCheckV2"] = self.permission_check_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_user_by_id_response.py b/zitadel_client/models/v2_get_user_by_id_response.py index 7cf0d139..59da8269 100644 --- a/zitadel_client/models/v2_get_user_by_id_response.py +++ b/zitadel_client/models/v2_get_user_by_id_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_user import V2User -from typing import Optional, Set -from typing_extensions import Self + class V2GetUserByIDResponse(BaseModel): """ @@ -76,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict['user'] = self.user.to_dict() + _dict["user"] = self.user.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_user_features_response.py b/zitadel_client/models/v2_get_user_features_response.py index 291d41bb..08c0fc5d 100644 --- a/zitadel_client/models/v2_get_user_features_response.py +++ b/zitadel_client/models/v2_get_user_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2GetUserFeaturesResponse(BaseModel): """ V2GetUserFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_git_hub_config.py b/zitadel_client/models/v2_git_hub_config.py index c8001688..0bbc6a66 100644 --- a/zitadel_client/models/v2_git_hub_config.py +++ b/zitadel_client/models/v2_git_hub_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GitHubConfig(BaseModel): """ V2GitHubConfig diff --git a/zitadel_client/models/v2_git_hub_enterprise_server_config.py b/zitadel_client/models/v2_git_hub_enterprise_server_config.py index c3c9d81f..4d0a5856 100644 --- a/zitadel_client/models/v2_git_hub_enterprise_server_config.py +++ b/zitadel_client/models/v2_git_hub_enterprise_server_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GitHubEnterpriseServerConfig(BaseModel): """ V2GitHubEnterpriseServerConfig diff --git a/zitadel_client/models/v2_git_lab_config.py b/zitadel_client/models/v2_git_lab_config.py index fa45d897..79216e59 100644 --- a/zitadel_client/models/v2_git_lab_config.py +++ b/zitadel_client/models/v2_git_lab_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GitLabConfig(BaseModel): """ V2GitLabConfig diff --git a/zitadel_client/models/v2_git_lab_self_hosted_config.py b/zitadel_client/models/v2_git_lab_self_hosted_config.py index e320b0c5..5dfc3b7a 100644 --- a/zitadel_client/models/v2_git_lab_self_hosted_config.py +++ b/zitadel_client/models/v2_git_lab_self_hosted_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GitLabSelfHostedConfig(BaseModel): """ V2GitLabSelfHostedConfig diff --git a/zitadel_client/models/v2_google_config.py b/zitadel_client/models/v2_google_config.py index f0826e08..b26f7abd 100644 --- a/zitadel_client/models/v2_google_config.py +++ b/zitadel_client/models/v2_google_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2GoogleConfig(BaseModel): """ V2GoogleConfig diff --git a/zitadel_client/models/v2_hashed_password.py b/zitadel_client/models/v2_hashed_password.py index a35e0576..15fdf430 100644 --- a/zitadel_client/models/v2_hashed_password.py +++ b/zitadel_client/models/v2_hashed_password.py @@ -13,21 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2HashedPassword(BaseModel): """ V2HashedPassword """ # noqa: E501 - hash: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(description="\"Encoded hash of a password in Modular Crypt Format: https://zitadel.com/docs/concepts/architecture/secrets#hashed-secrets\"") + hash: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(description='"Encoded hash of a password in Modular Crypt Format: https://zitadel.com/docs/concepts/architecture/secrets#hashed-secrets"') change_required: Optional[StrictBool] = Field(default=None, alias="changeRequired") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["hash", "changeRequired"] diff --git a/zitadel_client/models/v2_human_email.py b/zitadel_client/models/v2_human_email.py index d3a843a1..64a9d89f 100644 --- a/zitadel_client/models/v2_human_email.py +++ b/zitadel_client/models/v2_human_email.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2HumanEmail(BaseModel): """ diff --git a/zitadel_client/models/v2_human_mfa_init_skipped_response.py b/zitadel_client/models/v2_human_mfa_init_skipped_response.py index 6bb23215..7c097ed3 100644 --- a/zitadel_client/models/v2_human_mfa_init_skipped_response.py +++ b/zitadel_client/models/v2_human_mfa_init_skipped_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2HumanMFAInitSkippedResponse(BaseModel): """ V2HumanMFAInitSkippedResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_human_phone.py b/zitadel_client/models/v2_human_phone.py index adb80a2b..96d1229e 100644 --- a/zitadel_client/models/v2_human_phone.py +++ b/zitadel_client/models/v2_human_phone.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2HumanPhone(BaseModel): """ diff --git a/zitadel_client/models/v2_human_profile.py b/zitadel_client/models/v2_human_profile.py index b065b7a4..fd69cafc 100644 --- a/zitadel_client/models/v2_human_profile.py +++ b/zitadel_client/models/v2_human_profile.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_gender import V2Gender -from typing import Optional, Set -from typing_extensions import Self + class V2HumanProfile(BaseModel): """ diff --git a/zitadel_client/models/v2_human_user.py b/zitadel_client/models/v2_human_user.py index cc77a57b..8e6f80fb 100644 --- a/zitadel_client/models/v2_human_user.py +++ b/zitadel_client/models/v2_human_user.py @@ -13,19 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_human_email import V2HumanEmail from zitadel_client.models.v2_human_phone import V2HumanPhone from zitadel_client.models.v2_human_profile import V2HumanProfile from zitadel_client.models.v2_user_state import V2UserState -from typing import Optional, Set -from typing_extensions import Self + class V2HumanUser(BaseModel): """ @@ -88,13 +90,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict['profile'] = self.profile.to_dict() + _dict["profile"] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict['email'] = self.email.to_dict() + _dict["email"] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict['phone'] = self.phone.to_dict() + _dict["phone"] = self.phone.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_identity_provider.py b/zitadel_client/models/v2_identity_provider.py index 14ca4804..06b7c10e 100644 --- a/zitadel_client/models/v2_identity_provider.py +++ b/zitadel_client/models/v2_identity_provider.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_identity_provider_type import V2IdentityProviderType from zitadel_client.models.zitadelidpv2_options1 import Zitadelidpv2Options1 -from typing import Optional, Set -from typing_extensions import Self + class V2IdentityProvider(BaseModel): """ @@ -78,7 +80,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of options if self.options: - _dict['options'] = self.options.to_dict() + _dict["options"] = self.options.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_identity_provider_type.py b/zitadel_client/models/v2_identity_provider_type.py index 5af37e32..69d162f8 100644 --- a/zitadel_client/models/v2_identity_provider_type.py +++ b/zitadel_client/models/v2_identity_provider_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,19 +28,19 @@ class V2IdentityProviderType(str, Enum): """ allowed enum values """ - IDENTITY_PROVIDER_TYPE_UNSPECIFIED = 'IDENTITY_PROVIDER_TYPE_UNSPECIFIED' - IDENTITY_PROVIDER_TYPE_OIDC = 'IDENTITY_PROVIDER_TYPE_OIDC' - IDENTITY_PROVIDER_TYPE_JWT = 'IDENTITY_PROVIDER_TYPE_JWT' - IDENTITY_PROVIDER_TYPE_LDAP = 'IDENTITY_PROVIDER_TYPE_LDAP' - IDENTITY_PROVIDER_TYPE_OAUTH = 'IDENTITY_PROVIDER_TYPE_OAUTH' - IDENTITY_PROVIDER_TYPE_AZURE_AD = 'IDENTITY_PROVIDER_TYPE_AZURE_AD' - IDENTITY_PROVIDER_TYPE_GITHUB = 'IDENTITY_PROVIDER_TYPE_GITHUB' - IDENTITY_PROVIDER_TYPE_GITHUB_ES = 'IDENTITY_PROVIDER_TYPE_GITHUB_ES' - IDENTITY_PROVIDER_TYPE_GITLAB = 'IDENTITY_PROVIDER_TYPE_GITLAB' - IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED = 'IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED' - IDENTITY_PROVIDER_TYPE_GOOGLE = 'IDENTITY_PROVIDER_TYPE_GOOGLE' - IDENTITY_PROVIDER_TYPE_SAML = 'IDENTITY_PROVIDER_TYPE_SAML' - IDENTITY_PROVIDER_TYPE_APPLE = 'IDENTITY_PROVIDER_TYPE_APPLE' + IDENTITY_PROVIDER_TYPE_UNSPECIFIED = "IDENTITY_PROVIDER_TYPE_UNSPECIFIED" + IDENTITY_PROVIDER_TYPE_OIDC = "IDENTITY_PROVIDER_TYPE_OIDC" + IDENTITY_PROVIDER_TYPE_JWT = "IDENTITY_PROVIDER_TYPE_JWT" + IDENTITY_PROVIDER_TYPE_LDAP = "IDENTITY_PROVIDER_TYPE_LDAP" + IDENTITY_PROVIDER_TYPE_OAUTH = "IDENTITY_PROVIDER_TYPE_OAUTH" + IDENTITY_PROVIDER_TYPE_AZURE_AD = "IDENTITY_PROVIDER_TYPE_AZURE_AD" + IDENTITY_PROVIDER_TYPE_GITHUB = "IDENTITY_PROVIDER_TYPE_GITHUB" + IDENTITY_PROVIDER_TYPE_GITHUB_ES = "IDENTITY_PROVIDER_TYPE_GITHUB_ES" + IDENTITY_PROVIDER_TYPE_GITLAB = "IDENTITY_PROVIDER_TYPE_GITLAB" + IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED = "IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED" + IDENTITY_PROVIDER_TYPE_GOOGLE = "IDENTITY_PROVIDER_TYPE_GOOGLE" + IDENTITY_PROVIDER_TYPE_SAML = "IDENTITY_PROVIDER_TYPE_SAML" + IDENTITY_PROVIDER_TYPE_APPLE = "IDENTITY_PROVIDER_TYPE_APPLE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idp.py b/zitadel_client/models/v2_idp.py index 4eaf95bd..a5d26893 100644 --- a/zitadel_client/models/v2_idp.py +++ b/zitadel_client/models/v2_idp.py @@ -13,18 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_config import V2IDPConfig from zitadel_client.models.v2_idp_state import V2IDPState from zitadel_client.models.v2_idp_type import V2IDPType -from typing import Optional, Set -from typing_extensions import Self + class V2IDP(BaseModel): """ @@ -82,10 +84,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of config if self.config: - _dict['config'] = self.config.to_dict() + _dict["config"] = self.config.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_config.py b/zitadel_client/models/v2_idp_config.py index a810f208..6f0a05b1 100644 --- a/zitadel_client/models/v2_idp_config.py +++ b/zitadel_client/models/v2_idp_config.py @@ -13,17 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_apple_config import V2AppleConfig from zitadel_client.models.v2_azure_ad_config import V2AzureADConfig from zitadel_client.models.v2_generic_oidc_config import V2GenericOIDCConfig from zitadel_client.models.v2_git_hub_config import V2GitHubConfig -from zitadel_client.models.v2_git_hub_enterprise_server_config import V2GitHubEnterpriseServerConfig +from zitadel_client.models.v2_git_hub_enterprise_server_config import ( + V2GitHubEnterpriseServerConfig, +) from zitadel_client.models.v2_git_lab_config import V2GitLabConfig from zitadel_client.models.v2_git_lab_self_hosted_config import V2GitLabSelfHostedConfig from zitadel_client.models.v2_google_config import V2GoogleConfig @@ -32,8 +37,7 @@ from zitadel_client.models.v2_o_auth_config import V2OAuthConfig from zitadel_client.models.v2_saml_config import V2SAMLConfig from zitadel_client.models.zitadelidpv2_options import Zitadelidpv2Options -from typing import Optional, Set -from typing_extensions import Self + class V2IDPConfig(BaseModel): """ @@ -98,43 +102,43 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of options if self.options: - _dict['options'] = self.options.to_dict() + _dict["options"] = self.options.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict['ldap'] = self.ldap.to_dict() + _dict["ldap"] = self.ldap.to_dict() # override the default output from pydantic by calling `to_dict()` of google if self.google: - _dict['google'] = self.google.to_dict() + _dict["google"] = self.google.to_dict() # override the default output from pydantic by calling `to_dict()` of oauth if self.oauth: - _dict['oauth'] = self.oauth.to_dict() + _dict["oauth"] = self.oauth.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc if self.oidc: - _dict['oidc'] = self.oidc.to_dict() + _dict["oidc"] = self.oidc.to_dict() # override the default output from pydantic by calling `to_dict()` of jwt if self.jwt: - _dict['jwt'] = self.jwt.to_dict() + _dict["jwt"] = self.jwt.to_dict() # override the default output from pydantic by calling `to_dict()` of github if self.github: - _dict['github'] = self.github.to_dict() + _dict["github"] = self.github.to_dict() # override the default output from pydantic by calling `to_dict()` of github_es if self.github_es: - _dict['githubEs'] = self.github_es.to_dict() + _dict["githubEs"] = self.github_es.to_dict() # override the default output from pydantic by calling `to_dict()` of gitlab if self.gitlab: - _dict['gitlab'] = self.gitlab.to_dict() + _dict["gitlab"] = self.gitlab.to_dict() # override the default output from pydantic by calling `to_dict()` of gitlab_self_hosted if self.gitlab_self_hosted: - _dict['gitlabSelfHosted'] = self.gitlab_self_hosted.to_dict() + _dict["gitlabSelfHosted"] = self.gitlab_self_hosted.to_dict() # override the default output from pydantic by calling `to_dict()` of azure_ad if self.azure_ad: - _dict['azureAd'] = self.azure_ad.to_dict() + _dict["azureAd"] = self.azure_ad.to_dict() # override the default output from pydantic by calling `to_dict()` of apple if self.apple: - _dict['apple'] = self.apple.to_dict() + _dict["apple"] = self.apple.to_dict() # override the default output from pydantic by calling `to_dict()` of saml if self.saml: - _dict['saml'] = self.saml.to_dict() + _dict["saml"] = self.saml.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_information.py b/zitadel_client/models/v2_idp_information.py index 697a88ee..3fc0d8cf 100644 --- a/zitadel_client/models/v2_idp_information.py +++ b/zitadel_client/models/v2_idp_information.py @@ -13,18 +13,26 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_idpldap_access_information import V2IDPLDAPAccessInformation -from zitadel_client.models.v2_idpo_auth_access_information import V2IDPOAuthAccessInformation -from zitadel_client.models.v2_idpsaml_access_information import V2IDPSAMLAccessInformation -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_idpldap_access_information import ( + V2IDPLDAPAccessInformation, +) +from zitadel_client.models.v2_idpo_auth_access_information import ( + V2IDPOAuthAccessInformation, +) +from zitadel_client.models.v2_idpsaml_access_information import ( + V2IDPSAMLAccessInformation, +) + + class V2IDPInformation(BaseModel): """ V2IDPInformation @@ -82,13 +90,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of oauth if self.oauth: - _dict['oauth'] = self.oauth.to_dict() + _dict["oauth"] = self.oauth.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict['ldap'] = self.ldap.to_dict() + _dict["ldap"] = self.ldap.to_dict() # override the default output from pydantic by calling `to_dict()` of saml if self.saml: - _dict['saml'] = self.saml.to_dict() + _dict["saml"] = self.saml.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_intent.py b/zitadel_client/models/v2_idp_intent.py index 13c1f112..3d75f2bc 100644 --- a/zitadel_client/models/v2_idp_intent.py +++ b/zitadel_client/models/v2_idp_intent.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2IDPIntent(BaseModel): """ diff --git a/zitadel_client/models/v2_idp_link.py b/zitadel_client/models/v2_idp_link.py index 27806a54..c4b32215 100644 --- a/zitadel_client/models/v2_idp_link.py +++ b/zitadel_client/models/v2_idp_link.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2IDPLink(BaseModel): """ diff --git a/zitadel_client/models/v2_idp_state.py b/zitadel_client/models/v2_idp_state.py index f082afbd..9c89c7e5 100644 --- a/zitadel_client/models/v2_idp_state.py +++ b/zitadel_client/models/v2_idp_state.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,11 +28,11 @@ class V2IDPState(str, Enum): """ allowed enum values """ - IDP_STATE_UNSPECIFIED = 'IDP_STATE_UNSPECIFIED' - IDP_STATE_ACTIVE = 'IDP_STATE_ACTIVE' - IDP_STATE_INACTIVE = 'IDP_STATE_INACTIVE' - IDP_STATE_REMOVED = 'IDP_STATE_REMOVED' - IDP_STATE_MIGRATED = 'IDP_STATE_MIGRATED' + IDP_STATE_UNSPECIFIED = "IDP_STATE_UNSPECIFIED" + IDP_STATE_ACTIVE = "IDP_STATE_ACTIVE" + IDP_STATE_INACTIVE = "IDP_STATE_INACTIVE" + IDP_STATE_REMOVED = "IDP_STATE_REMOVED" + IDP_STATE_MIGRATED = "IDP_STATE_MIGRATED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idp_type.py b/zitadel_client/models/v2_idp_type.py index 9d236ba3..b2ae90a3 100644 --- a/zitadel_client/models/v2_idp_type.py +++ b/zitadel_client/models/v2_idp_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,19 +28,19 @@ class V2IDPType(str, Enum): """ allowed enum values """ - IDP_TYPE_UNSPECIFIED = 'IDP_TYPE_UNSPECIFIED' - IDP_TYPE_OIDC = 'IDP_TYPE_OIDC' - IDP_TYPE_JWT = 'IDP_TYPE_JWT' - IDP_TYPE_LDAP = 'IDP_TYPE_LDAP' - IDP_TYPE_OAUTH = 'IDP_TYPE_OAUTH' - IDP_TYPE_AZURE_AD = 'IDP_TYPE_AZURE_AD' - IDP_TYPE_GITHUB = 'IDP_TYPE_GITHUB' - IDP_TYPE_GITHUB_ES = 'IDP_TYPE_GITHUB_ES' - IDP_TYPE_GITLAB = 'IDP_TYPE_GITLAB' - IDP_TYPE_GITLAB_SELF_HOSTED = 'IDP_TYPE_GITLAB_SELF_HOSTED' - IDP_TYPE_GOOGLE = 'IDP_TYPE_GOOGLE' - IDP_TYPE_APPLE = 'IDP_TYPE_APPLE' - IDP_TYPE_SAML = 'IDP_TYPE_SAML' + IDP_TYPE_UNSPECIFIED = "IDP_TYPE_UNSPECIFIED" + IDP_TYPE_OIDC = "IDP_TYPE_OIDC" + IDP_TYPE_JWT = "IDP_TYPE_JWT" + IDP_TYPE_LDAP = "IDP_TYPE_LDAP" + IDP_TYPE_OAUTH = "IDP_TYPE_OAUTH" + IDP_TYPE_AZURE_AD = "IDP_TYPE_AZURE_AD" + IDP_TYPE_GITHUB = "IDP_TYPE_GITHUB" + IDP_TYPE_GITHUB_ES = "IDP_TYPE_GITHUB_ES" + IDP_TYPE_GITLAB = "IDP_TYPE_GITLAB" + IDP_TYPE_GITLAB_SELF_HOSTED = "IDP_TYPE_GITLAB_SELF_HOSTED" + IDP_TYPE_GOOGLE = "IDP_TYPE_GOOGLE" + IDP_TYPE_APPLE = "IDP_TYPE_APPLE" + IDP_TYPE_SAML = "IDP_TYPE_SAML" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idpldap_access_information.py b/zitadel_client/models/v2_idpldap_access_information.py index d4bfb7f9..c850b51e 100644 --- a/zitadel_client/models/v2_idpldap_access_information.py +++ b/zitadel_client/models/v2_idpldap_access_information.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2IDPLDAPAccessInformation(BaseModel): """ V2IDPLDAPAccessInformation diff --git a/zitadel_client/models/v2_idpo_auth_access_information.py b/zitadel_client/models/v2_idpo_auth_access_information.py index 266ef87e..35a79047 100644 --- a/zitadel_client/models/v2_idpo_auth_access_information.py +++ b/zitadel_client/models/v2_idpo_auth_access_information.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2IDPOAuthAccessInformation(BaseModel): """ V2IDPOAuthAccessInformation diff --git a/zitadel_client/models/v2_idpsaml_access_information.py b/zitadel_client/models/v2_idpsaml_access_information.py index 05f68046..404b9743 100644 --- a/zitadel_client/models/v2_idpsaml_access_information.py +++ b/zitadel_client/models/v2_idpsaml_access_information.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2IDPSAMLAccessInformation(BaseModel): """ @@ -31,7 +31,7 @@ class V2IDPSAMLAccessInformation(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["assertion"] - @field_validator('assertion') + @field_validator("assertion") def assertion_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: diff --git a/zitadel_client/models/v2_ids_query.py b/zitadel_client/models/v2_ids_query.py index e72bd8d2..9116855c 100644 --- a/zitadel_client/models/v2_ids_query.py +++ b/zitadel_client/models/v2_ids_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2IDsQuery(BaseModel): """ V2IDsQuery diff --git a/zitadel_client/models/v2_improved_performance.py b/zitadel_client/models/v2_improved_performance.py index 7d3ef7b7..c314a9f9 100644 --- a/zitadel_client/models/v2_improved_performance.py +++ b/zitadel_client/models/v2_improved_performance.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,12 +28,12 @@ class V2ImprovedPerformance(str, Enum): """ allowed enum values """ - IMPROVED_PERFORMANCE_UNSPECIFIED = 'IMPROVED_PERFORMANCE_UNSPECIFIED' - IMPROVED_PERFORMANCE_ORG_BY_ID = 'IMPROVED_PERFORMANCE_ORG_BY_ID' - IMPROVED_PERFORMANCE_PROJECT_GRANT = 'IMPROVED_PERFORMANCE_PROJECT_GRANT' - IMPROVED_PERFORMANCE_PROJECT = 'IMPROVED_PERFORMANCE_PROJECT' - IMPROVED_PERFORMANCE_USER_GRANT = 'IMPROVED_PERFORMANCE_USER_GRANT' - IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED = 'IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED' + IMPROVED_PERFORMANCE_UNSPECIFIED = "IMPROVED_PERFORMANCE_UNSPECIFIED" + IMPROVED_PERFORMANCE_ORG_BY_ID = "IMPROVED_PERFORMANCE_ORG_BY_ID" + IMPROVED_PERFORMANCE_PROJECT_GRANT = "IMPROVED_PERFORMANCE_PROJECT_GRANT" + IMPROVED_PERFORMANCE_PROJECT = "IMPROVED_PERFORMANCE_PROJECT" + IMPROVED_PERFORMANCE_USER_GRANT = "IMPROVED_PERFORMANCE_USER_GRANT" + IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED = "IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_improved_performance_feature_flag.py b/zitadel_client/models/v2_improved_performance_feature_flag.py index 96e99285..1e669b41 100644 --- a/zitadel_client/models/v2_improved_performance_feature_flag.py +++ b/zitadel_client/models/v2_improved_performance_feature_flag.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_source import V2Source -from typing import Optional, Set -from typing_extensions import Self + class V2ImprovedPerformanceFeatureFlag(BaseModel): """ diff --git a/zitadel_client/models/v2_in_user_emails_query.py b/zitadel_client/models/v2_in_user_emails_query.py index b010012c..96fe6c12 100644 --- a/zitadel_client/models/v2_in_user_emails_query.py +++ b/zitadel_client/models/v2_in_user_emails_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2InUserEmailsQuery(BaseModel): """ Query for users with email in list of emails. diff --git a/zitadel_client/models/v2_in_user_id_query.py b/zitadel_client/models/v2_in_user_id_query.py index 4129c98d..b2f0f8fd 100644 --- a/zitadel_client/models/v2_in_user_id_query.py +++ b/zitadel_client/models/v2_in_user_id_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2InUserIDQuery(BaseModel): """ Query for users with ID in list of IDs. diff --git a/zitadel_client/models/v2_intent_factor.py b/zitadel_client/models/v2_intent_factor.py index ed8f25ca..61cd91fa 100644 --- a/zitadel_client/models/v2_intent_factor.py +++ b/zitadel_client/models/v2_intent_factor.py @@ -13,21 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2IntentFactor(BaseModel): """ V2IntentFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when an intent was last checked\"", alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description='"time when an intent was last checked"', alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_jwt_config.py b/zitadel_client/models/v2_jwt_config.py index 0ac42259..51d041ef 100644 --- a/zitadel_client/models/v2_jwt_config.py +++ b/zitadel_client/models/v2_jwt_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2JWTConfig(BaseModel): """ V2JWTConfig diff --git a/zitadel_client/models/v2_last_name_query.py b/zitadel_client/models/v2_last_name_query.py index 95a24875..1c211278 100644 --- a/zitadel_client/models/v2_last_name_query.py +++ b/zitadel_client/models/v2_last_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2LastNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_ldap_attributes.py b/zitadel_client/models/v2_ldap_attributes.py index 2952e36e..2f85cf75 100644 --- a/zitadel_client/models/v2_ldap_attributes.py +++ b/zitadel_client/models/v2_ldap_attributes.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2LDAPAttributes(BaseModel): """ V2LDAPAttributes diff --git a/zitadel_client/models/v2_ldap_config.py b/zitadel_client/models/v2_ldap_config.py index b210b99b..cf0b8627 100644 --- a/zitadel_client/models/v2_ldap_config.py +++ b/zitadel_client/models/v2_ldap_config.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_ldap_attributes import V2LDAPAttributes -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_ldap_attributes import V2LDAPAttributes + + class V2LDAPConfig(BaseModel): """ V2LDAPConfig @@ -82,7 +84,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of attributes if self.attributes: - _dict['attributes'] = self.attributes.to_dict() + _dict["attributes"] = self.attributes.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_ldap_credentials.py b/zitadel_client/models/v2_ldap_credentials.py index 688a2ccd..061a6134 100644 --- a/zitadel_client/models/v2_ldap_credentials.py +++ b/zitadel_client/models/v2_ldap_credentials.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2LDAPCredentials(BaseModel): """ diff --git a/zitadel_client/models/v2_legal_and_support_settings.py b/zitadel_client/models/v2_legal_and_support_settings.py index 697486bf..2d7c9717 100644 --- a/zitadel_client/models/v2_legal_and_support_settings.py +++ b/zitadel_client/models/v2_legal_and_support_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType + + class V2LegalAndSupportSettings(BaseModel): """ V2LegalAndSupportSettings diff --git a/zitadel_client/models/v2_list_authentication_factors_response.py b/zitadel_client/models/v2_list_authentication_factors_response.py index a94c9ea2..d698e0fc 100644 --- a/zitadel_client/models/v2_list_authentication_factors_response.py +++ b/zitadel_client/models/v2_list_authentication_factors_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_auth_factor import V2AuthFactor -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_auth_factor import V2AuthFactor + + class V2ListAuthenticationFactorsResponse(BaseModel): """ V2ListAuthenticationFactorsResponse @@ -78,7 +80,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict['result'] = _items + _dict["result"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_authentication_method_types_response.py b/zitadel_client/models/v2_list_authentication_method_types_response.py index 3d68d9e6..cdef7ba2 100644 --- a/zitadel_client/models/v2_list_authentication_method_types_response.py +++ b/zitadel_client/models/v2_list_authentication_method_types_response.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_authentication_method_type import V2AuthenticationMethodType -from zitadel_client.models.v2_list_details import V2ListDetails -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_authentication_method_type import ( + V2AuthenticationMethodType, +) +from zitadel_client.models.v2_list_details import V2ListDetails + + class V2ListAuthenticationMethodTypesResponse(BaseModel): """ V2ListAuthenticationMethodTypesResponse @@ -76,7 +80,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_details.py b/zitadel_client/models/v2_list_details.py index 02ed59f7..9e23ae1e 100644 --- a/zitadel_client/models/v2_list_details.py +++ b/zitadel_client/models/v2_list_details.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2ListDetails(BaseModel): """ V2ListDetails diff --git a/zitadel_client/models/v2_list_idp_links_response.py b/zitadel_client/models/v2_list_idp_links_response.py index 3b045e0b..254bed59 100644 --- a/zitadel_client/models/v2_list_idp_links_response.py +++ b/zitadel_client/models/v2_list_idp_links_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_list_details import V2ListDetails -from typing import Optional, Set -from typing_extensions import Self + class V2ListIDPLinksResponse(BaseModel): """ @@ -76,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict['result'] = _items + _dict["result"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_organizations_request.py b/zitadel_client/models/v2_list_organizations_request.py index 41ea4c67..89c10fd9 100644 --- a/zitadel_client/models/v2_list_organizations_request.py +++ b/zitadel_client/models/v2_list_organizations_request.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_list_query import V2ListQuery from zitadel_client.models.v2_organization_field_name import V2OrganizationFieldName from zitadel_client.models.zitadelorgv2_search_query import Zitadelorgv2SearchQuery -from typing import Optional, Set -from typing_extensions import Self + class V2ListOrganizationsRequest(BaseModel): """ @@ -78,14 +80,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict['query'] = self.query.to_dict() + _dict["query"] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict['queries'] = _items + _dict["queries"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_organizations_response.py b/zitadel_client/models/v2_list_organizations_response.py index a4d7afeb..b7f08473 100644 --- a/zitadel_client/models/v2_list_organizations_response.py +++ b/zitadel_client/models/v2_list_organizations_response.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_organization_field_name import V2OrganizationFieldName from zitadel_client.models.zitadelorgv2_organization import Zitadelorgv2Organization -from typing import Optional, Set -from typing_extensions import Self + class V2ListOrganizationsResponse(BaseModel): """ @@ -78,14 +80,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict['result'] = _items + _dict["result"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_passkeys_response.py b/zitadel_client/models/v2_list_passkeys_response.py index 96a7d1dc..1a23492e 100644 --- a/zitadel_client/models/v2_list_passkeys_response.py +++ b/zitadel_client/models/v2_list_passkeys_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_passkey import V2Passkey -from typing import Optional, Set -from typing_extensions import Self + class V2ListPasskeysResponse(BaseModel): """ @@ -76,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict['result'] = _items + _dict["result"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_query.py b/zitadel_client/models/v2_list_query.py index e0db26c4..758113f3 100644 --- a/zitadel_client/models/v2_list_query.py +++ b/zitadel_client/models/v2_list_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2ListQuery(BaseModel): """ Object unspecific list filters like offset, limit and asc/desc. diff --git a/zitadel_client/models/v2_list_sessions_request.py b/zitadel_client/models/v2_list_sessions_request.py index 84cb13e7..c03a726a 100644 --- a/zitadel_client/models/v2_list_sessions_request.py +++ b/zitadel_client/models/v2_list_sessions_request.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.objectv2_list_query import Objectv2ListQuery from zitadel_client.models.v2_search_query import V2SearchQuery from zitadel_client.models.v2_session_field_name import V2SessionFieldName -from typing import Optional, Set -from typing_extensions import Self + class V2ListSessionsRequest(BaseModel): """ @@ -78,14 +80,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict['query'] = self.query.to_dict() + _dict["query"] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict['queries'] = _items + _dict["queries"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_sessions_response.py b/zitadel_client/models/v2_list_sessions_response.py index e20e69cd..ef39537c 100644 --- a/zitadel_client/models/v2_list_sessions_response.py +++ b/zitadel_client/models/v2_list_sessions_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.objectv2_list_details import Objectv2ListDetails from zitadel_client.models.v2_session1 import V2Session1 -from typing import Optional, Set -from typing_extensions import Self + class V2ListSessionsResponse(BaseModel): """ @@ -76,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in sessions (list) _items = [] if self.sessions: for _item_sessions in self.sessions: if _item_sessions: _items.append(_item_sessions.to_dict()) - _dict['sessions'] = _items + _dict["sessions"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_users_request.py b/zitadel_client/models/v2_list_users_request.py index d2a9bb05..090d27a6 100644 --- a/zitadel_client/models/v2_list_users_request.py +++ b/zitadel_client/models/v2_list_users_request.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_list_query import V2ListQuery from zitadel_client.models.v2_search_query1 import V2SearchQuery1 from zitadel_client.models.v2_user_field_name import V2UserFieldName -from typing import Optional, Set -from typing_extensions import Self + class V2ListUsersRequest(BaseModel): """ @@ -78,14 +80,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict['query'] = self.query.to_dict() + _dict["query"] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict['queries'] = _items + _dict["queries"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_users_response.py b/zitadel_client/models/v2_list_users_response.py index c39b5f13..2e984ffb 100644 --- a/zitadel_client/models/v2_list_users_response.py +++ b/zitadel_client/models/v2_list_users_response.py @@ -13,17 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_user import V2User from zitadel_client.models.v2_user_field_name import V2UserFieldName -from typing import Optional, Set -from typing_extensions import Self + class V2ListUsersResponse(BaseModel): """ @@ -78,14 +80,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict['result'] = _items + _dict["result"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_lock_user_response.py b/zitadel_client/models/v2_lock_user_response.py index a6528aa8..4e97aa4b 100644 --- a/zitadel_client/models/v2_lock_user_response.py +++ b/zitadel_client/models/v2_lock_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2LockUserResponse(BaseModel): """ V2LockUserResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_lockout_settings.py b/zitadel_client/models/v2_lockout_settings.py index 701bf7fc..8f49005c 100644 --- a/zitadel_client/models/v2_lockout_settings.py +++ b/zitadel_client/models/v2_lockout_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType + + class V2LockoutSettings(BaseModel): """ V2LockoutSettings diff --git a/zitadel_client/models/v2_login_name_query.py b/zitadel_client/models/v2_login_name_query.py index c70e0328..d1c10613 100644 --- a/zitadel_client/models/v2_login_name_query.py +++ b/zitadel_client/models/v2_login_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2LoginNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_login_settings.py b/zitadel_client/models/v2_login_settings.py index b04da0e9..58a9019e 100644 --- a/zitadel_client/models/v2_login_settings.py +++ b/zitadel_client/models/v2_login_settings.py @@ -13,18 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_multi_factor_type import V2MultiFactorType from zitadel_client.models.v2_passkeys_type import V2PasskeysType from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType from zitadel_client.models.v2_second_factor_type import V2SecondFactorType -from typing import Optional, Set -from typing_extensions import Self + class V2LoginSettings(BaseModel): """ diff --git a/zitadel_client/models/v2_login_v2.py b/zitadel_client/models/v2_login_v2.py index b044d6bb..b4766bbc 100644 --- a/zitadel_client/models/v2_login_v2.py +++ b/zitadel_client/models/v2_login_v2.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2LoginV2(BaseModel): """ V2LoginV2 diff --git a/zitadel_client/models/v2_login_v2_feature_flag.py b/zitadel_client/models/v2_login_v2_feature_flag.py index 2a1382c0..c79b221d 100644 --- a/zitadel_client/models/v2_login_v2_feature_flag.py +++ b/zitadel_client/models/v2_login_v2_feature_flag.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_source import V2Source -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_source import V2Source + + class V2LoginV2FeatureFlag(BaseModel): """ V2LoginV2FeatureFlag diff --git a/zitadel_client/models/v2_machine_user.py b/zitadel_client/models/v2_machine_user.py index db05bba9..8e49833b 100644 --- a/zitadel_client/models/v2_machine_user.py +++ b/zitadel_client/models/v2_machine_user.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_access_token_type import V2AccessTokenType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_access_token_type import V2AccessTokenType + + class V2MachineUser(BaseModel): """ V2MachineUser diff --git a/zitadel_client/models/v2_multi_factor_type.py b/zitadel_client/models/v2_multi_factor_type.py index 911cff32..a3f06e88 100644 --- a/zitadel_client/models/v2_multi_factor_type.py +++ b/zitadel_client/models/v2_multi_factor_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,8 +28,8 @@ class V2MultiFactorType(str, Enum): """ allowed enum values """ - MULTI_FACTOR_TYPE_UNSPECIFIED = 'MULTI_FACTOR_TYPE_UNSPECIFIED' - MULTI_FACTOR_TYPE_U2_F_WITH_VERIFICATION = 'MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION' + MULTI_FACTOR_TYPE_UNSPECIFIED = "MULTI_FACTOR_TYPE_UNSPECIFIED" + MULTI_FACTOR_TYPE_U2_F_WITH_VERIFICATION = "MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_nick_name_query.py b/zitadel_client/models/v2_nick_name_query.py index 8361b4c2..3126472c 100644 --- a/zitadel_client/models/v2_nick_name_query.py +++ b/zitadel_client/models/v2_nick_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2NickNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_not_query.py b/zitadel_client/models/v2_not_query.py index a9172154..c8f813a3 100644 --- a/zitadel_client/models/v2_not_query.py +++ b/zitadel_client/models/v2_not_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2NotQuery(BaseModel): """ Negate the sub-condition. @@ -73,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict['query'] = self.query.to_dict() + _dict["query"] = self.query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -101,6 +102,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 + # TODO: Rewrite to not use raise_errors V2NotQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_notification_type.py b/zitadel_client/models/v2_notification_type.py index 11f16631..e26adcce 100644 --- a/zitadel_client/models/v2_notification_type.py +++ b/zitadel_client/models/v2_notification_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class V2NotificationType(str, Enum): """ allowed enum values """ - NOTIFICATION_TYPE_UNSPECIFIED = 'NOTIFICATION_TYPE_Unspecified' - NOTIFICATION_TYPE_EMAIL = 'NOTIFICATION_TYPE_Email' - NOTIFICATION_TYPE_SMS = 'NOTIFICATION_TYPE_SMS' + NOTIFICATION_TYPE_UNSPECIFIED = "NOTIFICATION_TYPE_Unspecified" + NOTIFICATION_TYPE_EMAIL = "NOTIFICATION_TYPE_Email" + NOTIFICATION_TYPE_SMS = "NOTIFICATION_TYPE_SMS" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_o_auth_config.py b/zitadel_client/models/v2_o_auth_config.py index 36790afb..1851a93d 100644 --- a/zitadel_client/models/v2_o_auth_config.py +++ b/zitadel_client/models/v2_o_auth_config.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2OAuthConfig(BaseModel): """ V2OAuthConfig diff --git a/zitadel_client/models/v2_or_query.py b/zitadel_client/models/v2_or_query.py index 0013ee27..cc7a95bb 100644 --- a/zitadel_client/models/v2_or_query.py +++ b/zitadel_client/models/v2_or_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2OrQuery(BaseModel): """ Connect multiple sub-condition with and OR operator. @@ -77,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict['queries'] = _items + _dict["queries"] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -105,6 +106,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 + # TODO: Rewrite to not use raise_errors V2OrQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_organization.py b/zitadel_client/models/v2_organization.py index 7dc6fd7d..795e3b83 100644 --- a/zitadel_client/models/v2_organization.py +++ b/zitadel_client/models/v2_organization.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2Organization(BaseModel): """ V2Organization diff --git a/zitadel_client/models/v2_organization_domain_query.py b/zitadel_client/models/v2_organization_domain_query.py index 5d529536..b0c35afa 100644 --- a/zitadel_client/models/v2_organization_domain_query.py +++ b/zitadel_client/models/v2_organization_domain_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2OrganizationDomainQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_field_name.py b/zitadel_client/models/v2_organization_field_name.py index fcb06e9a..d235a8da 100644 --- a/zitadel_client/models/v2_organization_field_name.py +++ b/zitadel_client/models/v2_organization_field_name.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,8 +28,8 @@ class V2OrganizationFieldName(str, Enum): """ allowed enum values """ - ORGANIZATION_FIELD_NAME_UNSPECIFIED = 'ORGANIZATION_FIELD_NAME_UNSPECIFIED' - ORGANIZATION_FIELD_NAME_NAME = 'ORGANIZATION_FIELD_NAME_NAME' + ORGANIZATION_FIELD_NAME_UNSPECIFIED = "ORGANIZATION_FIELD_NAME_UNSPECIFIED" + ORGANIZATION_FIELD_NAME_NAME = "ORGANIZATION_FIELD_NAME_NAME" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_organization_id_query.py b/zitadel_client/models/v2_organization_id_query.py index 37f7486d..cfc1414c 100644 --- a/zitadel_client/models/v2_organization_id_query.py +++ b/zitadel_client/models/v2_organization_id_query.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2OrganizationIDQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_name_query.py b/zitadel_client/models/v2_organization_name_query.py index 6f8c57b5..91cc0771 100644 --- a/zitadel_client/models/v2_organization_name_query.py +++ b/zitadel_client/models/v2_organization_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2OrganizationNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_state.py b/zitadel_client/models/v2_organization_state.py index 31947946..d54a8a43 100644 --- a/zitadel_client/models/v2_organization_state.py +++ b/zitadel_client/models/v2_organization_state.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2OrganizationState(str, Enum): """ allowed enum values """ - ORGANIZATION_STATE_UNSPECIFIED = 'ORGANIZATION_STATE_UNSPECIFIED' - ORGANIZATION_STATE_ACTIVE = 'ORGANIZATION_STATE_ACTIVE' - ORGANIZATION_STATE_INACTIVE = 'ORGANIZATION_STATE_INACTIVE' - ORGANIZATION_STATE_REMOVED = 'ORGANIZATION_STATE_REMOVED' + ORGANIZATION_STATE_UNSPECIFIED = "ORGANIZATION_STATE_UNSPECIFIED" + ORGANIZATION_STATE_ACTIVE = "ORGANIZATION_STATE_ACTIVE" + ORGANIZATION_STATE_INACTIVE = "ORGANIZATION_STATE_INACTIVE" + ORGANIZATION_STATE_REMOVED = "ORGANIZATION_STATE_REMOVED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_organization_state_query.py b/zitadel_client/models/v2_organization_state_query.py index 8eefcc29..d3695059 100644 --- a/zitadel_client/models/v2_organization_state_query.py +++ b/zitadel_client/models/v2_organization_state_query.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_organization_state import V2OrganizationState -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_organization_state import V2OrganizationState + + class V2OrganizationStateQuery(BaseModel): """ V2OrganizationStateQuery diff --git a/zitadel_client/models/v2_otp_factor.py b/zitadel_client/models/v2_otp_factor.py index 32812ea7..e684eace 100644 --- a/zitadel_client/models/v2_otp_factor.py +++ b/zitadel_client/models/v2_otp_factor.py @@ -13,21 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2OTPFactor(BaseModel): """ V2OTPFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when the One-Time Password was last checked\"", alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description='"time when the One-Time Password was last checked"', alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_passkey.py b/zitadel_client/models/v2_passkey.py index c9c4e496..1af8a4b1 100644 --- a/zitadel_client/models/v2_passkey.py +++ b/zitadel_client/models/v2_passkey.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_auth_factor_state import V2AuthFactorState -from typing import Optional, Set -from typing_extensions import Self + class V2Passkey(BaseModel): """ diff --git a/zitadel_client/models/v2_passkey_authenticator.py b/zitadel_client/models/v2_passkey_authenticator.py index 96804500..28386a3b 100644 --- a/zitadel_client/models/v2_passkey_authenticator.py +++ b/zitadel_client/models/v2_passkey_authenticator.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class V2PasskeyAuthenticator(str, Enum): """ allowed enum values """ - PASSKEY_AUTHENTICATOR_UNSPECIFIED = 'PASSKEY_AUTHENTICATOR_UNSPECIFIED' - PASSKEY_AUTHENTICATOR_PLATFORM = 'PASSKEY_AUTHENTICATOR_PLATFORM' - PASSKEY_AUTHENTICATOR_CROSS_PLATFORM = 'PASSKEY_AUTHENTICATOR_CROSS_PLATFORM' + PASSKEY_AUTHENTICATOR_UNSPECIFIED = "PASSKEY_AUTHENTICATOR_UNSPECIFIED" + PASSKEY_AUTHENTICATOR_PLATFORM = "PASSKEY_AUTHENTICATOR_PLATFORM" + PASSKEY_AUTHENTICATOR_CROSS_PLATFORM = "PASSKEY_AUTHENTICATOR_CROSS_PLATFORM" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_passkey_registration_code.py b/zitadel_client/models/v2_passkey_registration_code.py index e74eb0b0..d8fd8bac 100644 --- a/zitadel_client/models/v2_passkey_registration_code.py +++ b/zitadel_client/models/v2_passkey_registration_code.py @@ -13,22 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2PasskeyRegistrationCode(BaseModel): """ V2PasskeyRegistrationCode """ # noqa: E501 - id: Annotated[str, Field(strict=True, max_length=200)] = Field(description="\"id to the one time code generated by ZITADEL\"") - code: Annotated[str, Field(strict=True, max_length=200)] = Field(description="\"one time code generated by ZITADEL\"") + id: Annotated[str, Field(strict=True, max_length=200)] = Field(description='"id to the one time code generated by ZITADEL"') + code: Annotated[str, Field(strict=True, max_length=200)] = Field(description='"one time code generated by ZITADEL"') additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["id", "code"] diff --git a/zitadel_client/models/v2_passkeys_type.py b/zitadel_client/models/v2_passkeys_type.py index e82a49c8..c73248c3 100644 --- a/zitadel_client/models/v2_passkeys_type.py +++ b/zitadel_client/models/v2_passkeys_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,8 +28,8 @@ class V2PasskeysType(str, Enum): """ allowed enum values """ - PASSKEYS_TYPE_NOT_ALLOWED = 'PASSKEYS_TYPE_NOT_ALLOWED' - PASSKEYS_TYPE_ALLOWED = 'PASSKEYS_TYPE_ALLOWED' + PASSKEYS_TYPE_NOT_ALLOWED = "PASSKEYS_TYPE_NOT_ALLOWED" + PASSKEYS_TYPE_ALLOWED = "PASSKEYS_TYPE_ALLOWED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_password.py b/zitadel_client/models/v2_password.py index 876fbb00..98c3fdcb 100644 --- a/zitadel_client/models/v2_password.py +++ b/zitadel_client/models/v2_password.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2Password(BaseModel): """ diff --git a/zitadel_client/models/v2_password_complexity_settings.py b/zitadel_client/models/v2_password_complexity_settings.py index 16cd83a8..340d6ea7 100644 --- a/zitadel_client/models/v2_password_complexity_settings.py +++ b/zitadel_client/models/v2_password_complexity_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType + + class V2PasswordComplexitySettings(BaseModel): """ V2PasswordComplexitySettings @@ -31,7 +33,7 @@ class V2PasswordComplexitySettings(BaseModel): requires_uppercase: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain an upper case letter", alias="requiresUppercase") requires_lowercase: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a lowercase letter", alias="requiresLowercase") requires_number: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a number", alias="requiresNumber") - requires_symbol: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a symbol. E.g. \"$\"", alias="requiresSymbol") + requires_symbol: Optional[StrictBool] = Field(default=None, description='defines if the password MUST contain a symbol. E.g. "$"', alias="requiresSymbol") resource_owner_type: Optional[V2ResourceOwnerType] = Field(default=V2ResourceOwnerType.RESOURCE_OWNER_TYPE_UNSPECIFIED, alias="resourceOwnerType") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["minLength", "requiresUppercase", "requiresLowercase", "requiresNumber", "requiresSymbol", "resourceOwnerType"] diff --git a/zitadel_client/models/v2_password_expiry_settings.py b/zitadel_client/models/v2_password_expiry_settings.py index af247540..4200c306 100644 --- a/zitadel_client/models/v2_password_expiry_settings.py +++ b/zitadel_client/models/v2_password_expiry_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType + + class V2PasswordExpirySettings(BaseModel): """ V2PasswordExpirySettings diff --git a/zitadel_client/models/v2_password_factor.py b/zitadel_client/models/v2_password_factor.py index 81ef8271..43e5eeb7 100644 --- a/zitadel_client/models/v2_password_factor.py +++ b/zitadel_client/models/v2_password_factor.py @@ -13,21 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2PasswordFactor(BaseModel): """ V2PasswordFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when the password was last checked\"", alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description='"time when the password was last checked"', alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_password_reset_response.py b/zitadel_client/models/v2_password_reset_response.py index 38540bc3..12bdc438 100644 --- a/zitadel_client/models/v2_password_reset_response.py +++ b/zitadel_client/models/v2_password_reset_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2PasswordResetResponse(BaseModel): """ V2PasswordResetResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_phone_query.py b/zitadel_client/models/v2_phone_query.py index 8fcdbf98..e33ae1d0 100644 --- a/zitadel_client/models/v2_phone_query.py +++ b/zitadel_client/models/v2_phone_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2PhoneQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_prompt.py b/zitadel_client/models/v2_prompt.py index cf0cee6c..1064ebc6 100644 --- a/zitadel_client/models/v2_prompt.py +++ b/zitadel_client/models/v2_prompt.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,12 +28,12 @@ class V2Prompt(str, Enum): """ allowed enum values """ - PROMPT_UNSPECIFIED = 'PROMPT_UNSPECIFIED' - PROMPT_NONE = 'PROMPT_NONE' - PROMPT_LOGIN = 'PROMPT_LOGIN' - PROMPT_CONSENT = 'PROMPT_CONSENT' - PROMPT_SELECT_ACCOUNT = 'PROMPT_SELECT_ACCOUNT' - PROMPT_CREATE = 'PROMPT_CREATE' + PROMPT_UNSPECIFIED = "PROMPT_UNSPECIFIED" + PROMPT_NONE = "PROMPT_NONE" + PROMPT_LOGIN = "PROMPT_LOGIN" + PROMPT_CONSENT = "PROMPT_CONSENT" + PROMPT_SELECT_ACCOUNT = "PROMPT_SELECT_ACCOUNT" + PROMPT_CREATE = "PROMPT_CREATE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_reactivate_user_response.py b/zitadel_client/models/v2_reactivate_user_response.py index 6c88efa9..44dbdc90 100644 --- a/zitadel_client/models/v2_reactivate_user_response.py +++ b/zitadel_client/models/v2_reactivate_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ReactivateUserResponse(BaseModel): """ V2ReactivateUserResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_redirect_urls.py b/zitadel_client/models/v2_redirect_urls.py index fae351b6..39ada704 100644 --- a/zitadel_client/models/v2_redirect_urls.py +++ b/zitadel_client/models/v2_redirect_urls.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2RedirectURLs(BaseModel): """ diff --git a/zitadel_client/models/v2_register_passkey_response.py b/zitadel_client/models/v2_register_passkey_response.py index f28cc63e..600fe3e9 100644 --- a/zitadel_client/models/v2_register_passkey_response.py +++ b/zitadel_client/models/v2_register_passkey_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RegisterPasskeyResponse(BaseModel): """ V2RegisterPasskeyResponse @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_register_totp_response.py b/zitadel_client/models/v2_register_totp_response.py index 1816aa54..1946e03b 100644 --- a/zitadel_client/models/v2_register_totp_response.py +++ b/zitadel_client/models/v2_register_totp_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RegisterTOTPResponse(BaseModel): """ V2RegisterTOTPResponse @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_register_u2_f_response.py b/zitadel_client/models/v2_register_u2_f_response.py index 4e8350d3..5e60f05c 100644 --- a/zitadel_client/models/v2_register_u2_f_response.py +++ b/zitadel_client/models/v2_register_u2_f_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RegisterU2FResponse(BaseModel): """ V2RegisterU2FResponse @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_idp_link_response.py b/zitadel_client/models/v2_remove_idp_link_response.py index b97e22a8..84879f2f 100644 --- a/zitadel_client/models/v2_remove_idp_link_response.py +++ b/zitadel_client/models/v2_remove_idp_link_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemoveIDPLinkResponse(BaseModel): """ V2RemoveIDPLinkResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_otp_email_response.py b/zitadel_client/models/v2_remove_otp_email_response.py index bc4ad36b..bcaf7ee4 100644 --- a/zitadel_client/models/v2_remove_otp_email_response.py +++ b/zitadel_client/models/v2_remove_otp_email_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemoveOTPEmailResponse(BaseModel): """ V2RemoveOTPEmailResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_otpsms_response.py b/zitadel_client/models/v2_remove_otpsms_response.py index 8a6b049d..1113dcb8 100644 --- a/zitadel_client/models/v2_remove_otpsms_response.py +++ b/zitadel_client/models/v2_remove_otpsms_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemoveOTPSMSResponse(BaseModel): """ V2RemoveOTPSMSResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_passkey_response.py b/zitadel_client/models/v2_remove_passkey_response.py index 0ca0f000..7d826e95 100644 --- a/zitadel_client/models/v2_remove_passkey_response.py +++ b/zitadel_client/models/v2_remove_passkey_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemovePasskeyResponse(BaseModel): """ V2RemovePasskeyResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_phone_response.py b/zitadel_client/models/v2_remove_phone_response.py index 93b6d345..6f3f6b3c 100644 --- a/zitadel_client/models/v2_remove_phone_response.py +++ b/zitadel_client/models/v2_remove_phone_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemovePhoneResponse(BaseModel): """ V2RemovePhoneResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_totp_response.py b/zitadel_client/models/v2_remove_totp_response.py index 6b859c12..0b40bf91 100644 --- a/zitadel_client/models/v2_remove_totp_response.py +++ b/zitadel_client/models/v2_remove_totp_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemoveTOTPResponse(BaseModel): """ V2RemoveTOTPResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_u2_f_response.py b/zitadel_client/models/v2_remove_u2_f_response.py index ef8d63f0..d8774dd8 100644 --- a/zitadel_client/models/v2_remove_u2_f_response.py +++ b/zitadel_client/models/v2_remove_u2_f_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2RemoveU2FResponse(BaseModel): """ V2RemoveU2FResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_request_challenges.py b/zitadel_client/models/v2_request_challenges.py index 4794bfa9..0f82e3c4 100644 --- a/zitadel_client/models/v2_request_challenges.py +++ b/zitadel_client/models/v2_request_challenges.py @@ -13,17 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.request_challenges_otp_email import RequestChallengesOTPEmail from zitadel_client.models.request_challenges_otpsms import RequestChallengesOTPSMS -from zitadel_client.models.v2_request_challenges_web_auth_n import V2RequestChallengesWebAuthN -from typing import Optional, Set -from typing_extensions import Self +from zitadel_client.models.v2_request_challenges_web_auth_n import ( + V2RequestChallengesWebAuthN, +) + class V2RequestChallenges(BaseModel): """ @@ -78,13 +82,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict['webAuthN'] = self.web_auth_n.to_dict() + _dict["webAuthN"] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict['otpSms'] = self.otp_sms.to_dict() + _dict["otpSms"] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict['otpEmail'] = self.otp_email.to_dict() + _dict["otpEmail"] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_request_challenges_web_auth_n.py b/zitadel_client/models/v2_request_challenges_web_auth_n.py index 63eeb8fe..edf96f38 100644 --- a/zitadel_client/models/v2_request_challenges_web_auth_n.py +++ b/zitadel_client/models/v2_request_challenges_web_auth_n.py @@ -13,21 +13,25 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List -from zitadel_client.models.v2_user_verification_requirement import V2UserVerificationRequirement -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_user_verification_requirement import ( + V2UserVerificationRequirement, +) + + class V2RequestChallengesWebAuthN(BaseModel): """ V2RequestChallengesWebAuthN """ # noqa: E501 - domain: StrictStr = Field(description="\"Domain on which the session was created. Will be used in the WebAuthN challenge.\"") + domain: StrictStr = Field(description='"Domain on which the session was created. Will be used in the WebAuthN challenge."') user_verification_requirement: V2UserVerificationRequirement = Field(alias="userVerificationRequirement") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["domain", "userVerificationRequirement"] diff --git a/zitadel_client/models/v2_resend_email_code_response.py b/zitadel_client/models/v2_resend_email_code_response.py index ab6ef3ba..9060ef5a 100644 --- a/zitadel_client/models/v2_resend_email_code_response.py +++ b/zitadel_client/models/v2_resend_email_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResendEmailCodeResponse(BaseModel): """ V2ResendEmailCodeResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resend_invite_code_response.py b/zitadel_client/models/v2_resend_invite_code_response.py index c1262bea..4154f023 100644 --- a/zitadel_client/models/v2_resend_invite_code_response.py +++ b/zitadel_client/models/v2_resend_invite_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResendInviteCodeResponse(BaseModel): """ V2ResendInviteCodeResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resend_phone_code_response.py b/zitadel_client/models/v2_resend_phone_code_response.py index ca7ee0c4..3ac1b077 100644 --- a/zitadel_client/models/v2_resend_phone_code_response.py +++ b/zitadel_client/models/v2_resend_phone_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResendPhoneCodeResponse(BaseModel): """ V2ResendPhoneCodeResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_instance_features_response.py b/zitadel_client/models/v2_reset_instance_features_response.py index 773fca1c..9a0d5765 100644 --- a/zitadel_client/models/v2_reset_instance_features_response.py +++ b/zitadel_client/models/v2_reset_instance_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResetInstanceFeaturesResponse(BaseModel): """ V2ResetInstanceFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_organization_features_response.py b/zitadel_client/models/v2_reset_organization_features_response.py index e6e574e6..e34d9a35 100644 --- a/zitadel_client/models/v2_reset_organization_features_response.py +++ b/zitadel_client/models/v2_reset_organization_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResetOrganizationFeaturesResponse(BaseModel): """ V2ResetOrganizationFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_system_features_response.py b/zitadel_client/models/v2_reset_system_features_response.py index 4a921238..784a755f 100644 --- a/zitadel_client/models/v2_reset_system_features_response.py +++ b/zitadel_client/models/v2_reset_system_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResetSystemFeaturesResponse(BaseModel): """ V2ResetSystemFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_user_features_response.py b/zitadel_client/models/v2_reset_user_features_response.py index 285d93e1..4b064125 100644 --- a/zitadel_client/models/v2_reset_user_features_response.py +++ b/zitadel_client/models/v2_reset_user_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2ResetUserFeaturesResponse(BaseModel): """ V2ResetUserFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resource_owner_type.py b/zitadel_client/models/v2_resource_owner_type.py index 381b71cd..efa3f629 100644 --- a/zitadel_client/models/v2_resource_owner_type.py +++ b/zitadel_client/models/v2_resource_owner_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,9 +28,9 @@ class V2ResourceOwnerType(str, Enum): """ allowed enum values """ - RESOURCE_OWNER_TYPE_UNSPECIFIED = 'RESOURCE_OWNER_TYPE_UNSPECIFIED' - RESOURCE_OWNER_TYPE_INSTANCE = 'RESOURCE_OWNER_TYPE_INSTANCE' - RESOURCE_OWNER_TYPE_ORG = 'RESOURCE_OWNER_TYPE_ORG' + RESOURCE_OWNER_TYPE_UNSPECIFIED = "RESOURCE_OWNER_TYPE_UNSPECIFIED" + RESOURCE_OWNER_TYPE_INSTANCE = "RESOURCE_OWNER_TYPE_INSTANCE" + RESOURCE_OWNER_TYPE_ORG = "RESOURCE_OWNER_TYPE_ORG" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py b/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py index 3a18f09b..e4bbc3b9 100644 --- a/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py +++ b/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_information import V2IDPInformation -from typing import Optional, Set -from typing_extensions import Self + class V2RetrieveIdentityProviderIntentResponse(BaseModel): """ @@ -77,10 +79,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_information if self.idp_information: - _dict['idpInformation'] = self.idp_information.to_dict() + _dict["idpInformation"] = self.idp_information.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_saml_binding.py b/zitadel_client/models/v2_saml_binding.py index 10bf1643..5faa8098 100644 --- a/zitadel_client/models/v2_saml_binding.py +++ b/zitadel_client/models/v2_saml_binding.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2SAMLBinding(str, Enum): """ allowed enum values """ - SAML_BINDING_UNSPECIFIED = 'SAML_BINDING_UNSPECIFIED' - SAML_BINDING_POST = 'SAML_BINDING_POST' - SAML_BINDING_REDIRECT = 'SAML_BINDING_REDIRECT' - SAML_BINDING_ARTIFACT = 'SAML_BINDING_ARTIFACT' + SAML_BINDING_UNSPECIFIED = "SAML_BINDING_UNSPECIFIED" + SAML_BINDING_POST = "SAML_BINDING_POST" + SAML_BINDING_REDIRECT = "SAML_BINDING_REDIRECT" + SAML_BINDING_ARTIFACT = "SAML_BINDING_ARTIFACT" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_saml_config.py b/zitadel_client/models/v2_saml_config.py index 9db78931..077d681a 100644 --- a/zitadel_client/models/v2_saml_config.py +++ b/zitadel_client/models/v2_saml_config.py @@ -13,17 +13,25 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union + +from pydantic import ( + BaseModel, + ConfigDict, + Field, + StrictBool, + StrictStr, + field_validator, +) +from typing_extensions import Annotated, Self -from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated from zitadel_client.models.v2_saml_binding import V2SAMLBinding from zitadel_client.models.v2_saml_name_id_format import V2SAMLNameIDFormat -from typing import Optional, Set -from typing_extensions import Self + class V2SAMLConfig(BaseModel): """ @@ -37,7 +45,7 @@ class V2SAMLConfig(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["metadataXml", "binding", "withSignedRequest", "nameIdFormat", "transientMappingAttributeName"] - @field_validator('metadata_xml') + @field_validator("metadata_xml") def metadata_xml_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: diff --git a/zitadel_client/models/v2_saml_name_id_format.py b/zitadel_client/models/v2_saml_name_id_format.py index d123d91f..dd334dcd 100644 --- a/zitadel_client/models/v2_saml_name_id_format.py +++ b/zitadel_client/models/v2_saml_name_id_format.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2SAMLNameIDFormat(str, Enum): """ allowed enum values """ - SAML_NAME_ID_FORMAT_UNSPECIFIED = 'SAML_NAME_ID_FORMAT_UNSPECIFIED' - SAML_NAME_ID_FORMAT_EMAIL_ADDRESS = 'SAML_NAME_ID_FORMAT_EMAIL_ADDRESS' - SAML_NAME_ID_FORMAT_PERSISTENT = 'SAML_NAME_ID_FORMAT_PERSISTENT' - SAML_NAME_ID_FORMAT_TRANSIENT = 'SAML_NAME_ID_FORMAT_TRANSIENT' + SAML_NAME_ID_FORMAT_UNSPECIFIED = "SAML_NAME_ID_FORMAT_UNSPECIFIED" + SAML_NAME_ID_FORMAT_EMAIL_ADDRESS = "SAML_NAME_ID_FORMAT_EMAIL_ADDRESS" + SAML_NAME_ID_FORMAT_PERSISTENT = "SAML_NAME_ID_FORMAT_PERSISTENT" + SAML_NAME_ID_FORMAT_TRANSIENT = "SAML_NAME_ID_FORMAT_TRANSIENT" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_search_query.py b/zitadel_client/models/v2_search_query.py index e0452356..c339da2a 100644 --- a/zitadel_client/models/v2_search_query.py +++ b/zitadel_client/models/v2_search_query.py @@ -13,19 +13,21 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_creation_date_query import V2CreationDateQuery from zitadel_client.models.v2_creator_query import V2CreatorQuery from zitadel_client.models.v2_ids_query import V2IDsQuery from zitadel_client.models.v2_user_agent_query import V2UserAgentQuery from zitadel_client.models.v2_user_id_query import V2UserIDQuery -from typing import Optional, Set -from typing_extensions import Self + class V2SearchQuery(BaseModel): """ @@ -82,19 +84,19 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of ids_query if self.ids_query: - _dict['idsQuery'] = self.ids_query.to_dict() + _dict["idsQuery"] = self.ids_query.to_dict() # override the default output from pydantic by calling `to_dict()` of user_id_query if self.user_id_query: - _dict['userIdQuery'] = self.user_id_query.to_dict() + _dict["userIdQuery"] = self.user_id_query.to_dict() # override the default output from pydantic by calling `to_dict()` of creation_date_query if self.creation_date_query: - _dict['creationDateQuery'] = self.creation_date_query.to_dict() + _dict["creationDateQuery"] = self.creation_date_query.to_dict() # override the default output from pydantic by calling `to_dict()` of creator_query if self.creator_query: - _dict['creatorQuery'] = self.creator_query.to_dict() + _dict["creatorQuery"] = self.creator_query.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent_query if self.user_agent_query: - _dict['userAgentQuery'] = self.user_agent_query.to_dict() + _dict["userAgentQuery"] = self.user_agent_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_search_query1.py b/zitadel_client/models/v2_search_query1.py index 15dca1db..bc12b0ac 100644 --- a/zitadel_client/models/v2_search_query1.py +++ b/zitadel_client/models/v2_search_query1.py @@ -13,12 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_display_name_query import V2DisplayNameQuery from zitadel_client.models.v2_email_query import V2EmailQuery from zitadel_client.models.v2_first_name_query import V2FirstNameQuery @@ -32,8 +35,7 @@ from zitadel_client.models.v2_state_query import V2StateQuery from zitadel_client.models.v2_type_query import V2TypeQuery from zitadel_client.models.v2_user_name_query import V2UserNameQuery -from typing import Optional, Set -from typing_extensions import Self + class V2SearchQuery1(BaseModel): """ @@ -101,52 +103,52 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user_name_query if self.user_name_query: - _dict['userNameQuery'] = self.user_name_query.to_dict() + _dict["userNameQuery"] = self.user_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of first_name_query if self.first_name_query: - _dict['firstNameQuery'] = self.first_name_query.to_dict() + _dict["firstNameQuery"] = self.first_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of last_name_query if self.last_name_query: - _dict['lastNameQuery'] = self.last_name_query.to_dict() + _dict["lastNameQuery"] = self.last_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of nick_name_query if self.nick_name_query: - _dict['nickNameQuery'] = self.nick_name_query.to_dict() + _dict["nickNameQuery"] = self.nick_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of display_name_query if self.display_name_query: - _dict['displayNameQuery'] = self.display_name_query.to_dict() + _dict["displayNameQuery"] = self.display_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of email_query if self.email_query: - _dict['emailQuery'] = self.email_query.to_dict() + _dict["emailQuery"] = self.email_query.to_dict() # override the default output from pydantic by calling `to_dict()` of state_query if self.state_query: - _dict['stateQuery'] = self.state_query.to_dict() + _dict["stateQuery"] = self.state_query.to_dict() # override the default output from pydantic by calling `to_dict()` of type_query if self.type_query: - _dict['typeQuery'] = self.type_query.to_dict() + _dict["typeQuery"] = self.type_query.to_dict() # override the default output from pydantic by calling `to_dict()` of login_name_query if self.login_name_query: - _dict['loginNameQuery'] = self.login_name_query.to_dict() + _dict["loginNameQuery"] = self.login_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of in_user_ids_query if self.in_user_ids_query: - _dict['inUserIdsQuery'] = self.in_user_ids_query.to_dict() + _dict["inUserIdsQuery"] = self.in_user_ids_query.to_dict() # override the default output from pydantic by calling `to_dict()` of or_query if self.or_query: - _dict['orQuery'] = self.or_query.to_dict() + _dict["orQuery"] = self.or_query.to_dict() # override the default output from pydantic by calling `to_dict()` of and_query if self.and_query: - _dict['andQuery'] = self.and_query.to_dict() + _dict["andQuery"] = self.and_query.to_dict() # override the default output from pydantic by calling `to_dict()` of not_query if self.not_query: - _dict['notQuery'] = self.not_query.to_dict() + _dict["notQuery"] = self.not_query.to_dict() # override the default output from pydantic by calling `to_dict()` of in_user_emails_query if self.in_user_emails_query: - _dict['inUserEmailsQuery'] = self.in_user_emails_query.to_dict() + _dict["inUserEmailsQuery"] = self.in_user_emails_query.to_dict() # override the default output from pydantic by calling `to_dict()` of organization_id_query if self.organization_id_query: - _dict['organizationIdQuery'] = self.organization_id_query.to_dict() + _dict["organizationIdQuery"] = self.organization_id_query.to_dict() # override the default output from pydantic by calling `to_dict()` of phone_query if self.phone_query: - _dict['phoneQuery'] = self.phone_query.to_dict() + _dict["phoneQuery"] = self.phone_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -191,6 +193,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: from zitadel_client.models.v2_and_query import V2AndQuery from zitadel_client.models.v2_not_query import V2NotQuery from zitadel_client.models.v2_or_query import V2OrQuery + # TODO: Rewrite to not use raise_errors V2SearchQuery1.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_second_factor_type.py b/zitadel_client/models/v2_second_factor_type.py index 8640c486..6aa5ee40 100644 --- a/zitadel_client/models/v2_second_factor_type.py +++ b/zitadel_client/models/v2_second_factor_type.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,11 +28,11 @@ class V2SecondFactorType(str, Enum): """ allowed enum values """ - SECOND_FACTOR_TYPE_UNSPECIFIED = 'SECOND_FACTOR_TYPE_UNSPECIFIED' - SECOND_FACTOR_TYPE_OTP = 'SECOND_FACTOR_TYPE_OTP' - SECOND_FACTOR_TYPE_U2_F = 'SECOND_FACTOR_TYPE_U2F' - SECOND_FACTOR_TYPE_OTP_EMAIL = 'SECOND_FACTOR_TYPE_OTP_EMAIL' - SECOND_FACTOR_TYPE_OTP_SMS = 'SECOND_FACTOR_TYPE_OTP_SMS' + SECOND_FACTOR_TYPE_UNSPECIFIED = "SECOND_FACTOR_TYPE_UNSPECIFIED" + SECOND_FACTOR_TYPE_OTP = "SECOND_FACTOR_TYPE_OTP" + SECOND_FACTOR_TYPE_U2_F = "SECOND_FACTOR_TYPE_U2F" + SECOND_FACTOR_TYPE_OTP_EMAIL = "SECOND_FACTOR_TYPE_OTP_EMAIL" + SECOND_FACTOR_TYPE_OTP_SMS = "SECOND_FACTOR_TYPE_OTP_SMS" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_security_settings.py b/zitadel_client/models/v2_security_settings.py index e40ef1b1..63c48dd1 100644 --- a/zitadel_client/models/v2_security_settings.py +++ b/zitadel_client/models/v2_security_settings.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings + + class V2SecuritySettings(BaseModel): """ V2SecuritySettings @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of embedded_iframe if self.embedded_iframe: - _dict['embeddedIframe'] = self.embedded_iframe.to_dict() + _dict["embeddedIframe"] = self.embedded_iframe.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_send_email_code_response.py b/zitadel_client/models/v2_send_email_code_response.py index b8dbeb02..c5385810 100644 --- a/zitadel_client/models/v2_send_email_code_response.py +++ b/zitadel_client/models/v2_send_email_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SendEmailCodeResponse(BaseModel): """ V2SendEmailCodeResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_send_email_verification_code.py b/zitadel_client/models/v2_send_email_verification_code.py index 8c7603aa..151087c9 100644 --- a/zitadel_client/models/v2_send_email_verification_code.py +++ b/zitadel_client/models/v2_send_email_verification_code.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SendEmailVerificationCode(BaseModel): """ diff --git a/zitadel_client/models/v2_send_invite_code.py b/zitadel_client/models/v2_send_invite_code.py index ac9026df..11a714a2 100644 --- a/zitadel_client/models/v2_send_invite_code.py +++ b/zitadel_client/models/v2_send_invite_code.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SendInviteCode(BaseModel): """ diff --git a/zitadel_client/models/v2_send_passkey_registration_link.py b/zitadel_client/models/v2_send_passkey_registration_link.py index 74c17334..27dc7391 100644 --- a/zitadel_client/models/v2_send_passkey_registration_link.py +++ b/zitadel_client/models/v2_send_passkey_registration_link.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SendPasskeyRegistrationLink(BaseModel): """ diff --git a/zitadel_client/models/v2_send_password_reset_link.py b/zitadel_client/models/v2_send_password_reset_link.py index d8ad95dc..3115eb40 100644 --- a/zitadel_client/models/v2_send_password_reset_link.py +++ b/zitadel_client/models/v2_send_password_reset_link.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_notification_type import V2NotificationType -from typing import Optional, Set -from typing_extensions import Self + class V2SendPasswordResetLink(BaseModel): """ diff --git a/zitadel_client/models/v2_session.py b/zitadel_client/models/v2_session.py index 0853dcdd..a40b6c98 100644 --- a/zitadel_client/models/v2_session.py +++ b/zitadel_client/models/v2_session.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2Session(BaseModel): """ diff --git a/zitadel_client/models/v2_session1.py b/zitadel_client/models/v2_session1.py index a2018d4a..a82182c1 100644 --- a/zitadel_client/models/v2_session1.py +++ b/zitadel_client/models/v2_session1.py @@ -13,31 +13,32 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime -from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated +from typing import Any, ClassVar, Dict, List, Optional, Set, Union + +from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_factors import V2Factors from zitadel_client.models.v2_user_agent import V2UserAgent -from typing import Optional, Set -from typing_extensions import Self + class V2Session1(BaseModel): """ V2Session1 """ # noqa: E501 - id: Optional[StrictStr] = Field(default=None, description="\"id of the session\"") - creation_date: Optional[datetime] = Field(default=None, description="\"time when the session was created\"", alias="creationDate") - change_date: Optional[datetime] = Field(default=None, description="\"time when the session was last updated\"", alias="changeDate") - sequence: Optional[StrictStr] = Field(default=None, description="\"sequence of the session\"") + id: Optional[StrictStr] = Field(default=None, description='"id of the session"') + creation_date: Optional[datetime] = Field(default=None, description='"time when the session was created"', alias="creationDate") + change_date: Optional[datetime] = Field(default=None, description='"time when the session was last updated"', alias="changeDate") + sequence: Optional[StrictStr] = Field(default=None, description='"sequence of the session"') factors: Optional[V2Factors] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list\"") + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list"') user_agent: Optional[V2UserAgent] = Field(default=None, alias="userAgent") - expiration_date: Optional[datetime] = Field(default=None, description="\"time the session will be automatically invalidated\"", alias="expirationDate") + expiration_date: Optional[datetime] = Field(default=None, description='"time the session will be automatically invalidated"', alias="expirationDate") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["id", "creationDate", "changeDate", "sequence", "factors", "metadata", "userAgent", "expirationDate"] @@ -84,10 +85,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of factors if self.factors: - _dict['factors'] = self.factors.to_dict() + _dict["factors"] = self.factors.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent if self.user_agent: - _dict['userAgent'] = self.user_agent.to_dict() + _dict["userAgent"] = self.user_agent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_session_field_name.py b/zitadel_client/models/v2_session_field_name.py index 5249886f..d37f6041 100644 --- a/zitadel_client/models/v2_session_field_name.py +++ b/zitadel_client/models/v2_session_field_name.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,8 +28,8 @@ class V2SessionFieldName(str, Enum): """ allowed enum values """ - SESSION_FIELD_NAME_UNSPECIFIED = 'SESSION_FIELD_NAME_UNSPECIFIED' - SESSION_FIELD_NAME_CREATION_DATE = 'SESSION_FIELD_NAME_CREATION_DATE' + SESSION_FIELD_NAME_UNSPECIFIED = "SESSION_FIELD_NAME_UNSPECIFIED" + SESSION_FIELD_NAME_CREATION_DATE = "SESSION_FIELD_NAME_CREATION_DATE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_set_email_response.py b/zitadel_client/models/v2_set_email_response.py index f536c693..c33c23db 100644 --- a/zitadel_client/models/v2_set_email_response.py +++ b/zitadel_client/models/v2_set_email_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetEmailResponse(BaseModel): """ V2SetEmailResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_email.py b/zitadel_client/models/v2_set_human_email.py index 6221709f..54592096 100644 --- a/zitadel_client/models/v2_set_human_email.py +++ b/zitadel_client/models/v2_set_human_email.py @@ -13,16 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + +from zitadel_client.models.v2_send_email_verification_code import ( + V2SendEmailVerificationCode, +) + class V2SetHumanEmail(BaseModel): """ @@ -78,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_email1.py b/zitadel_client/models/v2_set_human_email1.py index 807ebe56..9b008966 100644 --- a/zitadel_client/models/v2_set_human_email1.py +++ b/zitadel_client/models/v2_set_human_email1.py @@ -13,16 +13,19 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + +from zitadel_client.models.v2_send_email_verification_code import ( + V2SendEmailVerificationCode, +) + class V2SetHumanEmail1(BaseModel): """ @@ -78,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict['sendCode'] = self.send_code.to_dict() + _dict["sendCode"] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_phone.py b/zitadel_client/models/v2_set_human_phone.py index 8c44bdeb..572ba097 100644 --- a/zitadel_client/models/v2_set_human_phone.py +++ b/zitadel_client/models/v2_set_human_phone.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SetHumanPhone(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_phone1.py b/zitadel_client/models/v2_set_human_phone1.py index 0df6db8e..7f4aacd5 100644 --- a/zitadel_client/models/v2_set_human_phone1.py +++ b/zitadel_client/models/v2_set_human_phone1.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SetHumanPhone1(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_profile.py b/zitadel_client/models/v2_set_human_profile.py index 3a55c795..242a9cf9 100644 --- a/zitadel_client/models/v2_set_human_profile.py +++ b/zitadel_client/models/v2_set_human_profile.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_gender import V2Gender -from typing import Optional, Set -from typing_extensions import Self + class V2SetHumanProfile(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_profile1.py b/zitadel_client/models/v2_set_human_profile1.py index 6e34c85a..331bce94 100644 --- a/zitadel_client/models/v2_set_human_profile1.py +++ b/zitadel_client/models/v2_set_human_profile1.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_gender import V2Gender -from typing import Optional, Set -from typing_extensions import Self + class V2SetHumanProfile1(BaseModel): """ diff --git a/zitadel_client/models/v2_set_instance_features_request.py b/zitadel_client/models/v2_set_instance_features_request.py index 1cd08f7e..c7a70c8e 100644 --- a/zitadel_client/models/v2_set_instance_features_request.py +++ b/zitadel_client/models/v2_set_instance_features_request.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_login_v2 import V2LoginV2 -from typing import Optional, Set -from typing_extensions import Self + class V2SetInstanceFeaturesRequest(BaseModel): """ @@ -88,7 +90,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict['loginV2'] = self.login_v2.to_dict() + _dict["loginV2"] = self.login_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_instance_features_response.py b/zitadel_client/models/v2_set_instance_features_response.py index d8dcac72..8b5a64a1 100644 --- a/zitadel_client/models/v2_set_instance_features_response.py +++ b/zitadel_client/models/v2_set_instance_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetInstanceFeaturesResponse(BaseModel): """ V2SetInstanceFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_metadata_entry.py b/zitadel_client/models/v2_set_metadata_entry.py index 90c6b3d0..8e38ddc2 100644 --- a/zitadel_client/models/v2_set_metadata_entry.py +++ b/zitadel_client/models/v2_set_metadata_entry.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing import Any, ClassVar, Dict, List, Union -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SetMetadataEntry(BaseModel): """ @@ -32,7 +32,7 @@ class V2SetMetadataEntry(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["key", "value"] - @field_validator('value') + @field_validator("value") def value_validate_regular_expression(cls, value): """Validates the regular expression""" if not re.match(r"^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?$", value): diff --git a/zitadel_client/models/v2_set_metadata_entry1.py b/zitadel_client/models/v2_set_metadata_entry1.py index df03cff0..074cf1d7 100644 --- a/zitadel_client/models/v2_set_metadata_entry1.py +++ b/zitadel_client/models/v2_set_metadata_entry1.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing import Any, ClassVar, Dict, List, Union -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2SetMetadataEntry1(BaseModel): """ @@ -32,7 +32,7 @@ class V2SetMetadataEntry1(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["key", "value"] - @field_validator('value') + @field_validator("value") def value_validate_regular_expression(cls, value): """Validates the regular expression""" if not re.match(r"^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?$", value): diff --git a/zitadel_client/models/v2_set_organization_features_response.py b/zitadel_client/models/v2_set_organization_features_response.py index f72c70b7..1327b357 100644 --- a/zitadel_client/models/v2_set_organization_features_response.py +++ b/zitadel_client/models/v2_set_organization_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetOrganizationFeaturesResponse(BaseModel): """ V2SetOrganizationFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_password_response.py b/zitadel_client/models/v2_set_password_response.py index 26973e91..79f03dab 100644 --- a/zitadel_client/models/v2_set_password_response.py +++ b/zitadel_client/models/v2_set_password_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetPasswordResponse(BaseModel): """ V2SetPasswordResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_phone_response.py b/zitadel_client/models/v2_set_phone_response.py index 1015911b..e947694c 100644 --- a/zitadel_client/models/v2_set_phone_response.py +++ b/zitadel_client/models/v2_set_phone_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetPhoneResponse(BaseModel): """ V2SetPhoneResponse @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_security_settings_request.py b/zitadel_client/models/v2_set_security_settings_request.py index c7d675ab..57ae240d 100644 --- a/zitadel_client/models/v2_set_security_settings_request.py +++ b/zitadel_client/models/v2_set_security_settings_request.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings + + class V2SetSecuritySettingsRequest(BaseModel): """ V2SetSecuritySettingsRequest @@ -75,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of embedded_iframe if self.embedded_iframe: - _dict['embeddedIframe'] = self.embedded_iframe.to_dict() + _dict["embeddedIframe"] = self.embedded_iframe.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_security_settings_response.py b/zitadel_client/models/v2_set_security_settings_response.py index 29c486da..16a4940d 100644 --- a/zitadel_client/models/v2_set_security_settings_response.py +++ b/zitadel_client/models/v2_set_security_settings_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetSecuritySettingsResponse(BaseModel): """ V2SetSecuritySettingsResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_session_response.py b/zitadel_client/models/v2_set_session_response.py index 1344df41..19657506 100644 --- a/zitadel_client/models/v2_set_session_response.py +++ b/zitadel_client/models/v2_set_session_response.py @@ -13,23 +13,25 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_challenges import V2Challenges from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set -from typing_extensions import Self + class V2SetSessionResponse(BaseModel): """ V2SetSessionResponse """ # noqa: E501 details: Optional[V2Details] = None - session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, which is required for delete session, get session or the request of other resources.\"", alias="sessionToken") + session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, which is required for delete session, get session or the request of other resources."', alias="sessionToken") challenges: Optional[V2Challenges] = None additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "sessionToken", "challenges"] @@ -77,10 +79,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict['challenges'] = self.challenges.to_dict() + _dict["challenges"] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_system_features_request.py b/zitadel_client/models/v2_set_system_features_request.py index b82f30e9..050171f9 100644 --- a/zitadel_client/models/v2_set_system_features_request.py +++ b/zitadel_client/models/v2_set_system_features_request.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_login_v2 import V2LoginV2 -from typing import Optional, Set -from typing_extensions import Self + class V2SetSystemFeaturesRequest(BaseModel): """ @@ -86,7 +88,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict['loginV2'] = self.login_v2.to_dict() + _dict["loginV2"] = self.login_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_system_features_response.py b/zitadel_client/models/v2_set_system_features_response.py index 7be6170e..5ed5ebe0 100644 --- a/zitadel_client/models/v2_set_system_features_response.py +++ b/zitadel_client/models/v2_set_system_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetSystemFeaturesResponse(BaseModel): """ V2SetSystemFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_user_features_response.py b/zitadel_client/models/v2_set_user_features_response.py index fc419292..246c2252 100644 --- a/zitadel_client/models/v2_set_user_features_response.py +++ b/zitadel_client/models/v2_set_user_features_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2SetUserFeaturesResponse(BaseModel): """ V2SetUserFeaturesResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_source.py b/zitadel_client/models/v2_source.py index 769ad46f..fb65ebad 100644 --- a/zitadel_client/models/v2_source.py +++ b/zitadel_client/models/v2_source.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,13 +28,13 @@ class V2Source(str, Enum): """ allowed enum values """ - SOURCE_UNSPECIFIED = 'SOURCE_UNSPECIFIED' - SOURCE_SYSTEM = 'SOURCE_SYSTEM' - SOURCE_INSTANCE = 'SOURCE_INSTANCE' - SOURCE_ORGANIZATION = 'SOURCE_ORGANIZATION' - SOURCE_PROJECT = 'SOURCE_PROJECT' - SOURCE_APP = 'SOURCE_APP' - SOURCE_USER = 'SOURCE_USER' + SOURCE_UNSPECIFIED = "SOURCE_UNSPECIFIED" + SOURCE_SYSTEM = "SOURCE_SYSTEM" + SOURCE_INSTANCE = "SOURCE_INSTANCE" + SOURCE_ORGANIZATION = "SOURCE_ORGANIZATION" + SOURCE_PROJECT = "SOURCE_PROJECT" + SOURCE_APP = "SOURCE_APP" + SOURCE_USER = "SOURCE_USER" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_start_identity_provider_intent_request.py b/zitadel_client/models/v2_start_identity_provider_intent_request.py index 8b96ec6e..9c4c6f5f 100644 --- a/zitadel_client/models/v2_start_identity_provider_intent_request.py +++ b/zitadel_client/models/v2_start_identity_provider_intent_request.py @@ -13,17 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_ldap_credentials import V2LDAPCredentials from zitadel_client.models.v2_redirect_urls import V2RedirectURLs -from typing import Optional, Set -from typing_extensions import Self + class V2StartIdentityProviderIntentRequest(BaseModel): """ @@ -78,10 +79,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of urls if self.urls: - _dict['urls'] = self.urls.to_dict() + _dict["urls"] = self.urls.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict['ldap'] = self.ldap.to_dict() + _dict["ldap"] = self.ldap.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_start_identity_provider_intent_response.py b/zitadel_client/models/v2_start_identity_provider_intent_response.py index 26836956..9508bb84 100644 --- a/zitadel_client/models/v2_start_identity_provider_intent_response.py +++ b/zitadel_client/models/v2_start_identity_provider_intent_response.py @@ -13,17 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set, Union from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator -from typing import Any, ClassVar, Dict, List, Optional, Union -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_intent import V2IDPIntent -from typing import Optional, Set -from typing_extensions import Self + class V2StartIdentityProviderIntentResponse(BaseModel): """ @@ -36,7 +37,7 @@ class V2StartIdentityProviderIntentResponse(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "authUrl", "idpIntent", "postForm"] - @field_validator('post_form') + @field_validator("post_form") def post_form_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: @@ -89,10 +90,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_intent if self.idp_intent: - _dict['idpIntent'] = self.idp_intent.to_dict() + _dict["idpIntent"] = self.idp_intent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_state_query.py b/zitadel_client/models/v2_state_query.py index 374a5f8a..ff8da917 100644 --- a/zitadel_client/models/v2_state_query.py +++ b/zitadel_client/models/v2_state_query.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List -from zitadel_client.models.v2_user_state import V2UserState -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_user_state import V2UserState + + class V2StateQuery(BaseModel): """ Query for users with a specific state. diff --git a/zitadel_client/models/v2_text_query_method.py b/zitadel_client/models/v2_text_query_method.py index e5cfecf1..1c3fddf8 100644 --- a/zitadel_client/models/v2_text_query_method.py +++ b/zitadel_client/models/v2_text_query_method.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,14 +28,14 @@ class V2TextQueryMethod(str, Enum): """ allowed enum values """ - TEXT_QUERY_METHOD_EQUALS = 'TEXT_QUERY_METHOD_EQUALS' - TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE = 'TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE' - TEXT_QUERY_METHOD_STARTS_WITH = 'TEXT_QUERY_METHOD_STARTS_WITH' - TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE = 'TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE' - TEXT_QUERY_METHOD_CONTAINS = 'TEXT_QUERY_METHOD_CONTAINS' - TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE = 'TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE' - TEXT_QUERY_METHOD_ENDS_WITH = 'TEXT_QUERY_METHOD_ENDS_WITH' - TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE = 'TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE' + TEXT_QUERY_METHOD_EQUALS = "TEXT_QUERY_METHOD_EQUALS" + TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE = "TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE" + TEXT_QUERY_METHOD_STARTS_WITH = "TEXT_QUERY_METHOD_STARTS_WITH" + TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE = "TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE" + TEXT_QUERY_METHOD_CONTAINS = "TEXT_QUERY_METHOD_CONTAINS" + TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE = "TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE" + TEXT_QUERY_METHOD_ENDS_WITH = "TEXT_QUERY_METHOD_ENDS_WITH" + TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE = "TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_theme.py b/zitadel_client/models/v2_theme.py index 4fd3651e..3d04282c 100644 --- a/zitadel_client/models/v2_theme.py +++ b/zitadel_client/models/v2_theme.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2Theme(BaseModel): """ V2Theme diff --git a/zitadel_client/models/v2_theme_mode.py b/zitadel_client/models/v2_theme_mode.py index 01251e34..4dde16ef 100644 --- a/zitadel_client/models/v2_theme_mode.py +++ b/zitadel_client/models/v2_theme_mode.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2ThemeMode(str, Enum): """ allowed enum values """ - THEME_MODE_UNSPECIFIED = 'THEME_MODE_UNSPECIFIED' - THEME_MODE_AUTO = 'THEME_MODE_AUTO' - THEME_MODE_LIGHT = 'THEME_MODE_LIGHT' - THEME_MODE_DARK = 'THEME_MODE_DARK' + THEME_MODE_UNSPECIFIED = "THEME_MODE_UNSPECIFIED" + THEME_MODE_AUTO = "THEME_MODE_AUTO" + THEME_MODE_LIGHT = "THEME_MODE_LIGHT" + THEME_MODE_DARK = "THEME_MODE_DARK" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_totp_factor.py b/zitadel_client/models/v2_totp_factor.py index 0e67dd13..8d05ea83 100644 --- a/zitadel_client/models/v2_totp_factor.py +++ b/zitadel_client/models/v2_totp_factor.py @@ -13,21 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2TOTPFactor(BaseModel): """ V2TOTPFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when the Time-based One-Time Password was last checked\"", alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description='"time when the Time-based One-Time Password was last checked"', alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_type_query.py b/zitadel_client/models/v2_type_query.py index 8f0944a2..99450e5c 100644 --- a/zitadel_client/models/v2_type_query.py +++ b/zitadel_client/models/v2_type_query.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List -from zitadel_client.models.userv2_type import Userv2Type -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.userv2_type import Userv2Type + + class V2TypeQuery(BaseModel): """ Query for users with a specific type. diff --git a/zitadel_client/models/v2_unlock_user_response.py b/zitadel_client/models/v2_unlock_user_response.py index f0f5f937..eae205a8 100644 --- a/zitadel_client/models/v2_unlock_user_response.py +++ b/zitadel_client/models/v2_unlock_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2UnlockUserResponse(BaseModel): """ V2UnlockUserResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_update_human_user_response.py b/zitadel_client/models/v2_update_human_user_response.py index b3a8730e..cd91036b 100644 --- a/zitadel_client/models/v2_update_human_user_response.py +++ b/zitadel_client/models/v2_update_human_user_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2UpdateHumanUserResponse(BaseModel): """ V2UpdateHumanUserResponse @@ -76,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user.py b/zitadel_client/models/v2_user.py index 3521ebbe..f876dd34 100644 --- a/zitadel_client/models/v2_user.py +++ b/zitadel_client/models/v2_user.py @@ -13,18 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_human_user import V2HumanUser from zitadel_client.models.v2_machine_user import V2MachineUser from zitadel_client.models.v2_user_state import V2UserState -from typing import Optional, Set -from typing_extensions import Self + class V2User(BaseModel): """ @@ -84,13 +86,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of human if self.human: - _dict['human'] = self.human.to_dict() + _dict["human"] = self.human.to_dict() # override the default output from pydantic by calling `to_dict()` of machine if self.machine: - _dict['machine'] = self.machine.to_dict() + _dict["machine"] = self.machine.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_agent.py b/zitadel_client/models/v2_user_agent.py index 7c916654..28ac499a 100644 --- a/zitadel_client/models/v2_user_agent.py +++ b/zitadel_client/models/v2_user_agent.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.user_agent_header_values import UserAgentHeaderValues -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.user_agent_header_values import UserAgentHeaderValues + + class V2UserAgent(BaseModel): """ V2UserAgent @@ -81,7 +83,7 @@ def to_dict(self) -> Dict[str, Any]: for _key_header in self.header: if self.header[_key_header]: _field_dict[_key_header] = self.header[_key_header].to_dict() - _dict['header'] = _field_dict + _dict["header"] = _field_dict # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_agent_query.py b/zitadel_client/models/v2_user_agent_query.py index 19c52e23..a13e0513 100644 --- a/zitadel_client/models/v2_user_agent_query.py +++ b/zitadel_client/models/v2_user_agent_query.py @@ -13,15 +13,15 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated -from typing import Optional, Set -from typing_extensions import Self +from typing_extensions import Annotated, Self + class V2UserAgentQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_user_factor.py b/zitadel_client/models/v2_user_factor.py index b37d957e..9b3f777e 100644 --- a/zitadel_client/models/v2_user_factor.py +++ b/zitadel_client/models/v2_user_factor.py @@ -13,25 +13,26 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2UserFactor(BaseModel): """ V2UserFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when the user was last checked\"", alias="verifiedAt") - id: Optional[StrictStr] = Field(default=None, description="\"id of the checked user\"") - login_name: Optional[StrictStr] = Field(default=None, description="\"login name of the checked user\"", alias="loginName") - display_name: Optional[StrictStr] = Field(default=None, description="\"display name of the checked user\"", alias="displayName") - organization_id: Optional[StrictStr] = Field(default=None, description="\"organization id of the checked user\"", alias="organizationId") + verified_at: Optional[datetime] = Field(default=None, description='"time when the user was last checked"', alias="verifiedAt") + id: Optional[StrictStr] = Field(default=None, description='"id of the checked user"') + login_name: Optional[StrictStr] = Field(default=None, description='"login name of the checked user"', alias="loginName") + display_name: Optional[StrictStr] = Field(default=None, description='"display name of the checked user"', alias="displayName") + organization_id: Optional[StrictStr] = Field(default=None, description='"organization id of the checked user"', alias="organizationId") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt", "id", "loginName", "displayName", "organizationId"] diff --git a/zitadel_client/models/v2_user_field_name.py b/zitadel_client/models/v2_user_field_name.py index 9d777b2b..f2399db0 100644 --- a/zitadel_client/models/v2_user_field_name.py +++ b/zitadel_client/models/v2_user_field_name.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,16 +28,16 @@ class V2UserFieldName(str, Enum): """ allowed enum values """ - USER_FIELD_NAME_UNSPECIFIED = 'USER_FIELD_NAME_UNSPECIFIED' - USER_FIELD_NAME_USER_NAME = 'USER_FIELD_NAME_USER_NAME' - USER_FIELD_NAME_FIRST_NAME = 'USER_FIELD_NAME_FIRST_NAME' - USER_FIELD_NAME_LAST_NAME = 'USER_FIELD_NAME_LAST_NAME' - USER_FIELD_NAME_NICK_NAME = 'USER_FIELD_NAME_NICK_NAME' - USER_FIELD_NAME_DISPLAY_NAME = 'USER_FIELD_NAME_DISPLAY_NAME' - USER_FIELD_NAME_EMAIL = 'USER_FIELD_NAME_EMAIL' - USER_FIELD_NAME_STATE = 'USER_FIELD_NAME_STATE' - USER_FIELD_NAME_TYPE = 'USER_FIELD_NAME_TYPE' - USER_FIELD_NAME_CREATION_DATE = 'USER_FIELD_NAME_CREATION_DATE' + USER_FIELD_NAME_UNSPECIFIED = "USER_FIELD_NAME_UNSPECIFIED" + USER_FIELD_NAME_USER_NAME = "USER_FIELD_NAME_USER_NAME" + USER_FIELD_NAME_FIRST_NAME = "USER_FIELD_NAME_FIRST_NAME" + USER_FIELD_NAME_LAST_NAME = "USER_FIELD_NAME_LAST_NAME" + USER_FIELD_NAME_NICK_NAME = "USER_FIELD_NAME_NICK_NAME" + USER_FIELD_NAME_DISPLAY_NAME = "USER_FIELD_NAME_DISPLAY_NAME" + USER_FIELD_NAME_EMAIL = "USER_FIELD_NAME_EMAIL" + USER_FIELD_NAME_STATE = "USER_FIELD_NAME_STATE" + USER_FIELD_NAME_TYPE = "USER_FIELD_NAME_TYPE" + USER_FIELD_NAME_CREATION_DATE = "USER_FIELD_NAME_CREATION_DATE" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_user_id_query.py b/zitadel_client/models/v2_user_id_query.py index 4c26b444..20b61096 100644 --- a/zitadel_client/models/v2_user_id_query.py +++ b/zitadel_client/models/v2_user_id_query.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2UserIDQuery(BaseModel): """ V2UserIDQuery diff --git a/zitadel_client/models/v2_user_name_query.py b/zitadel_client/models/v2_user_name_query.py index ad80a186..6d1f1b5d 100644 --- a/zitadel_client/models/v2_user_name_query.py +++ b/zitadel_client/models/v2_user_name_query.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_text_query_method import V2TextQueryMethod -from typing import Optional, Set -from typing_extensions import Self + class V2UserNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_user_service_set_password_body.py b/zitadel_client/models/v2_user_service_set_password_body.py index e3dd9667..d7186019 100644 --- a/zitadel_client/models/v2_user_service_set_password_body.py +++ b/zitadel_client/models/v2_user_service_set_password_body.py @@ -13,16 +13,17 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional -from typing_extensions import Annotated +from typing_extensions import Annotated, Self + from zitadel_client.models.v2_password import V2Password -from typing import Optional, Set -from typing_extensions import Self + class V2UserServiceSetPasswordBody(BaseModel): """ @@ -30,7 +31,7 @@ class V2UserServiceSetPasswordBody(BaseModel): """ # noqa: E501 new_password: Optional[V2Password] = Field(default=None, alias="newPassword") current_password: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(alias="currentPassword") - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during password reset request\"", alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during password reset request"', alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["newPassword", "currentPassword", "verificationCode"] @@ -77,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of new_password if self.new_password: - _dict['newPassword'] = self.new_password.to_dict() + _dict["newPassword"] = self.new_password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_state.py b/zitadel_client/models/v2_user_state.py index 6b97c76f..9f9e3fdc 100644 --- a/zitadel_client/models/v2_user_state.py +++ b/zitadel_client/models/v2_user_state.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,12 +28,12 @@ class V2UserState(str, Enum): """ allowed enum values """ - USER_STATE_UNSPECIFIED = 'USER_STATE_UNSPECIFIED' - USER_STATE_ACTIVE = 'USER_STATE_ACTIVE' - USER_STATE_INACTIVE = 'USER_STATE_INACTIVE' - USER_STATE_DELETED = 'USER_STATE_DELETED' - USER_STATE_LOCKED = 'USER_STATE_LOCKED' - USER_STATE_INITIAL = 'USER_STATE_INITIAL' + USER_STATE_UNSPECIFIED = "USER_STATE_UNSPECIFIED" + USER_STATE_ACTIVE = "USER_STATE_ACTIVE" + USER_STATE_INACTIVE = "USER_STATE_INACTIVE" + USER_STATE_DELETED = "USER_STATE_DELETED" + USER_STATE_LOCKED = "USER_STATE_LOCKED" + USER_STATE_INITIAL = "USER_STATE_INITIAL" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_user_verification_requirement.py b/zitadel_client/models/v2_user_verification_requirement.py index c8256ede..8dc0fde7 100644 --- a/zitadel_client/models/v2_user_verification_requirement.py +++ b/zitadel_client/models/v2_user_verification_requirement.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,10 +28,10 @@ class V2UserVerificationRequirement(str, Enum): """ allowed enum values """ - USER_VERIFICATION_REQUIREMENT_UNSPECIFIED = 'USER_VERIFICATION_REQUIREMENT_UNSPECIFIED' - USER_VERIFICATION_REQUIREMENT_REQUIRED = 'USER_VERIFICATION_REQUIREMENT_REQUIRED' - USER_VERIFICATION_REQUIREMENT_PREFERRED = 'USER_VERIFICATION_REQUIREMENT_PREFERRED' - USER_VERIFICATION_REQUIREMENT_DISCOURAGED = 'USER_VERIFICATION_REQUIREMENT_DISCOURAGED' + USER_VERIFICATION_REQUIREMENT_UNSPECIFIED = "USER_VERIFICATION_REQUIREMENT_UNSPECIFIED" + USER_VERIFICATION_REQUIREMENT_REQUIRED = "USER_VERIFICATION_REQUIREMENT_REQUIRED" + USER_VERIFICATION_REQUIREMENT_PREFERRED = "USER_VERIFICATION_REQUIREMENT_PREFERRED" + USER_VERIFICATION_REQUIREMENT_DISCOURAGED = "USER_VERIFICATION_REQUIREMENT_DISCOURAGED" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_verify_email_response.py b/zitadel_client/models/v2_verify_email_response.py index a18c9f50..a4ca56d5 100644 --- a/zitadel_client/models/v2_verify_email_response.py +++ b/zitadel_client/models/v2_verify_email_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyEmailResponse(BaseModel): """ V2VerifyEmailResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_invite_code_response.py b/zitadel_client/models/v2_verify_invite_code_response.py index 8beccd2c..6bd6a762 100644 --- a/zitadel_client/models/v2_verify_invite_code_response.py +++ b/zitadel_client/models/v2_verify_invite_code_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyInviteCodeResponse(BaseModel): """ V2VerifyInviteCodeResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_passkey_registration_response.py b/zitadel_client/models/v2_verify_passkey_registration_response.py index 5760a1c5..50b2825c 100644 --- a/zitadel_client/models/v2_verify_passkey_registration_response.py +++ b/zitadel_client/models/v2_verify_passkey_registration_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyPasskeyRegistrationResponse(BaseModel): """ V2VerifyPasskeyRegistrationResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_phone_response.py b/zitadel_client/models/v2_verify_phone_response.py index f990c227..f768c99f 100644 --- a/zitadel_client/models/v2_verify_phone_response.py +++ b/zitadel_client/models/v2_verify_phone_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyPhoneResponse(BaseModel): """ V2VerifyPhoneResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_totp_registration_response.py b/zitadel_client/models/v2_verify_totp_registration_response.py index 23541568..1d6e777b 100644 --- a/zitadel_client/models/v2_verify_totp_registration_response.py +++ b/zitadel_client/models/v2_verify_totp_registration_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyTOTPRegistrationResponse(BaseModel): """ V2VerifyTOTPRegistrationResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_u2_f_registration_response.py b/zitadel_client/models/v2_verify_u2_f_registration_response.py index 34bdcabc..10779217 100644 --- a/zitadel_client/models/v2_verify_u2_f_registration_response.py +++ b/zitadel_client/models/v2_verify_u2_f_registration_response.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_details import V2Details -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_details import V2Details + + class V2VerifyU2FRegistrationResponse(BaseModel): """ V2VerifyU2FRegistrationResponse @@ -74,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_web_auth_n_factor.py b/zitadel_client/models/v2_web_auth_n_factor.py index 2c9f9f57..ba82b123 100644 --- a/zitadel_client/models/v2_web_auth_n_factor.py +++ b/zitadel_client/models/v2_web_auth_n_factor.py @@ -13,21 +13,22 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json - from datetime import datetime +from typing import Any, ClassVar, Dict, List, Optional, Set + from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class V2WebAuthNFactor(BaseModel): """ V2WebAuthNFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description="\"time when the passkey challenge was last checked\"", alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description='"time when the passkey challenge was last checked"', alias="verifiedAt") user_verified: Optional[StrictBool] = Field(default=None, alias="userVerified") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt", "userVerified"] diff --git a/zitadel_client/models/zitadelidpv2_options.py b/zitadel_client/models/zitadelidpv2_options.py index 007f77a3..69035a0a 100644 --- a/zitadel_client/models/zitadelidpv2_options.py +++ b/zitadel_client/models/zitadelidpv2_options.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption + + class Zitadelidpv2Options(BaseModel): """ Zitadelidpv2Options diff --git a/zitadel_client/models/zitadelidpv2_options1.py b/zitadel_client/models/zitadelidpv2_options1.py index a4c9c562..553f2252 100644 --- a/zitadel_client/models/zitadelidpv2_options1.py +++ b/zitadel_client/models/zitadelidpv2_options1.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing import Any, ClassVar, Dict, List, Optional -from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption -from typing import Optional, Set from typing_extensions import Self +from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption + + class Zitadelidpv2Options1(BaseModel): """ Zitadelidpv2Options1 diff --git a/zitadel_client/models/zitadelobjectv2_organization.py b/zitadel_client/models/zitadelobjectv2_organization.py index 3db9d255..0e587adf 100644 --- a/zitadel_client/models/zitadelobjectv2_organization.py +++ b/zitadel_client/models/zitadelobjectv2_organization.py @@ -13,15 +13,16 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set from typing_extensions import Self + class Zitadelobjectv2Organization(BaseModel): """ Zitadelobjectv2Organization diff --git a/zitadel_client/models/zitadelorgv2_organization.py b/zitadel_client/models/zitadelorgv2_organization.py index 0fd4d540..7a54220e 100644 --- a/zitadel_client/models/zitadelorgv2_organization.py +++ b/zitadel_client/models/zitadelorgv2_organization.py @@ -13,16 +13,18 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_organization_state import V2OrganizationState -from typing import Optional, Set -from typing_extensions import Self + class Zitadelorgv2Organization(BaseModel): """ @@ -79,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict['details'] = self.details.to_dict() + _dict["details"] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/zitadelorgv2_search_query.py b/zitadel_client/models/zitadelorgv2_search_query.py index ae35f0c4..86003e61 100644 --- a/zitadel_client/models/zitadelorgv2_search_query.py +++ b/zitadel_client/models/zitadelorgv2_search_query.py @@ -13,18 +13,20 @@ from __future__ import annotations + +import json import pprint import re # noqa: F401 -import json +from typing import Any, ClassVar, Dict, List, Optional, Set from pydantic import BaseModel, ConfigDict, Field -from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Self + from zitadel_client.models.v2_organization_domain_query import V2OrganizationDomainQuery from zitadel_client.models.v2_organization_id_query import V2OrganizationIDQuery from zitadel_client.models.v2_organization_name_query import V2OrganizationNameQuery from zitadel_client.models.v2_organization_state_query import V2OrganizationStateQuery -from typing import Optional, Set -from typing_extensions import Self + class Zitadelorgv2SearchQuery(BaseModel): """ @@ -81,16 +83,16 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of name_query if self.name_query: - _dict['nameQuery'] = self.name_query.to_dict() + _dict["nameQuery"] = self.name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of domain_query if self.domain_query: - _dict['domainQuery'] = self.domain_query.to_dict() + _dict["domainQuery"] = self.domain_query.to_dict() # override the default output from pydantic by calling `to_dict()` of state_query if self.state_query: - _dict['stateQuery'] = self.state_query.to_dict() + _dict["stateQuery"] = self.state_query.to_dict() # override the default output from pydantic by calling `to_dict()` of id_query if self.id_query: - _dict['idQuery'] = self.id_query.to_dict() + _dict["idQuery"] = self.id_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/zitadelv1_timestamp_query_method.py b/zitadel_client/models/zitadelv1_timestamp_query_method.py index 7208ab47..aa636cd2 100644 --- a/zitadel_client/models/zitadelv1_timestamp_query_method.py +++ b/zitadel_client/models/zitadelv1_timestamp_query_method.py @@ -13,8 +13,10 @@ from __future__ import annotations + import json from enum import Enum + from typing_extensions import Self @@ -26,11 +28,11 @@ class Zitadelv1TimestampQueryMethod(str, Enum): """ allowed enum values """ - TIMESTAMP_QUERY_METHOD_EQUALS = 'TIMESTAMP_QUERY_METHOD_EQUALS' - TIMESTAMP_QUERY_METHOD_GREATER = 'TIMESTAMP_QUERY_METHOD_GREATER' - TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS = 'TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS' - TIMESTAMP_QUERY_METHOD_LESS = 'TIMESTAMP_QUERY_METHOD_LESS' - TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS = 'TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS' + TIMESTAMP_QUERY_METHOD_EQUALS = "TIMESTAMP_QUERY_METHOD_EQUALS" + TIMESTAMP_QUERY_METHOD_GREATER = "TIMESTAMP_QUERY_METHOD_GREATER" + TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS = "TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS" + TIMESTAMP_QUERY_METHOD_LESS = "TIMESTAMP_QUERY_METHOD_LESS" + TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS = "TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS" @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/rest.py b/zitadel_client/rest.py index 28e38e9d..da220e68 100644 --- a/zitadel_client/rest.py +++ b/zitadel_client/rest.py @@ -12,189 +12,177 @@ RESTResponseType = urllib3.HTTPResponse -class RESTClientObject: - def __init__(self, configuration) -> None: # type: ignore - # urllib3.PoolManager will pass all kw parameters to connectionpool - # https://github.com/shazow/urllib3/blob/f9409436f83aeb79fbaf090181cd81b784f1b8ce/urllib3/poolmanager.py#L75 # noqa: E501 - # https://github.com/shazow/urllib3/blob/f9409436f83aeb79fbaf090181cd81b784f1b8ce/urllib3/connectionpool.py#L680 # noqa: E501 - # Custom SSL certificates and client certificates: http://urllib3.readthedocs.io/en/latest/advanced-usage.html # noqa: E501 - - # cert_reqs - if configuration.verify_ssl: - cert_reqs = ssl.CERT_REQUIRED - else: - cert_reqs = ssl.CERT_NONE - - pool_args = { - "cert_reqs": cert_reqs, - "ca_certs": configuration.ssl_ca_cert, - "cert_file": configuration.cert_file, - "key_file": configuration.key_file, - "ca_cert_data": configuration.ca_cert_data, - } - if configuration.assert_hostname is not None: - pool_args['assert_hostname'] = ( - configuration.assert_hostname - ) - - if configuration.retries is not None: - pool_args['retries'] = configuration.retries - - if configuration.tls_server_name: - pool_args['server_hostname'] = configuration.tls_server_name - - if configuration.socket_options is not None: - pool_args['socket_options'] = configuration.socket_options - - if configuration.connection_pool_maxsize is not None: - pool_args['maxsize'] = configuration.connection_pool_maxsize - - # https pool manager - self.pool_manager: urllib3.PoolManager - self.pool_manager = urllib3.PoolManager(**pool_args) - - def request( - self, - method: str, - url: str, - headers: Optional[Dict[str, str]] = None, - body=None, - post_params=None, - _request_timeout=None - ): - """Perform requests. - - :param method: http request method - :param url: http request url - :param headers: http request headers - :param body: request json body, for `application/json` - :param post_params: request post parameters, - `application/x-www-form-urlencoded` - and `multipart/form-data` - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - """ - method = method.upper() - assert method in [ - 'GET', - 'HEAD', - 'DELETE', - 'POST', - 'PUT', - 'PATCH', - 'OPTIONS' - ] - - if post_params and body: - raise ApiValueError( - "body parameter cannot be used with post_params parameter." - ) - - post_params = post_params or {} - headers = headers or {} - - timeout = None - if _request_timeout: - if isinstance(_request_timeout, (int, float)): - timeout = urllib3.Timeout(total=_request_timeout) - elif ( - isinstance(_request_timeout, tuple) - and len(_request_timeout) == 2 - ): - timeout = urllib3.Timeout( - connect=_request_timeout[0], - read=_request_timeout[1] - ) - - try: - # For `POST`, `PUT`, `PATCH`, `OPTIONS`, `DELETE` - if method in ['POST', 'PUT', 'PATCH', 'OPTIONS', 'DELETE']: - - # no content type provided or payload is json - content_type = headers.get('Content-Type') - if ( - not content_type - or re.search('json', content_type, re.IGNORECASE) - ): - request_body = None - if body is not None: - request_body = json.dumps(body) - r = self.pool_manager.request( - method, - url, - body=request_body, - timeout=timeout, - headers=headers, - preload_content=False - ) - elif content_type == 'application/x-www-form-urlencoded': - r = self.pool_manager.request( - method, - url, - fields=post_params, - encode_multipart=False, - timeout=timeout, - headers=headers, - preload_content=False - ) - elif content_type == 'multipart/form-data': - # must del headers['Content-Type'], or the correct - # Content-Type which generated by urllib3 will be - # overwritten. - del headers['Content-Type'] - # Ensures that dict objects are serialized - post_params = [(a, json.dumps(b)) if isinstance(b, dict) else (a, b) for a, b in post_params] - r = self.pool_manager.request( - method, - url, - fields=post_params, - encode_multipart=True, - timeout=timeout, - headers=headers, - preload_content=False - ) - # Pass a `string` parameter directly in the body to support - # other content types than JSON when `body` argument is - # provided in serialized form. - elif isinstance(body, str) or isinstance(body, bytes): - r = self.pool_manager.request( - method, - url, - body=body, - timeout=timeout, - headers=headers, - preload_content=False - ) - elif headers['Content-Type'].startswith('text/') and isinstance(body, bool): - request_body = "true" if body else "false" - r = self.pool_manager.request( - method, - url, - body=request_body, - preload_content=False, - timeout=timeout, - headers=headers) +class RESTClientObject: + def __init__(self, configuration) -> None: # type: ignore + # urllib3.PoolManager will pass all kw parameters to connectionpool + # https://github.com/shazow/urllib3/blob/f9409436f83aeb79fbaf090181cd81b784f1b8ce/urllib3/poolmanager.py#L75 # noqa: E501 + # https://github.com/shazow/urllib3/blob/f9409436f83aeb79fbaf090181cd81b784f1b8ce/urllib3/connectionpool.py#L680 # noqa: E501 + # Custom SSL certificates and client certificates: http://urllib3.readthedocs.io/en/latest/advanced-usage.html # noqa: E501 + + # cert_reqs + if configuration.verify_ssl: + cert_reqs = ssl.CERT_REQUIRED else: - # Cannot generate the request from given parameters - msg = """Cannot prepare a request message for provided + cert_reqs = ssl.CERT_NONE + + pool_args = { + "cert_reqs": cert_reqs, + "ca_certs": configuration.ssl_ca_cert, + "cert_file": configuration.cert_file, + "key_file": configuration.key_file, + "ca_cert_data": configuration.ca_cert_data, + } + if configuration.assert_hostname is not None: + pool_args["assert_hostname"] = configuration.assert_hostname + + if configuration.retries is not None: + pool_args["retries"] = configuration.retries + + if configuration.tls_server_name: + pool_args["server_hostname"] = configuration.tls_server_name + + if configuration.socket_options is not None: + pool_args["socket_options"] = configuration.socket_options + + if configuration.connection_pool_maxsize is not None: + pool_args["maxsize"] = configuration.connection_pool_maxsize + + # https pool manager + self.pool_manager: urllib3.PoolManager + self.pool_manager = urllib3.PoolManager(**pool_args) + + def request( + self, + method: str, + url: str, + headers: Optional[Dict[str, str]] = None, + body=None, + post_params=None, + _request_timeout=None, + ): + """Perform requests. + + :param method: http request method + :param url: http request url + :param headers: http request headers + :param body: request json body, for `application/json` + :param post_params: request post parameters, + `application/x-www-form-urlencoded` + and `multipart/form-data` + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + """ + method = method.upper() + assert method in ["GET", "HEAD", "DELETE", "POST", "PUT", "PATCH", "OPTIONS"] + + if post_params and body: + raise ApiValueError( + "body parameter cannot be used with post_params parameter." + ) + + post_params = post_params or {} + headers = headers or {} + + timeout = None + if _request_timeout: + if isinstance(_request_timeout, (int, float)): + timeout = urllib3.Timeout(total=_request_timeout) + elif isinstance(_request_timeout, tuple) and len(_request_timeout) == 2: + timeout = urllib3.Timeout( + connect=_request_timeout[0], read=_request_timeout[1] + ) + + try: + # For `POST`, `PUT`, `PATCH`, `OPTIONS`, `DELETE` + if method in ["POST", "PUT", "PATCH", "OPTIONS", "DELETE"]: + # no content type provided or payload is json + content_type = headers.get("Content-Type") + if not content_type or re.search("json", content_type, re.IGNORECASE): + request_body = None + if body is not None: + request_body = json.dumps(body) + r = self.pool_manager.request( + method, + url, + body=request_body, + timeout=timeout, + headers=headers, + preload_content=False, + ) + elif content_type == "application/x-www-form-urlencoded": + r = self.pool_manager.request( + method, + url, + fields=post_params, + encode_multipart=False, + timeout=timeout, + headers=headers, + preload_content=False, + ) + elif content_type == "multipart/form-data": + # must del headers['Content-Type'], or the correct + # Content-Type which generated by urllib3 will be + # overwritten. + del headers["Content-Type"] + # Ensures that dict objects are serialized + post_params = [ + (a, json.dumps(b)) if isinstance(b, dict) else (a, b) + for a, b in post_params + ] + r = self.pool_manager.request( + method, + url, + fields=post_params, + encode_multipart=True, + timeout=timeout, + headers=headers, + preload_content=False, + ) + # Pass a `string` parameter directly in the body to support + # other content types than JSON when `body` argument is + # provided in serialized form. + elif isinstance(body, str) or isinstance(body, bytes): + r = self.pool_manager.request( + method, + url, + body=body, + timeout=timeout, + headers=headers, + preload_content=False, + ) + elif headers["Content-Type"].startswith("text/") and isinstance( + body, bool + ): + request_body = "true" if body else "false" + r = self.pool_manager.request( + method, + url, + body=request_body, + preload_content=False, + timeout=timeout, + headers=headers, + ) + else: + # Cannot generate the request from given parameters + msg = """Cannot prepare a request message for provided arguments. Please check that your arguments match declared content type.""" - raise ApiException(status=0, reason=msg) - # For `GET`, `HEAD` - else: - r = self.pool_manager.request( - method, - url, - fields={}, - timeout=timeout, - headers=headers, - preload_content=False - ) - except urllib3.exceptions.SSLError as e: - msg = "\n".join([type(e).__name__, str(e)]) - raise ApiException(status=0, reason=msg) - - return RESTResponse(r) + raise ApiException(status=0, reason=msg) + # For `GET`, `HEAD` + else: + r = self.pool_manager.request( + method, + url, + fields={}, + timeout=timeout, + headers=headers, + preload_content=False, + ) + except urllib3.exceptions.SSLError as e: + msg = "\n".join([type(e).__name__, str(e)]) + raise ApiException(status=0, reason=msg) + + return RESTResponse(r) diff --git a/zitadel_client/rest_response.py b/zitadel_client/rest_response.py index 0546c747..b9ee8e84 100644 --- a/zitadel_client/rest_response.py +++ b/zitadel_client/rest_response.py @@ -1,27 +1,27 @@ import io -from typing import Dict, Any, Optional +from typing import Optional from urllib3 import BaseHTTPResponse, HTTPHeaderDict class RESTResponse(io.IOBase): - data: Optional[bytes] = None + data: Optional[bytes] = None - def __init__(self, resp: BaseHTTPResponse) -> None: - self.response = resp - self.status = resp.status - self.reason = resp.reason - self.data = None + def __init__(self, resp: BaseHTTPResponse) -> None: + self.response = resp + self.status = resp.status + self.reason = resp.reason + self.data = None - def read(self) -> Optional[bytes]: - if self.data is None: - self.data = self.response.data - return self.data + def read(self) -> Optional[bytes]: + if self.data is None: + self.data = self.response.data + return self.data - def getheaders(self) -> HTTPHeaderDict: - """Returns a dictionary of the response headers.""" - return self.response.headers + def getheaders(self) -> HTTPHeaderDict: + """Returns a dictionary of the response headers.""" + return self.response.headers - def getheader(self, name: str, default: Optional[str]=None) -> Optional[str]: - """Returns a given response header.""" - return self.response.headers.get(name, default) + def getheader(self, name: str, default: Optional[str] = None) -> Optional[str]: + """Returns a given response header.""" + return self.response.headers.get(name, default) diff --git a/zitadel_client/utils/url_util.py b/zitadel_client/utils/url_util.py index bd40b317..df4b63d6 100644 --- a/zitadel_client/utils/url_util.py +++ b/zitadel_client/utils/url_util.py @@ -1,12 +1,12 @@ class URLUtil: - @staticmethod - def build_hostname(host: str) -> str: - """ - Processes the host string. This might include cleaning up the input, - adding a protocol, or other logic similar to your Java URLUtil.buildHostname method. - """ - # For example, trim whitespace and ensure the host starts with 'https://' - host = host.strip() - if not host.startswith("http://") and not host.startswith("https://"): - host = "https://" + host - return host + @staticmethod + def build_hostname(host: str) -> str: + """ + Processes the host string. This might include cleaning up the input, + adding a protocol, or other logic similar to your Java URLUtil.buildHostname method. + """ + # For example, trim whitespace and ensure the host starts with 'https://' + host = host.strip() + if not host.startswith("http://") and not host.startswith("https://"): + host = "https://" + host + return host diff --git a/zitadel_client/version.py b/zitadel_client/version.py index c7240117..f062672d 100644 --- a/zitadel_client/version.py +++ b/zitadel_client/version.py @@ -1,2 +1,2 @@ class Version: - VERSION = "0.0.0" + VERSION = "0.0.0" diff --git a/zitadel_client/zitadel.py b/zitadel_client/zitadel.py index 1b2a5b43..0e16eb59 100644 --- a/zitadel_client/zitadel.py +++ b/zitadel_client/zitadel.py @@ -14,73 +14,82 @@ class Zitadel: - """ - Main entry point for the Zitadel SDK. - - This class initializes and configures the SDK with the provided authentication strategy. - It sets up service APIs for interacting with various Zitadel features such as identity providers, - organizations, sessions, settings, users, and more. - - Attributes: - configuration (Configuration): The configuration instance containing authentication and endpoint details. - client (ApiClient): The API client used for making HTTP requests to the Zitadel API. - features (FeatureServiceApi): Service API for feature management. - idps (IdentityProviderServiceApi): Service API for identity provider operations. - oidc (OIDCServiceApi): Service API for OIDC-related operations. - organizations (OrganizationServiceApi): Service API for organization-related operations. - sessions (SessionServiceApi): Service API for session management. - settings (SettingsServiceApi): Service API for settings management. - users (UserServiceApi): Service API for user management. - """ - - def __init__(self, authenticator: Authenticator, mutate_config: Optional[Callable[[Configuration], None]] = None): """ - Initialize the Zitadel SDK. - - This constructor creates a configuration instance using the provided authenticator. - Optionally, the configuration can be modified via the `mutate_config` callback function. - It then instantiates the underlying API client and initializes various service APIs. - - Args: - authenticator (Authenticator): The authentication strategy to be used. - mutate_config (callable, optional): A callback function that receives the configuration - instance for any additional modifications before the API client is created. - Defaults to None. - """ - self.configuration = Configuration(authenticator) - - if mutate_config: - mutate_config(self.configuration) - - client = ApiClient(configuration=self.configuration) - self.features = FeatureServiceApi(client) - self.idps = IdentityProviderServiceApi(client) - self.oidc = OIDCServiceApi(client) - self.organizations = OrganizationServiceApi(client) - self.sessions = SessionServiceApi(client) - self.settings = SettingsServiceApi(client) - self.users = UserServiceApi(client) - - T = TypeVar("T", bound="Zitadel") - - def __enter__(self: T) -> T: + Main entry point for the Zitadel SDK. + + This class initializes and configures the SDK with the provided authentication strategy. + It sets up service APIs for interacting with various Zitadel features such as identity providers, + organizations, sessions, settings, users, and more. + + Attributes: + configuration (Configuration): The configuration instance containing authentication and endpoint details. + client (ApiClient): The API client used for making HTTP requests to the Zitadel API. + features (FeatureServiceApi): Service API for feature management. + idps (IdentityProviderServiceApi): Service API for identity provider operations. + oidc (OIDCServiceApi): Service API for OIDC-related operations. + organizations (OrganizationServiceApi): Service API for organization-related operations. + sessions (SessionServiceApi): Service API for session management. + settings (SettingsServiceApi): Service API for settings management. + users (UserServiceApi): Service API for user management. """ - Enter the runtime context related to the Zitadel instance. - Returns: - Zitadel: The current instance. - """ - return self - - def __exit__(self, exc_type: Optional[Type[BaseException]], exc_value: Optional[BaseException], traceback: Optional[TracebackType]) -> Optional[bool]: - """ - Exit the runtime context. - - This method can be used to perform cleanup actions. Currently, it does nothing. - - Args: - exc_type: The exception type, if an exception occurred. - exc_value: The exception value, if an exception occurred. - traceback: The traceback of the exception, if an exception occurred. - """ - pass + def __init__( + self, + authenticator: Authenticator, + mutate_config: Optional[Callable[[Configuration], None]] = None, + ): + """ + Initialize the Zitadel SDK. + + This constructor creates a configuration instance using the provided authenticator. + Optionally, the configuration can be modified via the `mutate_config` callback function. + It then instantiates the underlying API client and initializes various service APIs. + + Args: + authenticator (Authenticator): The authentication strategy to be used. + mutate_config (callable, optional): A callback function that receives the configuration + instance for any additional modifications before the API client is created. + Defaults to None. + """ + self.configuration = Configuration(authenticator) + + if mutate_config: + mutate_config(self.configuration) + + client = ApiClient(configuration=self.configuration) + self.features = FeatureServiceApi(client) + self.idps = IdentityProviderServiceApi(client) + self.oidc = OIDCServiceApi(client) + self.organizations = OrganizationServiceApi(client) + self.sessions = SessionServiceApi(client) + self.settings = SettingsServiceApi(client) + self.users = UserServiceApi(client) + + T = TypeVar("T", bound="Zitadel") + + def __enter__(self: T) -> T: + """ + Enter the runtime context related to the Zitadel instance. + + Returns: + Zitadel: The current instance. + """ + return self + + def __exit__( + self, + exc_type: Optional[Type[BaseException]], + exc_value: Optional[BaseException], + traceback: Optional[TracebackType], + ) -> Optional[bool]: + """ + Exit the runtime context. + + This method can be used to perform cleanup actions. Currently, it does nothing. + + Args: + exc_type: The exception type, if an exception occurred. + exc_value: The exception value, if an exception occurred. + traceback: The traceback of the exception, if an exception occurred. + """ + pass From ba11ea7d03ba4ecee3f5ac4fbaf7b10d322fdeca Mon Sep 17 00:00:00 2001 From: Mridang Agarwalla Date: Thu, 17 Apr 2025 16:43:14 +0300 Subject: [PATCH 2/6] Undo changes to the api and models directories --- zitadel_client/api/feature_service_api.py | 452 ++--- .../api/identity_provider_service_api.py | 40 +- zitadel_client/api/oidc_service_api.py | 77 +- .../api/organization_service_api.py | 95 +- zitadel_client/api/session_service_api.py | 220 +-- zitadel_client/api/settings_api.py | 80 +- zitadel_client/api/settings_service_api.py | 353 ++-- zitadel_client/api/user_service_api.py | 1760 ++++++++--------- .../models/add_organization_request_admin.py | 12 +- ...add_organization_response_created_admin.py | 7 +- .../models/objectv2_list_details.py | 9 +- zitadel_client/models/objectv2_list_query.py | 7 +- .../oidc_service_create_callback_body.py | 14 +- zitadel_client/models/otp_email_send_code.py | 10 +- zitadel_client/models/protobuf_any.py | 7 +- .../models/request_challenges_otp_email.py | 12 +- .../models/request_challenges_otpsms.py | 7 +- zitadel_client/models/rpc_status.py | 12 +- .../session_service_delete_session_body.py | 9 +- .../session_service_set_session_body.py | 23 +- .../models/user_agent_header_values.py | 7 +- .../models/user_service_add_idp_link_body.py | 12 +- .../user_service_create_invite_code_body.py | 12 +- ...e_create_passkey_registration_link_body.py | 14 +- .../user_service_list_idp_links_body.py | 12 +- .../user_service_password_reset_body.py | 12 +- .../user_service_register_passkey_body.py | 14 +- .../models/user_service_register_u2_f_body.py | 9 +- .../user_service_resend_email_code_body.py | 14 +- .../user_service_resend_phone_code_body.py | 7 +- ..._retrieve_identity_provider_intent_body.py | 10 +- .../user_service_send_email_code_body.py | 14 +- .../models/user_service_set_email_body.py | 17 +- .../models/user_service_set_phone_body.py | 10 +- .../user_service_update_human_user_body.py | 19 +- .../models/user_service_verify_email_body.py | 12 +- .../user_service_verify_invite_code_body.py | 12 +- ...ervice_verify_passkey_registration_body.py | 10 +- .../models/user_service_verify_phone_body.py | 12 +- ...r_service_verify_totp_registration_body.py | 7 +- ...r_service_verify_u2_f_registration_body.py | 10 +- zitadel_client/models/userv2_set_password.py | 17 +- zitadel_client/models/userv2_type.py | 8 +- zitadel_client/models/v2_access_token_type.py | 6 +- .../models/v2_add_human_user_request.py | 31 +- .../models/v2_add_human_user_request1.py | 27 +- .../models/v2_add_human_user_response.py | 12 +- .../models/v2_add_idp_link_response.py | 12 +- .../models/v2_add_organization_request.py | 17 +- .../models/v2_add_organization_response.py | 18 +- .../models/v2_add_otp_email_response.py | 12 +- .../models/v2_add_otpsms_response.py | 12 +- zitadel_client/models/v2_and_query.py | 10 +- zitadel_client/models/v2_apple_config.py | 7 +- zitadel_client/models/v2_auth_factor.py | 12 +- zitadel_client/models/v2_auth_factor_state.py | 10 +- zitadel_client/models/v2_auth_factor_u2_f.py | 7 +- zitadel_client/models/v2_auth_request.py | 12 +- .../models/v2_authentication_method_type.py | 18 +- .../models/v2_authorization_error.py | 10 +- .../models/v2_auto_linking_option.py | 8 +- zitadel_client/models/v2_azure_ad_config.py | 12 +- zitadel_client/models/v2_azure_ad_tenant.py | 10 +- .../models/v2_azure_ad_tenant_type.py | 8 +- zitadel_client/models/v2_branding_settings.py | 16 +- zitadel_client/models/v2_challenges.py | 12 +- .../models/v2_challenges_web_auth_n.py | 7 +- zitadel_client/models/v2_check_idp_intent.py | 10 +- zitadel_client/models/v2_check_otp.py | 10 +- zitadel_client/models/v2_check_password.py | 10 +- zitadel_client/models/v2_check_totp.py | 10 +- zitadel_client/models/v2_check_user.py | 10 +- zitadel_client/models/v2_check_web_auth_n.py | 7 +- zitadel_client/models/v2_checks.py | 24 +- .../models/v2_create_callback_response.py | 14 +- .../models/v2_create_invite_code_response.py | 12 +- ...eate_passkey_registration_link_response.py | 14 +- .../models/v2_create_session_request.py | 23 +- .../models/v2_create_session_response.py | 18 +- .../models/v2_creation_date_query.py | 14 +- zitadel_client/models/v2_creator_query.py | 10 +- .../models/v2_deactivate_user_response.py | 12 +- .../models/v2_delete_session_response.py | 12 +- .../models/v2_delete_user_response.py | 12 +- zitadel_client/models/v2_details.py | 9 +- .../models/v2_display_name_query.py | 11 +- zitadel_client/models/v2_domain_settings.py | 10 +- zitadel_client/models/v2_email_query.py | 11 +- .../models/v2_embedded_iframe_settings.py | 7 +- zitadel_client/models/v2_error_reason.py | 36 +- zitadel_client/models/v2_factors.py | 24 +- zitadel_client/models/v2_feature_flag.py | 10 +- zitadel_client/models/v2_first_name_query.py | 11 +- zitadel_client/models/v2_gender.py | 10 +- .../models/v2_generic_oidc_config.py | 7 +- ..._get_active_identity_providers_response.py | 14 +- .../models/v2_get_auth_request_response.py | 12 +- .../v2_get_branding_settings_response.py | 14 +- .../models/v2_get_domain_settings_response.py | 14 +- .../v2_get_general_settings_response.py | 7 +- .../models/v2_get_idpby_id_response.py | 12 +- .../v2_get_instance_features_response.py | 44 +- ...get_legal_and_support_settings_response.py | 18 +- .../v2_get_lockout_settings_response.py | 14 +- .../models/v2_get_login_settings_response.py | 14 +- .../v2_get_organization_features_response.py | 12 +- ...t_password_complexity_settings_response.py | 18 +- ...2_get_password_expiry_settings_response.py | 14 +- .../v2_get_security_settings_response.py | 14 +- .../models/v2_get_session_response.py | 12 +- .../models/v2_get_system_features_response.py | 40 +- .../models/v2_get_user_by_id_response.py | 14 +- .../models/v2_get_user_features_response.py | 12 +- zitadel_client/models/v2_git_hub_config.py | 7 +- .../v2_git_hub_enterprise_server_config.py | 7 +- zitadel_client/models/v2_git_lab_config.py | 7 +- .../models/v2_git_lab_self_hosted_config.py | 7 +- zitadel_client/models/v2_google_config.py | 7 +- zitadel_client/models/v2_hashed_password.py | 12 +- zitadel_client/models/v2_human_email.py | 10 +- .../v2_human_mfa_init_skipped_response.py | 12 +- zitadel_client/models/v2_human_phone.py | 10 +- zitadel_client/models/v2_human_profile.py | 11 +- zitadel_client/models/v2_human_user.py | 18 +- zitadel_client/models/v2_identity_provider.py | 12 +- .../models/v2_identity_provider_type.py | 28 +- zitadel_client/models/v2_idp.py | 14 +- zitadel_client/models/v2_idp_config.py | 40 +- zitadel_client/models/v2_idp_information.py | 26 +- zitadel_client/models/v2_idp_intent.py | 10 +- zitadel_client/models/v2_idp_link.py | 10 +- zitadel_client/models/v2_idp_state.py | 12 +- zitadel_client/models/v2_idp_type.py | 28 +- .../models/v2_idpldap_access_information.py | 7 +- .../models/v2_idpo_auth_access_information.py | 7 +- .../models/v2_idpsaml_access_information.py | 12 +- zitadel_client/models/v2_ids_query.py | 7 +- .../models/v2_improved_performance.py | 14 +- .../v2_improved_performance_feature_flag.py | 10 +- .../models/v2_in_user_emails_query.py | 7 +- zitadel_client/models/v2_in_user_id_query.py | 7 +- zitadel_client/models/v2_intent_factor.py | 11 +- zitadel_client/models/v2_jwt_config.py | 7 +- zitadel_client/models/v2_last_name_query.py | 11 +- zitadel_client/models/v2_ldap_attributes.py | 7 +- zitadel_client/models/v2_ldap_config.py | 12 +- zitadel_client/models/v2_ldap_credentials.py | 10 +- .../models/v2_legal_and_support_settings.py | 10 +- ...v2_list_authentication_factors_response.py | 12 +- ...st_authentication_method_types_response.py | 16 +- zitadel_client/models/v2_list_details.py | 9 +- .../models/v2_list_idp_links_response.py | 14 +- .../models/v2_list_organizations_request.py | 14 +- .../models/v2_list_organizations_response.py | 14 +- .../models/v2_list_passkeys_response.py | 14 +- zitadel_client/models/v2_list_query.py | 7 +- .../models/v2_list_sessions_request.py | 14 +- .../models/v2_list_sessions_response.py | 14 +- .../models/v2_list_users_request.py | 14 +- .../models/v2_list_users_response.py | 14 +- .../models/v2_lock_user_response.py | 12 +- zitadel_client/models/v2_lockout_settings.py | 10 +- zitadel_client/models/v2_login_name_query.py | 11 +- zitadel_client/models/v2_login_settings.py | 10 +- zitadel_client/models/v2_login_v2.py | 7 +- .../models/v2_login_v2_feature_flag.py | 10 +- zitadel_client/models/v2_machine_user.py | 10 +- zitadel_client/models/v2_multi_factor_type.py | 6 +- zitadel_client/models/v2_nick_name_query.py | 11 +- zitadel_client/models/v2_not_query.py | 10 +- zitadel_client/models/v2_notification_type.py | 8 +- zitadel_client/models/v2_o_auth_config.py | 7 +- zitadel_client/models/v2_or_query.py | 10 +- zitadel_client/models/v2_organization.py | 7 +- .../models/v2_organization_domain_query.py | 11 +- .../models/v2_organization_field_name.py | 6 +- .../models/v2_organization_id_query.py | 10 +- .../models/v2_organization_name_query.py | 11 +- .../models/v2_organization_state.py | 10 +- .../models/v2_organization_state_query.py | 10 +- zitadel_client/models/v2_otp_factor.py | 11 +- zitadel_client/models/v2_passkey.py | 11 +- .../models/v2_passkey_authenticator.py | 8 +- .../models/v2_passkey_registration_code.py | 14 +- zitadel_client/models/v2_passkeys_type.py | 6 +- zitadel_client/models/v2_password.py | 10 +- .../models/v2_password_complexity_settings.py | 12 +- .../models/v2_password_expiry_settings.py | 10 +- zitadel_client/models/v2_password_factor.py | 11 +- .../models/v2_password_reset_response.py | 12 +- zitadel_client/models/v2_phone_query.py | 11 +- zitadel_client/models/v2_prompt.py | 14 +- .../models/v2_reactivate_user_response.py | 12 +- zitadel_client/models/v2_redirect_urls.py | 10 +- .../models/v2_register_passkey_response.py | 12 +- .../models/v2_register_totp_response.py | 12 +- .../models/v2_register_u2_f_response.py | 12 +- .../models/v2_remove_idp_link_response.py | 12 +- .../models/v2_remove_otp_email_response.py | 12 +- .../models/v2_remove_otpsms_response.py | 12 +- .../models/v2_remove_passkey_response.py | 12 +- .../models/v2_remove_phone_response.py | 12 +- .../models/v2_remove_totp_response.py | 12 +- .../models/v2_remove_u2_f_response.py | 12 +- .../models/v2_request_challenges.py | 20 +- .../v2_request_challenges_web_auth_n.py | 14 +- .../models/v2_resend_email_code_response.py | 12 +- .../models/v2_resend_invite_code_response.py | 12 +- .../models/v2_resend_phone_code_response.py | 12 +- .../v2_reset_instance_features_response.py | 12 +- ...v2_reset_organization_features_response.py | 12 +- .../v2_reset_system_features_response.py | 12 +- .../models/v2_reset_user_features_response.py | 12 +- .../models/v2_resource_owner_type.py | 8 +- ...rieve_identity_provider_intent_response.py | 14 +- zitadel_client/models/v2_saml_binding.py | 10 +- zitadel_client/models/v2_saml_config.py | 22 +- .../models/v2_saml_name_id_format.py | 10 +- zitadel_client/models/v2_search_query.py | 20 +- zitadel_client/models/v2_search_query1.py | 43 +- .../models/v2_second_factor_type.py | 12 +- zitadel_client/models/v2_security_settings.py | 12 +- .../models/v2_send_email_code_response.py | 12 +- .../models/v2_send_email_verification_code.py | 10 +- zitadel_client/models/v2_send_invite_code.py | 10 +- .../v2_send_passkey_registration_link.py | 10 +- .../models/v2_send_password_reset_link.py | 11 +- zitadel_client/models/v2_session.py | 10 +- zitadel_client/models/v2_session1.py | 31 +- .../models/v2_session_field_name.py | 6 +- .../models/v2_set_email_response.py | 12 +- zitadel_client/models/v2_set_human_email.py | 17 +- zitadel_client/models/v2_set_human_email1.py | 17 +- zitadel_client/models/v2_set_human_phone.py | 10 +- zitadel_client/models/v2_set_human_phone1.py | 10 +- zitadel_client/models/v2_set_human_profile.py | 11 +- .../models/v2_set_human_profile1.py | 11 +- .../v2_set_instance_features_request.py | 12 +- .../v2_set_instance_features_response.py | 12 +- .../models/v2_set_metadata_entry.py | 12 +- .../models/v2_set_metadata_entry1.py | 12 +- .../v2_set_organization_features_response.py | 12 +- .../models/v2_set_password_response.py | 12 +- .../models/v2_set_phone_response.py | 12 +- .../v2_set_security_settings_request.py | 12 +- .../v2_set_security_settings_response.py | 12 +- .../models/v2_set_session_response.py | 16 +- .../models/v2_set_system_features_request.py | 12 +- .../models/v2_set_system_features_response.py | 12 +- .../models/v2_set_user_features_response.py | 12 +- zitadel_client/models/v2_source.py | 16 +- ..._start_identity_provider_intent_request.py | 15 +- ...start_identity_provider_intent_response.py | 17 +- zitadel_client/models/v2_state_query.py | 10 +- zitadel_client/models/v2_text_query_method.py | 18 +- zitadel_client/models/v2_theme.py | 7 +- zitadel_client/models/v2_theme_mode.py | 10 +- zitadel_client/models/v2_totp_factor.py | 11 +- zitadel_client/models/v2_type_query.py | 10 +- .../models/v2_unlock_user_response.py | 12 +- .../models/v2_update_human_user_response.py | 12 +- zitadel_client/models/v2_user.py | 16 +- zitadel_client/models/v2_user_agent.py | 12 +- zitadel_client/models/v2_user_agent_query.py | 10 +- zitadel_client/models/v2_user_factor.py | 19 +- zitadel_client/models/v2_user_field_name.py | 22 +- zitadel_client/models/v2_user_id_query.py | 7 +- zitadel_client/models/v2_user_name_query.py | 11 +- .../v2_user_service_set_password_body.py | 15 +- zitadel_client/models/v2_user_state.py | 14 +- .../v2_user_verification_requirement.py | 10 +- .../models/v2_verify_email_response.py | 12 +- .../models/v2_verify_invite_code_response.py | 12 +- ...v2_verify_passkey_registration_response.py | 12 +- .../models/v2_verify_phone_response.py | 12 +- .../v2_verify_totp_registration_response.py | 12 +- .../v2_verify_u2_f_registration_response.py | 12 +- zitadel_client/models/v2_web_auth_n_factor.py | 11 +- zitadel_client/models/zitadelidpv2_options.py | 10 +- .../models/zitadelidpv2_options1.py | 10 +- .../models/zitadelobjectv2_organization.py | 7 +- .../models/zitadelorgv2_organization.py | 12 +- .../models/zitadelorgv2_search_query.py | 18 +- .../zitadelv1_timestamp_query_method.py | 12 +- 284 files changed, 2981 insertions(+), 3554 deletions(-) diff --git a/zitadel_client/api/feature_service_api.py b/zitadel_client/api/feature_service_api.py index 14b98f51..ddd4373f 100644 --- a/zitadel_client/api/feature_service_api.py +++ b/zitadel_client/api/feature_service_api.py @@ -11,55 +11,31 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union +from typing_extensions import Annotated -from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call +from pydantic import Field, StrictBool, StrictStr +from typing import Optional from typing_extensions import Annotated +from zitadel_client.models.v2_get_instance_features_response import V2GetInstanceFeaturesResponse +from zitadel_client.models.v2_get_organization_features_response import V2GetOrganizationFeaturesResponse +from zitadel_client.models.v2_get_system_features_response import V2GetSystemFeaturesResponse +from zitadel_client.models.v2_get_user_features_response import V2GetUserFeaturesResponse +from zitadel_client.models.v2_reset_instance_features_response import V2ResetInstanceFeaturesResponse +from zitadel_client.models.v2_reset_organization_features_response import V2ResetOrganizationFeaturesResponse +from zitadel_client.models.v2_reset_system_features_response import V2ResetSystemFeaturesResponse +from zitadel_client.models.v2_reset_user_features_response import V2ResetUserFeaturesResponse +from zitadel_client.models.v2_set_instance_features_request import V2SetInstanceFeaturesRequest +from zitadel_client.models.v2_set_instance_features_response import V2SetInstanceFeaturesResponse +from zitadel_client.models.v2_set_organization_features_response import V2SetOrganizationFeaturesResponse +from zitadel_client.models.v2_set_system_features_request import V2SetSystemFeaturesRequest +from zitadel_client.models.v2_set_system_features_response import V2SetSystemFeaturesResponse +from zitadel_client.models.v2_set_user_features_response import V2SetUserFeaturesResponse from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.v2_get_instance_features_response import ( - V2GetInstanceFeaturesResponse, -) -from zitadel_client.models.v2_get_organization_features_response import ( - V2GetOrganizationFeaturesResponse, -) -from zitadel_client.models.v2_get_system_features_response import ( - V2GetSystemFeaturesResponse, -) -from zitadel_client.models.v2_get_user_features_response import ( - V2GetUserFeaturesResponse, -) -from zitadel_client.models.v2_reset_instance_features_response import ( - V2ResetInstanceFeaturesResponse, -) -from zitadel_client.models.v2_reset_organization_features_response import ( - V2ResetOrganizationFeaturesResponse, -) -from zitadel_client.models.v2_reset_system_features_response import ( - V2ResetSystemFeaturesResponse, -) -from zitadel_client.models.v2_reset_user_features_response import ( - V2ResetUserFeaturesResponse, -) -from zitadel_client.models.v2_set_instance_features_request import ( - V2SetInstanceFeaturesRequest, -) -from zitadel_client.models.v2_set_instance_features_response import ( - V2SetInstanceFeaturesResponse, -) -from zitadel_client.models.v2_set_organization_features_response import ( - V2SetOrganizationFeaturesResponse, -) -from zitadel_client.models.v2_set_system_features_request import ( - V2SetSystemFeaturesRequest, -) -from zitadel_client.models.v2_set_system_features_response import ( - V2SetSystemFeaturesResponse, -) -from zitadel_client.models.v2_set_user_features_response import ( - V2SetUserFeaturesResponse, -) from zitadel_client.rest import RESTResponseType @@ -130,9 +106,9 @@ def get_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -199,9 +175,9 @@ def get_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -268,9 +244,9 @@ def get_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -306,7 +282,7 @@ def _get_instance_features_serialize( # process the query parameters if inheritance is not None: - _query_params.append(("inheritance", inheritance)) + _query_params.append(('inheritance', inheritance)) # process the header parameters # process the form parameters @@ -314,22 +290,22 @@ def _get_instance_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/features/instance", + method='GET', + resource_path='/v2/features/instance', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -403,9 +379,9 @@ def get_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -476,9 +452,9 @@ def get_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -549,9 +525,9 @@ def get_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -586,11 +562,11 @@ def _get_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params["organizationId"] = organization_id + _path_params['organizationId'] = organization_id # process the query parameters if inheritance is not None: - _query_params.append(("inheritance", inheritance)) + _query_params.append(('inheritance', inheritance)) # process the header parameters # process the form parameters @@ -598,22 +574,22 @@ def _get_organization_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/features/organization/{organizationId}", + method='GET', + resource_path='/v2/features/organization/{organizationId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -679,9 +655,9 @@ def get_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -744,9 +720,9 @@ def get_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -809,9 +785,9 @@ def get_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -850,22 +826,22 @@ def _get_system_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/features/system", + method='GET', + resource_path='/v2/features/system', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -939,9 +915,9 @@ def get_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1012,9 +988,9 @@ def get_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1085,9 +1061,9 @@ def get_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1122,11 +1098,11 @@ def _get_user_features_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters if inheritance is not None: - _query_params.append(("inheritance", inheritance)) + _query_params.append(('inheritance', inheritance)) # process the header parameters # process the form parameters @@ -1134,22 +1110,22 @@ def _get_user_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/features/user/{userId}", + method='GET', + resource_path='/v2/features/user/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1215,9 +1191,9 @@ def reset_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1280,9 +1256,9 @@ def reset_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1345,9 +1321,9 @@ def reset_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1386,22 +1362,22 @@ def _reset_instance_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/features/instance", + method='DELETE', + resource_path='/v2/features/instance', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1471,9 +1447,9 @@ def reset_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1540,9 +1516,9 @@ def reset_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1609,9 +1585,9 @@ def reset_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1645,7 +1621,7 @@ def _reset_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params["organizationId"] = organization_id + _path_params['organizationId'] = organization_id # process the query parameters # process the header parameters # process the form parameters @@ -1653,22 +1629,22 @@ def _reset_organization_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/features/organization/{organizationId}", + method='DELETE', + resource_path='/v2/features/organization/{organizationId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1734,9 +1710,9 @@ def reset_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1799,9 +1775,9 @@ def reset_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1864,9 +1840,9 @@ def reset_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1905,22 +1881,22 @@ def _reset_system_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/features/system", + method='DELETE', + resource_path='/v2/features/system', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1990,9 +1966,9 @@ def reset_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2059,9 +2035,9 @@ def reset_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2128,9 +2104,9 @@ def reset_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2164,7 +2140,7 @@ def _reset_user_features_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2172,22 +2148,22 @@ def _reset_user_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/features/user/{userId}", + method='DELETE', + resource_path='/v2/features/user/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2257,9 +2233,9 @@ def set_instance_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2326,9 +2302,9 @@ def set_instance_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2395,9 +2371,9 @@ def set_instance_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetInstanceFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetInstanceFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2439,35 +2415,35 @@ def _set_instance_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/features/instance", + method='PUT', + resource_path='/v2/features/instance', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2537,9 +2513,9 @@ def set_organization_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2606,9 +2582,9 @@ def set_organization_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2675,9 +2651,9 @@ def set_organization_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetOrganizationFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetOrganizationFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2711,7 +2687,7 @@ def _set_organization_features_serialize( # process the path parameters if organization_id is not None: - _path_params["organizationId"] = organization_id + _path_params['organizationId'] = organization_id # process the query parameters # process the header parameters # process the form parameters @@ -2719,22 +2695,22 @@ def _set_organization_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/features/organization/{organizationId}", + method='PUT', + resource_path='/v2/features/organization/{organizationId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2804,9 +2780,9 @@ def set_system_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2873,9 +2849,9 @@ def set_system_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2942,9 +2918,9 @@ def set_system_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSystemFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSystemFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2986,35 +2962,35 @@ def _set_system_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/features/system", + method='PUT', + resource_path='/v2/features/system', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3084,9 +3060,9 @@ def set_user_features( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3153,9 +3129,9 @@ def set_user_features_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3222,9 +3198,9 @@ def set_user_features_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetUserFeaturesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetUserFeaturesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3258,7 +3234,7 @@ def _set_user_features_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -3266,22 +3242,22 @@ def _set_user_features_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/features/user/{userId}", + method='PUT', + resource_path='/v2/features/user/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/identity_provider_service_api.py b/zitadel_client/api/identity_provider_service_api.py index 7ca658a2..d68acdb6 100644 --- a/zitadel_client/api/identity_provider_service_api.py +++ b/zitadel_client/api/identity_provider_service_api.py @@ -11,14 +11,16 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union - -from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated +from pydantic import StrictStr +from zitadel_client.models.v2_get_idpby_id_response import V2GetIDPByIDResponse + from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.v2_get_idpby_id_response import V2GetIDPByIDResponse from zitadel_client.rest import RESTResponseType @@ -89,9 +91,9 @@ def get_idpby_id( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetIDPByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetIDPByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -158,9 +160,9 @@ def get_idpby_id_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetIDPByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetIDPByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -227,9 +229,9 @@ def get_idpby_id_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetIDPByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetIDPByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -263,7 +265,7 @@ def _get_idpby_id_serialize( # process the path parameters if id is not None: - _path_params["id"] = id + _path_params['id'] = id # process the query parameters # process the header parameters # process the form parameters @@ -271,22 +273,22 @@ def _get_idpby_id_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/idps/{id}", + method='GET', + resource_path='/v2/idps/{id}', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/oidc_service_api.py b/zitadel_client/api/oidc_service_api.py index 86689150..d28e9912 100644 --- a/zitadel_client/api/oidc_service_api.py +++ b/zitadel_client/api/oidc_service_api.py @@ -13,14 +13,13 @@ from typing import Any, Dict, List, Optional, Tuple, Union -from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call +from pydantic import Field, StrictStr +from pydantic import validate_call, StrictFloat, StrictInt from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.oidc_service_create_callback_body import ( - OIDCServiceCreateCallbackBody, -) +from zitadel_client.models.oidc_service_create_callback_body import OIDCServiceCreateCallbackBody from zitadel_client.models.v2_create_callback_response import V2CreateCallbackResponse from zitadel_client.models.v2_get_auth_request_response import V2GetAuthRequestResponse from zitadel_client.rest import RESTResponseType @@ -97,9 +96,9 @@ def create_callback( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateCallbackResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateCallbackResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -170,9 +169,9 @@ def create_callback_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateCallbackResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateCallbackResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -243,9 +242,9 @@ def create_callback_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateCallbackResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateCallbackResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -280,7 +279,7 @@ def _create_callback_serialize( # process the path parameters if auth_request_id is not None: - _path_params["authRequestId"] = auth_request_id + _path_params['authRequestId'] = auth_request_id # process the query parameters # process the header parameters # process the form parameters @@ -290,35 +289,35 @@ def _create_callback_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/oidc/auth_requests/{authRequestId}", + method='POST', + resource_path='/v2/oidc/auth_requests/{authRequestId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -388,9 +387,9 @@ def get_auth_request( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetAuthRequestResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetAuthRequestResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -457,9 +456,9 @@ def get_auth_request_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetAuthRequestResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetAuthRequestResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -526,9 +525,9 @@ def get_auth_request_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetAuthRequestResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetAuthRequestResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -562,7 +561,7 @@ def _get_auth_request_serialize( # process the path parameters if auth_request_id is not None: - _path_params["authRequestId"] = auth_request_id + _path_params['authRequestId'] = auth_request_id # process the query parameters # process the header parameters # process the form parameters @@ -570,22 +569,22 @@ def _get_auth_request_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/oidc/auth_requests/{authRequestId}", + method='GET', + resource_path='/v2/oidc/auth_requests/{authRequestId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/organization_service_api.py b/zitadel_client/api/organization_service_api.py index fb9f54a9..09a2efea 100644 --- a/zitadel_client/api/organization_service_api.py +++ b/zitadel_client/api/organization_service_api.py @@ -11,21 +11,18 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union - -from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.api_client import ApiClient, RequestSerialized -from zitadel_client.api_response import ApiResponse from zitadel_client.models.v2_add_organization_request import V2AddOrganizationRequest from zitadel_client.models.v2_add_organization_response import V2AddOrganizationResponse -from zitadel_client.models.v2_list_organizations_request import ( - V2ListOrganizationsRequest, -) -from zitadel_client.models.v2_list_organizations_response import ( - V2ListOrganizationsResponse, -) +from zitadel_client.models.v2_list_organizations_request import V2ListOrganizationsRequest +from zitadel_client.models.v2_list_organizations_response import V2ListOrganizationsResponse + +from zitadel_client.api_client import ApiClient, RequestSerialized +from zitadel_client.api_response import ApiResponse from zitadel_client.rest import RESTResponseType @@ -96,9 +93,9 @@ def add_organization( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOrganizationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOrganizationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -165,9 +162,9 @@ def add_organization_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOrganizationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOrganizationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -234,9 +231,9 @@ def add_organization_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOrganizationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOrganizationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -278,35 +275,35 @@ def _add_organization_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/organizations", + method='POST', + resource_path='/v2/organizations', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -376,10 +373,10 @@ def list_organizations( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListOrganizationsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListOrganizationsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -446,10 +443,10 @@ def list_organizations_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListOrganizationsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListOrganizationsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -516,10 +513,10 @@ def list_organizations_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListOrganizationsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListOrganizationsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -561,35 +558,35 @@ def _list_organizations_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/organizations/_search", + method='POST', + resource_path='/v2/organizations/_search', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/session_service_api.py b/zitadel_client/api/session_service_api.py index 47ffd6c0..71fd7393 100644 --- a/zitadel_client/api/session_service_api.py +++ b/zitadel_client/api/session_service_api.py @@ -11,19 +11,16 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union - -from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.api_client import ApiClient, RequestSerialized -from zitadel_client.api_response import ApiResponse -from zitadel_client.models.session_service_delete_session_body import ( - SessionServiceDeleteSessionBody, -) -from zitadel_client.models.session_service_set_session_body import ( - SessionServiceSetSessionBody, -) +from pydantic import Field, StrictStr +from typing import Optional +from typing_extensions import Annotated +from zitadel_client.models.session_service_delete_session_body import SessionServiceDeleteSessionBody +from zitadel_client.models.session_service_set_session_body import SessionServiceSetSessionBody from zitadel_client.models.v2_create_session_request import V2CreateSessionRequest from zitadel_client.models.v2_create_session_response import V2CreateSessionResponse from zitadel_client.models.v2_delete_session_response import V2DeleteSessionResponse @@ -31,6 +28,9 @@ from zitadel_client.models.v2_list_sessions_request import V2ListSessionsRequest from zitadel_client.models.v2_list_sessions_response import V2ListSessionsResponse from zitadel_client.models.v2_set_session_response import V2SetSessionResponse + +from zitadel_client.api_client import ApiClient, RequestSerialized +from zitadel_client.api_response import ApiResponse from zitadel_client.rest import RESTResponseType @@ -101,9 +101,9 @@ def create_session( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -170,9 +170,9 @@ def create_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -239,9 +239,9 @@ def create_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -283,35 +283,35 @@ def _create_session_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/sessions", + method='POST', + resource_path='/v2/sessions', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -330,7 +330,7 @@ def _create_session_serialize( @validate_call def delete_session( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -385,9 +385,9 @@ def delete_session( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -403,7 +403,7 @@ def delete_session( @validate_call def delete_session_with_http_info( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -458,9 +458,9 @@ def delete_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -476,7 +476,7 @@ def delete_session_with_http_info( @validate_call def delete_session_without_preload_content( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to terminate"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to terminate\"")], body: SessionServiceDeleteSessionBody, _request_timeout: Union[ None, @@ -531,9 +531,9 @@ def delete_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -568,7 +568,7 @@ def _delete_session_serialize( # process the path parameters if session_id is not None: - _path_params["sessionId"] = session_id + _path_params['sessionId'] = session_id # process the query parameters # process the header parameters # process the form parameters @@ -578,35 +578,35 @@ def _delete_session_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/sessions/{sessionId}", + method='DELETE', + resource_path='/v2/sessions/{sessionId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -680,9 +680,9 @@ def get_session( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -753,9 +753,9 @@ def get_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -826,9 +826,9 @@ def get_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -863,11 +863,11 @@ def _get_session_serialize( # process the path parameters if session_id is not None: - _path_params["sessionId"] = session_id + _path_params['sessionId'] = session_id # process the query parameters if session_token is not None: - _query_params.append(("sessionToken", session_token)) + _query_params.append(('sessionToken', session_token)) # process the header parameters # process the form parameters @@ -875,22 +875,22 @@ def _get_session_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/sessions/{sessionId}", + method='GET', + resource_path='/v2/sessions/{sessionId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -960,10 +960,10 @@ def list_sessions( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListSessionsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListSessionsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1030,10 +1030,10 @@ def list_sessions_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListSessionsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListSessionsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1100,10 +1100,10 @@ def list_sessions_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListSessionsResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListSessionsResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1145,35 +1145,35 @@ def _list_sessions_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/sessions/search", + method='POST', + resource_path='/v2/sessions/search', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1192,7 +1192,7 @@ def _list_sessions_serialize( @validate_call def set_session( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1247,9 +1247,9 @@ def set_session( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1265,7 +1265,7 @@ def set_session( @validate_call def set_session_with_http_info( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1320,9 +1320,9 @@ def set_session_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1338,7 +1338,7 @@ def set_session_with_http_info( @validate_call def set_session_without_preload_content( self, - session_id: Annotated[StrictStr, Field(description='"id of the session to update"')], + session_id: Annotated[StrictStr, Field(description="\"id of the session to update\"")], body: SessionServiceSetSessionBody, _request_timeout: Union[ None, @@ -1393,9 +1393,9 @@ def set_session_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSessionResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSessionResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1430,7 +1430,7 @@ def _set_session_serialize( # process the path parameters if session_id is not None: - _path_params["sessionId"] = session_id + _path_params['sessionId'] = session_id # process the query parameters # process the header parameters # process the form parameters @@ -1440,35 +1440,35 @@ def _set_session_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PATCH", - resource_path="/v2/sessions/{sessionId}", + method='PATCH', + resource_path='/v2/sessions/{sessionId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/settings_api.py b/zitadel_client/api/settings_api.py index 50a09435..4ff62223 100644 --- a/zitadel_client/api/settings_api.py +++ b/zitadel_client/api/settings_api.py @@ -13,20 +13,14 @@ from typing import Any, Dict, List, Optional, Tuple, Union -from pydantic import Field, StrictFloat, StrictInt, StrictStr, validate_call +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing_extensions import Annotated from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.v2_get_security_settings_response import ( - V2GetSecuritySettingsResponse, -) -from zitadel_client.models.v2_set_security_settings_request import ( - V2SetSecuritySettingsRequest, -) -from zitadel_client.models.v2_set_security_settings_response import ( - V2SetSecuritySettingsResponse, -) +from zitadel_client.models.v2_get_security_settings_response import V2GetSecuritySettingsResponse +from zitadel_client.models.v2_set_security_settings_request import V2SetSecuritySettingsRequest +from zitadel_client.models.v2_set_security_settings_response import V2SetSecuritySettingsResponse from zitadel_client.rest import RESTResponseType @@ -93,9 +87,9 @@ def get_security_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -158,9 +152,9 @@ def get_security_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -223,9 +217,9 @@ def get_security_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -264,22 +258,22 @@ def _get_security_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/security", + method='GET', + resource_path='/v2/settings/security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -349,9 +343,9 @@ def set_security_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -418,9 +412,9 @@ def set_security_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -487,9 +481,9 @@ def set_security_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetSecuritySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetSecuritySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -531,35 +525,35 @@ def _set_security_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/policies/security", + method='PUT', + resource_path='/v2/policies/security', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/settings_service_api.py b/zitadel_client/api/settings_service_api.py index 17787a0c..6076a48d 100644 --- a/zitadel_client/api/settings_service_api.py +++ b/zitadel_client/api/settings_service_api.py @@ -11,40 +11,25 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union - -from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated +from pydantic import StrictBool, StrictStr +from typing import Optional +from zitadel_client.models.v2_get_active_identity_providers_response import V2GetActiveIdentityProvidersResponse +from zitadel_client.models.v2_get_branding_settings_response import V2GetBrandingSettingsResponse +from zitadel_client.models.v2_get_domain_settings_response import V2GetDomainSettingsResponse +from zitadel_client.models.v2_get_general_settings_response import V2GetGeneralSettingsResponse +from zitadel_client.models.v2_get_legal_and_support_settings_response import V2GetLegalAndSupportSettingsResponse +from zitadel_client.models.v2_get_lockout_settings_response import V2GetLockoutSettingsResponse +from zitadel_client.models.v2_get_login_settings_response import V2GetLoginSettingsResponse +from zitadel_client.models.v2_get_password_complexity_settings_response import V2GetPasswordComplexitySettingsResponse +from zitadel_client.models.v2_get_password_expiry_settings_response import V2GetPasswordExpirySettingsResponse + from zitadel_client.api_client import ApiClient, RequestSerialized from zitadel_client.api_response import ApiResponse -from zitadel_client.models.v2_get_active_identity_providers_response import ( - V2GetActiveIdentityProvidersResponse, -) -from zitadel_client.models.v2_get_branding_settings_response import ( - V2GetBrandingSettingsResponse, -) -from zitadel_client.models.v2_get_domain_settings_response import ( - V2GetDomainSettingsResponse, -) -from zitadel_client.models.v2_get_general_settings_response import ( - V2GetGeneralSettingsResponse, -) -from zitadel_client.models.v2_get_legal_and_support_settings_response import ( - V2GetLegalAndSupportSettingsResponse, -) -from zitadel_client.models.v2_get_lockout_settings_response import ( - V2GetLockoutSettingsResponse, -) -from zitadel_client.models.v2_get_login_settings_response import ( - V2GetLoginSettingsResponse, -) -from zitadel_client.models.v2_get_password_complexity_settings_response import ( - V2GetPasswordComplexitySettingsResponse, -) -from zitadel_client.models.v2_get_password_expiry_settings_response import ( - V2GetPasswordExpirySettingsResponse, -) from zitadel_client.rest import RESTResponseType @@ -135,9 +120,9 @@ def get_active_identity_providers( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetActiveIdentityProvidersResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetActiveIdentityProvidersResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -224,9 +209,9 @@ def get_active_identity_providers_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetActiveIdentityProvidersResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetActiveIdentityProvidersResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -313,9 +298,9 @@ def get_active_identity_providers_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetActiveIdentityProvidersResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetActiveIdentityProvidersResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -356,27 +341,27 @@ def _get_active_identity_providers_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) if creation_allowed is not None: - _query_params.append(("creationAllowed", creation_allowed)) + _query_params.append(('creationAllowed', creation_allowed)) if linking_allowed is not None: - _query_params.append(("linkingAllowed", linking_allowed)) + _query_params.append(('linkingAllowed', linking_allowed)) if auto_creation is not None: - _query_params.append(("autoCreation", auto_creation)) + _query_params.append(('autoCreation', auto_creation)) if auto_linking is not None: - _query_params.append(("autoLinking", auto_linking)) + _query_params.append(('autoLinking', auto_linking)) # process the header parameters # process the form parameters @@ -384,22 +369,22 @@ def _get_active_identity_providers_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/login/idps", + method='GET', + resource_path='/v2/settings/login/idps', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -473,9 +458,9 @@ def get_branding_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetBrandingSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetBrandingSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -546,9 +531,9 @@ def get_branding_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetBrandingSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetBrandingSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -619,9 +604,9 @@ def get_branding_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetBrandingSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetBrandingSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -658,11 +643,11 @@ def _get_branding_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -670,22 +655,22 @@ def _get_branding_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/branding", + method='GET', + resource_path='/v2/settings/branding', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -759,9 +744,9 @@ def get_domain_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetDomainSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetDomainSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -832,9 +817,9 @@ def get_domain_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetDomainSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetDomainSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -905,9 +890,9 @@ def get_domain_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetDomainSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetDomainSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -944,11 +929,11 @@ def _get_domain_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -956,22 +941,22 @@ def _get_domain_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/domain", + method='GET', + resource_path='/v2/settings/domain', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1037,9 +1022,9 @@ def get_general_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetGeneralSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetGeneralSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1102,9 +1087,9 @@ def get_general_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetGeneralSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetGeneralSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1167,9 +1152,9 @@ def get_general_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetGeneralSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetGeneralSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1208,22 +1193,22 @@ def _get_general_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings", + method='GET', + resource_path='/v2/settings', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1297,9 +1282,9 @@ def get_legal_and_support_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLegalAndSupportSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLegalAndSupportSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1370,9 +1355,9 @@ def get_legal_and_support_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLegalAndSupportSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLegalAndSupportSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1443,9 +1428,9 @@ def get_legal_and_support_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLegalAndSupportSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLegalAndSupportSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1482,11 +1467,11 @@ def _get_legal_and_support_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -1494,22 +1479,22 @@ def _get_legal_and_support_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/legal_support", + method='GET', + resource_path='/v2/settings/legal_support', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1583,9 +1568,9 @@ def get_lockout_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLockoutSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLockoutSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1656,9 +1641,9 @@ def get_lockout_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLockoutSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLockoutSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1729,9 +1714,9 @@ def get_lockout_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLockoutSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLockoutSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1768,11 +1753,11 @@ def _get_lockout_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -1780,22 +1765,22 @@ def _get_lockout_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/lockout", + method='GET', + resource_path='/v2/settings/lockout', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1869,9 +1854,9 @@ def get_login_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLoginSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLoginSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1942,9 +1927,9 @@ def get_login_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLoginSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLoginSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2015,9 +2000,9 @@ def get_login_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetLoginSettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetLoginSettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2054,11 +2039,11 @@ def _get_login_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -2066,22 +2051,22 @@ def _get_login_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/login", + method='GET', + resource_path='/v2/settings/login', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2155,9 +2140,9 @@ def get_password_complexity_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordComplexitySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordComplexitySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2228,9 +2213,9 @@ def get_password_complexity_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordComplexitySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordComplexitySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2301,9 +2286,9 @@ def get_password_complexity_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordComplexitySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordComplexitySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2340,11 +2325,11 @@ def _get_password_complexity_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -2352,22 +2337,22 @@ def _get_password_complexity_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/password/complexity", + method='GET', + resource_path='/v2/settings/password/complexity', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2441,9 +2426,9 @@ def get_password_expiry_settings( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordExpirySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordExpirySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2514,9 +2499,9 @@ def get_password_expiry_settings_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordExpirySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordExpirySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2587,9 +2572,9 @@ def get_password_expiry_settings_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetPasswordExpirySettingsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetPasswordExpirySettingsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2626,11 +2611,11 @@ def _get_password_expiry_settings_serialize( # process the query parameters if ctx_org_id is not None: - _query_params.append(("ctx.orgId", ctx_org_id)) + _query_params.append(('ctx.orgId', ctx_org_id)) if ctx_instance is not None: - _query_params.append(("ctx.instance", ctx_instance)) + _query_params.append(('ctx.instance', ctx_instance)) # process the header parameters # process the form parameters @@ -2638,22 +2623,22 @@ def _get_password_expiry_settings_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/settings/password/expiry", + method='GET', + resource_path='/v2/settings/password/expiry', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/api/user_service_api.py b/zitadel_client/api/user_service_api.py index adcdaff1..6b064a02 100644 --- a/zitadel_client/api/user_service_api.py +++ b/zitadel_client/api/user_service_api.py @@ -11,92 +11,47 @@ Do not edit the class manually. """ # noqa: E501 +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt from typing import Any, Dict, List, Optional, Tuple, Union - -from pydantic import Field, StrictBool, StrictFloat, StrictInt, StrictStr, validate_call from typing_extensions import Annotated -from zitadel_client.api_client import ApiClient, RequestSerialized -from zitadel_client.api_response import ApiResponse -from zitadel_client.models.user_service_add_idp_link_body import ( - UserServiceAddIDPLinkBody, -) -from zitadel_client.models.user_service_create_invite_code_body import ( - UserServiceCreateInviteCodeBody, -) -from zitadel_client.models.user_service_create_passkey_registration_link_body import ( - UserServiceCreatePasskeyRegistrationLinkBody, -) -from zitadel_client.models.user_service_list_idp_links_body import ( - UserServiceListIDPLinksBody, -) -from zitadel_client.models.user_service_password_reset_body import ( - UserServicePasswordResetBody, -) -from zitadel_client.models.user_service_register_passkey_body import ( - UserServiceRegisterPasskeyBody, -) -from zitadel_client.models.user_service_register_u2_f_body import ( - UserServiceRegisterU2FBody, -) -from zitadel_client.models.user_service_resend_email_code_body import ( - UserServiceResendEmailCodeBody, -) -from zitadel_client.models.user_service_resend_phone_code_body import ( - UserServiceResendPhoneCodeBody, -) -from zitadel_client.models.user_service_retrieve_identity_provider_intent_body import ( - UserServiceRetrieveIdentityProviderIntentBody, -) -from zitadel_client.models.user_service_send_email_code_body import ( - UserServiceSendEmailCodeBody, -) +from pydantic import Field, StrictBool, StrictStr, field_validator +from typing import List, Optional +from typing_extensions import Annotated +from zitadel_client.models.user_service_add_idp_link_body import UserServiceAddIDPLinkBody +from zitadel_client.models.user_service_create_invite_code_body import UserServiceCreateInviteCodeBody +from zitadel_client.models.user_service_create_passkey_registration_link_body import UserServiceCreatePasskeyRegistrationLinkBody +from zitadel_client.models.user_service_list_idp_links_body import UserServiceListIDPLinksBody +from zitadel_client.models.user_service_password_reset_body import UserServicePasswordResetBody +from zitadel_client.models.user_service_register_passkey_body import UserServiceRegisterPasskeyBody +from zitadel_client.models.user_service_register_u2_f_body import UserServiceRegisterU2FBody +from zitadel_client.models.user_service_resend_email_code_body import UserServiceResendEmailCodeBody +from zitadel_client.models.user_service_resend_phone_code_body import UserServiceResendPhoneCodeBody +from zitadel_client.models.user_service_retrieve_identity_provider_intent_body import UserServiceRetrieveIdentityProviderIntentBody +from zitadel_client.models.user_service_send_email_code_body import UserServiceSendEmailCodeBody from zitadel_client.models.user_service_set_email_body import UserServiceSetEmailBody from zitadel_client.models.user_service_set_phone_body import UserServiceSetPhoneBody -from zitadel_client.models.user_service_update_human_user_body import ( - UserServiceUpdateHumanUserBody, -) -from zitadel_client.models.user_service_verify_email_body import ( - UserServiceVerifyEmailBody, -) -from zitadel_client.models.user_service_verify_invite_code_body import ( - UserServiceVerifyInviteCodeBody, -) -from zitadel_client.models.user_service_verify_passkey_registration_body import ( - UserServiceVerifyPasskeyRegistrationBody, -) -from zitadel_client.models.user_service_verify_phone_body import ( - UserServiceVerifyPhoneBody, -) -from zitadel_client.models.user_service_verify_totp_registration_body import ( - UserServiceVerifyTOTPRegistrationBody, -) -from zitadel_client.models.user_service_verify_u2_f_registration_body import ( - UserServiceVerifyU2FRegistrationBody, -) +from zitadel_client.models.user_service_update_human_user_body import UserServiceUpdateHumanUserBody +from zitadel_client.models.user_service_verify_email_body import UserServiceVerifyEmailBody +from zitadel_client.models.user_service_verify_invite_code_body import UserServiceVerifyInviteCodeBody +from zitadel_client.models.user_service_verify_passkey_registration_body import UserServiceVerifyPasskeyRegistrationBody +from zitadel_client.models.user_service_verify_phone_body import UserServiceVerifyPhoneBody +from zitadel_client.models.user_service_verify_totp_registration_body import UserServiceVerifyTOTPRegistrationBody +from zitadel_client.models.user_service_verify_u2_f_registration_body import UserServiceVerifyU2FRegistrationBody from zitadel_client.models.v2_add_human_user_request import V2AddHumanUserRequest from zitadel_client.models.v2_add_human_user_response import V2AddHumanUserResponse from zitadel_client.models.v2_add_idp_link_response import V2AddIDPLinkResponse from zitadel_client.models.v2_add_otp_email_response import V2AddOTPEmailResponse from zitadel_client.models.v2_add_otpsms_response import V2AddOTPSMSResponse -from zitadel_client.models.v2_create_invite_code_response import ( - V2CreateInviteCodeResponse, -) -from zitadel_client.models.v2_create_passkey_registration_link_response import ( - V2CreatePasskeyRegistrationLinkResponse, -) +from zitadel_client.models.v2_create_invite_code_response import V2CreateInviteCodeResponse +from zitadel_client.models.v2_create_passkey_registration_link_response import V2CreatePasskeyRegistrationLinkResponse from zitadel_client.models.v2_deactivate_user_response import V2DeactivateUserResponse from zitadel_client.models.v2_delete_user_response import V2DeleteUserResponse from zitadel_client.models.v2_get_user_by_id_response import V2GetUserByIDResponse -from zitadel_client.models.v2_human_mfa_init_skipped_response import ( - V2HumanMFAInitSkippedResponse, -) -from zitadel_client.models.v2_list_authentication_factors_response import ( - V2ListAuthenticationFactorsResponse, -) -from zitadel_client.models.v2_list_authentication_method_types_response import ( - V2ListAuthenticationMethodTypesResponse, -) +from zitadel_client.models.v2_human_mfa_init_skipped_response import V2HumanMFAInitSkippedResponse +from zitadel_client.models.v2_list_authentication_factors_response import V2ListAuthenticationFactorsResponse +from zitadel_client.models.v2_list_authentication_method_types_response import V2ListAuthenticationMethodTypesResponse from zitadel_client.models.v2_list_idp_links_response import V2ListIDPLinksResponse from zitadel_client.models.v2_list_passkeys_response import V2ListPasskeysResponse from zitadel_client.models.v2_list_users_request import V2ListUsersRequest @@ -114,49 +69,28 @@ from zitadel_client.models.v2_remove_phone_response import V2RemovePhoneResponse from zitadel_client.models.v2_remove_totp_response import V2RemoveTOTPResponse from zitadel_client.models.v2_remove_u2_f_response import V2RemoveU2FResponse -from zitadel_client.models.v2_resend_email_code_response import ( - V2ResendEmailCodeResponse, -) -from zitadel_client.models.v2_resend_invite_code_response import ( - V2ResendInviteCodeResponse, -) -from zitadel_client.models.v2_resend_phone_code_response import ( - V2ResendPhoneCodeResponse, -) -from zitadel_client.models.v2_retrieve_identity_provider_intent_response import ( - V2RetrieveIdentityProviderIntentResponse, -) +from zitadel_client.models.v2_resend_email_code_response import V2ResendEmailCodeResponse +from zitadel_client.models.v2_resend_invite_code_response import V2ResendInviteCodeResponse +from zitadel_client.models.v2_resend_phone_code_response import V2ResendPhoneCodeResponse +from zitadel_client.models.v2_retrieve_identity_provider_intent_response import V2RetrieveIdentityProviderIntentResponse from zitadel_client.models.v2_send_email_code_response import V2SendEmailCodeResponse from zitadel_client.models.v2_set_email_response import V2SetEmailResponse from zitadel_client.models.v2_set_password_response import V2SetPasswordResponse from zitadel_client.models.v2_set_phone_response import V2SetPhoneResponse -from zitadel_client.models.v2_start_identity_provider_intent_request import ( - V2StartIdentityProviderIntentRequest, -) -from zitadel_client.models.v2_start_identity_provider_intent_response import ( - V2StartIdentityProviderIntentResponse, -) +from zitadel_client.models.v2_start_identity_provider_intent_request import V2StartIdentityProviderIntentRequest +from zitadel_client.models.v2_start_identity_provider_intent_response import V2StartIdentityProviderIntentResponse from zitadel_client.models.v2_unlock_user_response import V2UnlockUserResponse -from zitadel_client.models.v2_update_human_user_response import ( - V2UpdateHumanUserResponse, -) -from zitadel_client.models.v2_user_service_set_password_body import ( - V2UserServiceSetPasswordBody, -) +from zitadel_client.models.v2_update_human_user_response import V2UpdateHumanUserResponse +from zitadel_client.models.v2_user_service_set_password_body import V2UserServiceSetPasswordBody from zitadel_client.models.v2_verify_email_response import V2VerifyEmailResponse -from zitadel_client.models.v2_verify_invite_code_response import ( - V2VerifyInviteCodeResponse, -) -from zitadel_client.models.v2_verify_passkey_registration_response import ( - V2VerifyPasskeyRegistrationResponse, -) +from zitadel_client.models.v2_verify_invite_code_response import V2VerifyInviteCodeResponse +from zitadel_client.models.v2_verify_passkey_registration_response import V2VerifyPasskeyRegistrationResponse from zitadel_client.models.v2_verify_phone_response import V2VerifyPhoneResponse -from zitadel_client.models.v2_verify_totp_registration_response import ( - V2VerifyTOTPRegistrationResponse, -) -from zitadel_client.models.v2_verify_u2_f_registration_response import ( - V2VerifyU2FRegistrationResponse, -) +from zitadel_client.models.v2_verify_totp_registration_response import V2VerifyTOTPRegistrationResponse +from zitadel_client.models.v2_verify_u2_f_registration_response import V2VerifyU2FRegistrationResponse + +from zitadel_client.api_client import ApiClient, RequestSerialized +from zitadel_client.api_response import ApiResponse from zitadel_client.rest import RESTResponseType @@ -227,9 +161,9 @@ def add_human_user( ) _response_types_map: Dict[str, Optional[str]] = { - "201": "V2AddHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '201': "V2AddHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -296,9 +230,9 @@ def add_human_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "201": "V2AddHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '201': "V2AddHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -365,9 +299,9 @@ def add_human_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "201": "V2AddHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '201': "V2AddHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -409,35 +343,35 @@ def _add_human_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/human", + method='POST', + resource_path='/v2/users/human', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -511,9 +445,9 @@ def add_idp_link( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -584,9 +518,9 @@ def add_idp_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -657,9 +591,9 @@ def add_idp_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -694,7 +628,7 @@ def _add_idp_link_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -704,35 +638,35 @@ def _add_idp_link_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/links", + method='POST', + resource_path='/v2/users/{userId}/links', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -802,9 +736,9 @@ def add_otp_email( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -871,9 +805,9 @@ def add_otp_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -940,9 +874,9 @@ def add_otp_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -976,7 +910,7 @@ def _add_otp_email_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -984,22 +918,22 @@ def _add_otp_email_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/otp_email", + method='POST', + resource_path='/v2/users/{userId}/otp_email', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1069,9 +1003,9 @@ def add_otpsms( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1138,9 +1072,9 @@ def add_otpsms_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1207,9 +1141,9 @@ def add_otpsms_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2AddOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2AddOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1243,7 +1177,7 @@ def _add_otpsms_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1251,22 +1185,22 @@ def _add_otpsms_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/otp_sms", + method='POST', + resource_path='/v2/users/{userId}/otp_sms', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1340,9 +1274,9 @@ def create_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1413,9 +1347,9 @@ def create_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1486,9 +1420,9 @@ def create_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreateInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreateInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1523,7 +1457,7 @@ def _create_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1533,35 +1467,35 @@ def _create_invite_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/invite_code", + method='POST', + resource_path='/v2/users/{userId}/invite_code', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1635,9 +1569,9 @@ def create_passkey_registration_link( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreatePasskeyRegistrationLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreatePasskeyRegistrationLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1708,9 +1642,9 @@ def create_passkey_registration_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreatePasskeyRegistrationLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreatePasskeyRegistrationLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1781,9 +1715,9 @@ def create_passkey_registration_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2CreatePasskeyRegistrationLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2CreatePasskeyRegistrationLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1818,7 +1752,7 @@ def _create_passkey_registration_link_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -1828,35 +1762,35 @@ def _create_passkey_registration_link_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/passkeys/registration_link", + method='POST', + resource_path='/v2/users/{userId}/passkeys/registration_link', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -1926,9 +1860,9 @@ def deactivate_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -1995,9 +1929,9 @@ def deactivate_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2064,9 +1998,9 @@ def deactivate_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2100,7 +2034,7 @@ def _deactivate_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2108,22 +2042,22 @@ def _deactivate_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/deactivate", + method='POST', + resource_path='/v2/users/{userId}/deactivate', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2193,9 +2127,9 @@ def delete_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2262,9 +2196,9 @@ def delete_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2331,9 +2265,9 @@ def delete_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2DeleteUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2DeleteUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2367,7 +2301,7 @@ def _delete_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2375,22 +2309,22 @@ def _delete_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}", + method='DELETE', + resource_path='/v2/users/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2460,9 +2394,9 @@ def get_user_by_id( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2529,9 +2463,9 @@ def get_user_by_id_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2598,9 +2532,9 @@ def get_user_by_id_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2GetUserByIDResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2GetUserByIDResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2634,7 +2568,7 @@ def _get_user_by_id_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2642,22 +2576,22 @@ def _get_user_by_id_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/users/{userId}", + method='GET', + resource_path='/v2/users/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -2727,9 +2661,9 @@ def human_mfa_init_skipped( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2HumanMFAInitSkippedResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2HumanMFAInitSkippedResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2796,9 +2730,9 @@ def human_mfa_init_skipped_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2HumanMFAInitSkippedResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2HumanMFAInitSkippedResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2865,9 +2799,9 @@ def human_mfa_init_skipped_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2HumanMFAInitSkippedResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2HumanMFAInitSkippedResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -2901,7 +2835,7 @@ def _human_mfa_init_skipped_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -2909,22 +2843,22 @@ def _human_mfa_init_skipped_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/mfa_init_skipped", + method='POST', + resource_path='/v2/users/{userId}/mfa_init_skipped', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3001,9 +2935,9 @@ def list_authentication_factors( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationFactorsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationFactorsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3077,9 +3011,9 @@ def list_authentication_factors_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationFactorsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationFactorsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3153,9 +3087,9 @@ def list_authentication_factors_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationFactorsResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationFactorsResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3178,8 +3112,8 @@ def _list_authentication_factors_serialize( _host = None _collection_formats: Dict[str, str] = { - "authFactors": "multi", - "states": "multi", + 'authFactors': 'multi', + 'states': 'multi', } _path_params: Dict[str, str] = {} @@ -3193,15 +3127,15 @@ def _list_authentication_factors_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters if auth_factors is not None: - _query_params.append(("authFactors", auth_factors)) + _query_params.append(('authFactors', auth_factors)) if states is not None: - _query_params.append(("states", states)) + _query_params.append(('states', states)) # process the header parameters # process the form parameters @@ -3209,22 +3143,22 @@ def _list_authentication_factors_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/authentication_factors/_search", + method='POST', + resource_path='/v2/users/{userId}/authentication_factors/_search', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3302,9 +3236,9 @@ def list_authentication_method_types( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationMethodTypesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationMethodTypesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3379,9 +3313,9 @@ def list_authentication_method_types_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationMethodTypesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationMethodTypesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3456,9 +3390,9 @@ def list_authentication_method_types_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListAuthenticationMethodTypesResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListAuthenticationMethodTypesResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3494,15 +3428,15 @@ def _list_authentication_method_types_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters if domain_query_include_without_domain is not None: - _query_params.append(("domainQuery.includeWithoutDomain", domain_query_include_without_domain)) + _query_params.append(('domainQuery.includeWithoutDomain', domain_query_include_without_domain)) if domain_query_domain is not None: - _query_params.append(("domainQuery.domain", domain_query_domain)) + _query_params.append(('domainQuery.domain', domain_query_domain)) # process the header parameters # process the form parameters @@ -3510,22 +3444,22 @@ def _list_authentication_method_types_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="GET", - resource_path="/v2/users/{userId}/authentication_methods", + method='GET', + resource_path='/v2/users/{userId}/authentication_methods', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3599,9 +3533,9 @@ def list_idp_links( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListIDPLinksResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListIDPLinksResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3672,9 +3606,9 @@ def list_idp_links_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListIDPLinksResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListIDPLinksResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3745,9 +3679,9 @@ def list_idp_links_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListIDPLinksResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListIDPLinksResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3782,7 +3716,7 @@ def _list_idp_links_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -3792,35 +3726,35 @@ def _list_idp_links_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/links/_search", + method='POST', + resource_path='/v2/users/{userId}/links/_search', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -3890,9 +3824,9 @@ def list_passkeys( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListPasskeysResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListPasskeysResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -3959,9 +3893,9 @@ def list_passkeys_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListPasskeysResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListPasskeysResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4028,9 +3962,9 @@ def list_passkeys_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListPasskeysResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListPasskeysResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4064,7 +3998,7 @@ def _list_passkeys_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4072,22 +4006,22 @@ def _list_passkeys_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/passkeys/_search", + method='POST', + resource_path='/v2/users/{userId}/passkeys/_search', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4157,10 +4091,10 @@ def list_users( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListUsersResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListUsersResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4227,10 +4161,10 @@ def list_users_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListUsersResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListUsersResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4297,10 +4231,10 @@ def list_users_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ListUsersResponse", - "400": "RpcStatus", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ListUsersResponse", + '400': "RpcStatus", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4342,35 +4276,35 @@ def _list_users_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users", + method='POST', + resource_path='/v2/users', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4440,9 +4374,9 @@ def lock_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2LockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2LockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4509,9 +4443,9 @@ def lock_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2LockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2LockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4578,9 +4512,9 @@ def lock_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2LockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2LockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4614,7 +4548,7 @@ def _lock_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4622,22 +4556,22 @@ def _lock_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/lock", + method='POST', + resource_path='/v2/users/{userId}/lock', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -4711,9 +4645,9 @@ def password_reset( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2PasswordResetResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2PasswordResetResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4784,9 +4718,9 @@ def password_reset_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2PasswordResetResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2PasswordResetResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4857,9 +4791,9 @@ def password_reset_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2PasswordResetResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2PasswordResetResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -4894,7 +4828,7 @@ def _password_reset_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -4904,35 +4838,35 @@ def _password_reset_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/password_reset", + method='POST', + resource_path='/v2/users/{userId}/password_reset', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5002,9 +4936,9 @@ def reactivate_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ReactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ReactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5071,9 +5005,9 @@ def reactivate_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ReactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ReactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5140,9 +5074,9 @@ def reactivate_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ReactivateUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ReactivateUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5176,7 +5110,7 @@ def _reactivate_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5184,22 +5118,22 @@ def _reactivate_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/reactivate", + method='POST', + resource_path='/v2/users/{userId}/reactivate', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5273,9 +5207,9 @@ def register_passkey( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterPasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterPasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5346,9 +5280,9 @@ def register_passkey_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterPasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterPasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5419,9 +5353,9 @@ def register_passkey_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterPasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterPasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5456,7 +5390,7 @@ def _register_passkey_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5466,35 +5400,35 @@ def _register_passkey_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/passkeys", + method='POST', + resource_path='/v2/users/{userId}/passkeys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5564,9 +5498,9 @@ def register_totp( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5633,9 +5567,9 @@ def register_totp_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5702,9 +5636,9 @@ def register_totp_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5738,7 +5672,7 @@ def _register_totp_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -5746,22 +5680,22 @@ def _register_totp_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/totp", + method='POST', + resource_path='/v2/users/{userId}/totp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -5835,9 +5769,9 @@ def register_u2_f( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5908,9 +5842,9 @@ def register_u2_f_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -5981,9 +5915,9 @@ def register_u2_f_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RegisterU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RegisterU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6018,7 +5952,7 @@ def _register_u2_f_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -6028,35 +5962,35 @@ def _register_u2_f_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/u2f", + method='POST', + resource_path='/v2/users/{userId}/u2f', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6134,9 +6068,9 @@ def remove_idp_link( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6211,9 +6145,9 @@ def remove_idp_link_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6288,9 +6222,9 @@ def remove_idp_link_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveIDPLinkResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveIDPLinkResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6326,11 +6260,11 @@ def _remove_idp_link_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id if idp_id is not None: - _path_params["idpId"] = idp_id + _path_params['idpId'] = idp_id if linked_user_id is not None: - _path_params["linkedUserId"] = linked_user_id + _path_params['linkedUserId'] = linked_user_id # process the query parameters # process the header parameters # process the form parameters @@ -6338,22 +6272,22 @@ def _remove_idp_link_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/links/{idpId}/{linkedUserId}", + method='DELETE', + resource_path='/v2/users/{userId}/links/{idpId}/{linkedUserId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6423,9 +6357,9 @@ def remove_otp_email( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6492,9 +6426,9 @@ def remove_otp_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6561,9 +6495,9 @@ def remove_otp_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6597,7 +6531,7 @@ def _remove_otp_email_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -6605,22 +6539,22 @@ def _remove_otp_email_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/otp_email", + method='DELETE', + resource_path='/v2/users/{userId}/otp_email', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6690,9 +6624,9 @@ def remove_otpsms( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6759,9 +6693,9 @@ def remove_otpsms_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6828,9 +6762,9 @@ def remove_otpsms_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveOTPSMSResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveOTPSMSResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -6864,7 +6798,7 @@ def _remove_otpsms_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -6872,22 +6806,22 @@ def _remove_otpsms_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/otp_sms", + method='DELETE', + resource_path='/v2/users/{userId}/otp_sms', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -6961,9 +6895,9 @@ def remove_passkey( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7034,9 +6968,9 @@ def remove_passkey_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7107,9 +7041,9 @@ def remove_passkey_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePasskeyResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePasskeyResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7144,9 +7078,9 @@ def _remove_passkey_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id if passkey_id is not None: - _path_params["passkeyId"] = passkey_id + _path_params['passkeyId'] = passkey_id # process the query parameters # process the header parameters # process the form parameters @@ -7154,22 +7088,22 @@ def _remove_passkey_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/passkeys/{passkeyId}", + method='DELETE', + resource_path='/v2/users/{userId}/passkeys/{passkeyId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7239,9 +7173,9 @@ def remove_phone( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7308,9 +7242,9 @@ def remove_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7377,9 +7311,9 @@ def remove_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemovePhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemovePhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7413,7 +7347,7 @@ def _remove_phone_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -7421,22 +7355,22 @@ def _remove_phone_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/phone", + method='DELETE', + resource_path='/v2/users/{userId}/phone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7506,9 +7440,9 @@ def remove_totp( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7575,9 +7509,9 @@ def remove_totp_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7644,9 +7578,9 @@ def remove_totp_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveTOTPResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveTOTPResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7680,7 +7614,7 @@ def _remove_totp_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -7688,22 +7622,22 @@ def _remove_totp_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/totp", + method='DELETE', + resource_path='/v2/users/{userId}/totp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -7777,9 +7711,9 @@ def remove_u2_f( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7850,9 +7784,9 @@ def remove_u2_f_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7923,9 +7857,9 @@ def remove_u2_f_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RemoveU2FResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RemoveU2FResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -7960,9 +7894,9 @@ def _remove_u2_f_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id if u2f_id is not None: - _path_params["u2fId"] = u2f_id + _path_params['u2fId'] = u2f_id # process the query parameters # process the header parameters # process the form parameters @@ -7970,22 +7904,22 @@ def _remove_u2_f_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="DELETE", - resource_path="/v2/users/{userId}/u2f/{u2fId}", + method='DELETE', + resource_path='/v2/users/{userId}/u2f/{u2fId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8059,9 +7993,9 @@ def resend_email_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8132,9 +8066,9 @@ def resend_email_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8205,9 +8139,9 @@ def resend_email_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8242,7 +8176,7 @@ def _resend_email_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8252,35 +8186,35 @@ def _resend_email_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/email/resend", + method='POST', + resource_path='/v2/users/{userId}/email/resend', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8350,9 +8284,9 @@ def resend_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8419,9 +8353,9 @@ def resend_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8488,9 +8422,9 @@ def resend_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8524,7 +8458,7 @@ def _resend_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8532,22 +8466,22 @@ def _resend_invite_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/invite_code/resend", + method='POST', + resource_path='/v2/users/{userId}/invite_code/resend', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8621,9 +8555,9 @@ def resend_phone_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendPhoneCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendPhoneCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8694,9 +8628,9 @@ def resend_phone_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendPhoneCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendPhoneCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8767,9 +8701,9 @@ def resend_phone_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2ResendPhoneCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2ResendPhoneCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8804,7 +8738,7 @@ def _resend_phone_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -8814,35 +8748,35 @@ def _resend_phone_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/phone/resend", + method='POST', + resource_path='/v2/users/{userId}/phone/resend', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -8916,9 +8850,9 @@ def retrieve_identity_provider_intent( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RetrieveIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RetrieveIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -8989,9 +8923,9 @@ def retrieve_identity_provider_intent_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RetrieveIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RetrieveIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9062,9 +8996,9 @@ def retrieve_identity_provider_intent_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2RetrieveIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2RetrieveIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9099,7 +9033,7 @@ def _retrieve_identity_provider_intent_serialize( # process the path parameters if idp_intent_id is not None: - _path_params["idpIntentId"] = idp_intent_id + _path_params['idpIntentId'] = idp_intent_id # process the query parameters # process the header parameters # process the form parameters @@ -9109,35 +9043,35 @@ def _retrieve_identity_provider_intent_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/idp_intents/{idpIntentId}", + method='POST', + resource_path='/v2/idp_intents/{idpIntentId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9211,9 +9145,9 @@ def send_email_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9284,9 +9218,9 @@ def send_email_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9357,9 +9291,9 @@ def send_email_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SendEmailCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SendEmailCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9394,7 +9328,7 @@ def _send_email_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9404,35 +9338,35 @@ def _send_email_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/email/send", + method='POST', + resource_path='/v2/users/{userId}/email/send', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9506,9 +9440,9 @@ def set_email( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9579,9 +9513,9 @@ def set_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9652,9 +9586,9 @@ def set_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9689,7 +9623,7 @@ def _set_email_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9699,35 +9633,35 @@ def _set_email_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/email", + method='POST', + resource_path='/v2/users/{userId}/email', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -9801,9 +9735,9 @@ def set_password( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPasswordResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPasswordResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9874,9 +9808,9 @@ def set_password_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPasswordResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPasswordResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9947,9 +9881,9 @@ def set_password_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPasswordResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPasswordResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -9984,7 +9918,7 @@ def _set_password_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -9994,35 +9928,35 @@ def _set_password_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/password", + method='POST', + resource_path='/v2/users/{userId}/password', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10096,9 +10030,9 @@ def set_phone( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10169,9 +10103,9 @@ def set_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10242,9 +10176,9 @@ def set_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2SetPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2SetPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10279,7 +10213,7 @@ def _set_phone_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -10289,35 +10223,35 @@ def _set_phone_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/phone", + method='POST', + resource_path='/v2/users/{userId}/phone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10387,9 +10321,9 @@ def start_identity_provider_intent( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2StartIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2StartIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10456,9 +10390,9 @@ def start_identity_provider_intent_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2StartIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2StartIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10525,9 +10459,9 @@ def start_identity_provider_intent_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2StartIdentityProviderIntentResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2StartIdentityProviderIntentResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10569,35 +10503,35 @@ def _start_identity_provider_intent_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/idp_intents", + method='POST', + resource_path='/v2/idp_intents', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10667,9 +10601,9 @@ def unlock_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UnlockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UnlockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10736,9 +10670,9 @@ def unlock_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UnlockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UnlockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10805,9 +10739,9 @@ def unlock_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UnlockUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UnlockUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -10841,7 +10775,7 @@ def _unlock_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -10849,22 +10783,22 @@ def _unlock_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/unlock", + method='POST', + resource_path='/v2/users/{userId}/unlock', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -10938,9 +10872,9 @@ def update_human_user( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UpdateHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UpdateHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11011,9 +10945,9 @@ def update_human_user_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UpdateHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UpdateHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11084,9 +11018,9 @@ def update_human_user_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2UpdateHumanUserResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2UpdateHumanUserResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11121,7 +11055,7 @@ def _update_human_user_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11131,35 +11065,35 @@ def _update_human_user_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="PUT", - resource_path="/v2/users/human/{userId}", + method='PUT', + resource_path='/v2/users/human/{userId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11233,9 +11167,9 @@ def verify_email( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11306,9 +11240,9 @@ def verify_email_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11379,9 +11313,9 @@ def verify_email_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyEmailResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyEmailResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11416,7 +11350,7 @@ def _verify_email_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11426,35 +11360,35 @@ def _verify_email_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/email/verify", + method='POST', + resource_path='/v2/users/{userId}/email/verify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11528,9 +11462,9 @@ def verify_invite_code( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11601,9 +11535,9 @@ def verify_invite_code_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11674,9 +11608,9 @@ def verify_invite_code_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyInviteCodeResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyInviteCodeResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11711,7 +11645,7 @@ def _verify_invite_code_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -11721,35 +11655,35 @@ def _verify_invite_code_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/invite_code/verify", + method='POST', + resource_path='/v2/users/{userId}/invite_code/verify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -11827,9 +11761,9 @@ def verify_passkey_registration( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPasskeyRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPasskeyRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11904,9 +11838,9 @@ def verify_passkey_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPasskeyRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPasskeyRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -11981,9 +11915,9 @@ def verify_passkey_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPasskeyRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPasskeyRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12019,9 +11953,9 @@ def _verify_passkey_registration_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id if passkey_id is not None: - _path_params["passkeyId"] = passkey_id + _path_params['passkeyId'] = passkey_id # process the query parameters # process the header parameters # process the form parameters @@ -12031,35 +11965,35 @@ def _verify_passkey_registration_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/passkeys/{passkeyId}", + method='POST', + resource_path='/v2/users/{userId}/passkeys/{passkeyId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12133,9 +12067,9 @@ def verify_phone( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12206,9 +12140,9 @@ def verify_phone_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12279,9 +12213,9 @@ def verify_phone_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyPhoneResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyPhoneResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12316,7 +12250,7 @@ def _verify_phone_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -12326,35 +12260,35 @@ def _verify_phone_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/phone/verify", + method='POST', + resource_path='/v2/users/{userId}/phone/verify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12428,9 +12362,9 @@ def verify_totp_registration( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyTOTPRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyTOTPRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12501,9 +12435,9 @@ def verify_totp_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyTOTPRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyTOTPRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12574,9 +12508,9 @@ def verify_totp_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyTOTPRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyTOTPRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12611,7 +12545,7 @@ def _verify_totp_registration_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id # process the query parameters # process the header parameters # process the form parameters @@ -12621,35 +12555,35 @@ def _verify_totp_registration_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/totp/verify", + method='POST', + resource_path='/v2/users/{userId}/totp/verify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -12727,9 +12661,9 @@ def verify_u2_f_registration( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyU2FRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyU2FRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12804,9 +12738,9 @@ def verify_u2_f_registration_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyU2FRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyU2FRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12881,9 +12815,9 @@ def verify_u2_f_registration_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - "200": "V2VerifyU2FRegistrationResponse", - "403": "RpcStatus", - "404": "RpcStatus", + '200': "V2VerifyU2FRegistrationResponse", + '403': "RpcStatus", + '404': "RpcStatus", } response_data = self.api_client.call_api( *_param, @@ -12919,9 +12853,9 @@ def _verify_u2_f_registration_serialize( # process the path parameters if user_id is not None: - _path_params["userId"] = user_id + _path_params['userId'] = user_id if u2f_id is not None: - _path_params["u2fId"] = u2f_id + _path_params['u2fId'] = u2f_id # process the query parameters # process the header parameters # process the form parameters @@ -12931,35 +12865,35 @@ def _verify_u2_f_registration_serialize( # set the HTTP header `Accept` - if "Accept" not in _header_params: - _header_params["Accept"] = self.api_client.select_header_accept( + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( [ - "application/json" + 'application/json' ] ) # set the HTTP header `Content-Type` if _content_type: - _header_params["Content-Type"] = _content_type + _header_params['Content-Type'] = _content_type else: _default_content_type = ( self.api_client.select_header_content_type( [ - "application/json" + 'application/json' ] ) ) if _default_content_type is not None: - _header_params["Content-Type"] = _default_content_type + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ - "zitadelAccessToken" + 'zitadelAccessToken' ] return self.api_client.param_serialize( - method="POST", - resource_path="/v2/users/{userId}/u2f/{u2fId}", + method='POST', + resource_path='/v2/users/{userId}/u2f/{u2fId}', path_params=_path_params, query_params=_query_params, header_params=_header_params, diff --git a/zitadel_client/models/add_organization_request_admin.py b/zitadel_client/models/add_organization_request_admin.py index 39060b2d..cdad6dc8 100644 --- a/zitadel_client/models/add_organization_request_admin.py +++ b/zitadel_client/models/add_organization_request_admin.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_add_human_user_request import V2AddHumanUserRequest - +from typing import Optional, Set +from typing_extensions import Self class AddOrganizationRequestAdmin(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of human if self.human: - _dict["human"] = self.human.to_dict() + _dict['human'] = self.human.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/add_organization_response_created_admin.py b/zitadel_client/models/add_organization_response_created_admin.py index fe5a77ae..c1e40266 100644 --- a/zitadel_client/models/add_organization_response_created_admin.py +++ b/zitadel_client/models/add_organization_response_created_admin.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class AddOrganizationResponseCreatedAdmin(BaseModel): """ AddOrganizationResponseCreatedAdmin diff --git a/zitadel_client/models/objectv2_list_details.py b/zitadel_client/models/objectv2_list_details.py index b50c68ca..e8ec2b1f 100644 --- a/zitadel_client/models/objectv2_list_details.py +++ b/zitadel_client/models/objectv2_list_details.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class Objectv2ListDetails(BaseModel): """ Objectv2ListDetails diff --git a/zitadel_client/models/objectv2_list_query.py b/zitadel_client/models/objectv2_list_query.py index d637a344..2948b7a8 100644 --- a/zitadel_client/models/objectv2_list_query.py +++ b/zitadel_client/models/objectv2_list_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class Objectv2ListQuery(BaseModel): """ Object unspecific list filters like offset, limit and asc/desc. diff --git a/zitadel_client/models/oidc_service_create_callback_body.py b/zitadel_client/models/oidc_service_create_callback_body.py index 44482e8d..b4d5c512 100644 --- a/zitadel_client/models/oidc_service_create_callback_body.py +++ b/zitadel_client/models/oidc_service_create_callback_body.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_authorization_error import V2AuthorizationError from zitadel_client.models.v2_session import V2Session - +from typing import Optional, Set +from typing_extensions import Self class OIDCServiceCreateCallbackBody(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of session if self.session: - _dict["session"] = self.session.to_dict() + _dict['session'] = self.session.to_dict() # override the default output from pydantic by calling `to_dict()` of error if self.error: - _dict["error"] = self.error.to_dict() + _dict['error'] = self.error.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/otp_email_send_code.py b/zitadel_client/models/otp_email_send_code.py index 7b2dafe7..220b4ad2 100644 --- a/zitadel_client/models/otp_email_send_code.py +++ b/zitadel_client/models/otp_email_send_code.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class OTPEmailSendCode(BaseModel): """ diff --git a/zitadel_client/models/protobuf_any.py b/zitadel_client/models/protobuf_any.py index 844800ad..e902c3ba 100644 --- a/zitadel_client/models/protobuf_any.py +++ b/zitadel_client/models/protobuf_any.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class ProtobufAny(BaseModel): """ ProtobufAny diff --git a/zitadel_client/models/request_challenges_otp_email.py b/zitadel_client/models/request_challenges_otp_email.py index beb17b99..37aa6718 100644 --- a/zitadel_client/models/request_challenges_otp_email.py +++ b/zitadel_client/models/request_challenges_otp_email.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.otp_email_send_code import OTPEmailSendCode - +from typing import Optional, Set +from typing_extensions import Self class RequestChallengesOTPEmail(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/request_challenges_otpsms.py b/zitadel_client/models/request_challenges_otpsms.py index 636eeb76..664b2f36 100644 --- a/zitadel_client/models/request_challenges_otpsms.py +++ b/zitadel_client/models/request_challenges_otpsms.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class RequestChallengesOTPSMS(BaseModel): """ RequestChallengesOTPSMS diff --git a/zitadel_client/models/rpc_status.py b/zitadel_client/models/rpc_status.py index 52416df5..de4a3dc3 100644 --- a/zitadel_client/models/rpc_status.py +++ b/zitadel_client/models/rpc_status.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictInt, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.protobuf_any import ProtobufAny - +from typing import Optional, Set +from typing_extensions import Self class RpcStatus(BaseModel): """ @@ -82,7 +80,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_details in self.details: if _item_details: _items.append(_item_details.to_dict()) - _dict["details"] = _items + _dict['details'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/session_service_delete_session_body.py b/zitadel_client/models/session_service_delete_session_body.py index 857b9190..148272fe 100644 --- a/zitadel_client/models/session_service_delete_session_body.py +++ b/zitadel_client/models/session_service_delete_session_body.py @@ -13,21 +13,20 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class SessionServiceDeleteSessionBody(BaseModel): """ SessionServiceDeleteSessionBody """ # noqa: E501 - session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, previously returned on the create / update request. The token is required unless the authenticated user terminates the own session or is granted the `session.delete` permission."', alias="sessionToken") + session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, previously returned on the create / update request. The token is required unless the authenticated user terminates the own session or is granted the `session.delete` permission.\"", alias="sessionToken") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["sessionToken"] diff --git a/zitadel_client/models/session_service_set_session_body.py b/zitadel_client/models/session_service_set_session_body.py index be384929..2b809506 100644 --- a/zitadel_client/models/session_service_set_session_body.py +++ b/zitadel_client/models/session_service_set_session_body.py @@ -13,28 +13,27 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Annotated, Self +import json +from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated from zitadel_client.models.v2_checks import V2Checks from zitadel_client.models.v2_request_challenges import V2RequestChallenges - +from typing import Optional, Set +from typing_extensions import Self class SessionServiceSetSessionBody(BaseModel): """ SessionServiceSetSessionBody """ # noqa: E501 - session_token: Optional[Annotated[str, Field(min_length=1, strict=True, max_length=200)]] = Field(default=None, description='"DEPRECATED: this field is ignored."', alias="sessionToken") + session_token: Optional[Annotated[str, Field(min_length=1, strict=True, max_length=200)]] = Field(default=None, description="\"DEPRECATED: this field is ignored.\"", alias="sessionToken") checks: Optional[V2Checks] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list to be stored on the session"') + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list to be stored on the session\"") challenges: Optional[V2RequestChallenges] = None - lifetime: Optional[StrictStr] = Field(default=None, description='"duration (in seconds) after which the session will be automatically invalidated"') + lifetime: Optional[StrictStr] = Field(default=None, description="\"duration (in seconds) after which the session will be automatically invalidated\"") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["sessionToken", "checks", "metadata", "challenges", "lifetime"] @@ -81,10 +80,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of checks if self.checks: - _dict["checks"] = self.checks.to_dict() + _dict['checks'] = self.checks.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict["challenges"] = self.challenges.to_dict() + _dict['challenges'] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_agent_header_values.py b/zitadel_client/models/user_agent_header_values.py index 8a68dfe9..60badd37 100644 --- a/zitadel_client/models/user_agent_header_values.py +++ b/zitadel_client/models/user_agent_header_values.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class UserAgentHeaderValues(BaseModel): """ A header may have multiple values. In Go, headers are defined as map[string][]string, but protobuf doesn't allow this scheme. diff --git a/zitadel_client/models/user_service_add_idp_link_body.py b/zitadel_client/models/user_service_add_idp_link_body.py index 759798fd..f3986236 100644 --- a/zitadel_client/models/user_service_add_idp_link_body.py +++ b/zitadel_client/models/user_service_add_idp_link_body.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_idp_link import V2IDPLink - +from typing import Optional, Set +from typing_extensions import Self class UserServiceAddIDPLinkBody(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of idp_link if self.idp_link: - _dict["idpLink"] = self.idp_link.to_dict() + _dict['idpLink'] = self.idp_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_create_invite_code_body.py b/zitadel_client/models/user_service_create_invite_code_body.py index 4ed3d194..ced49144 100644 --- a/zitadel_client/models/user_service_create_invite_code_body.py +++ b/zitadel_client/models/user_service_create_invite_code_body.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_send_invite_code import V2SendInviteCode - +from typing import Optional, Set +from typing_extensions import Self class UserServiceCreateInviteCodeBody(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_create_passkey_registration_link_body.py b/zitadel_client/models/user_service_create_passkey_registration_link_body.py index bc206b3e..774e3307 100644 --- a/zitadel_client/models/user_service_create_passkey_registration_link_body.py +++ b/zitadel_client/models/user_service_create_passkey_registration_link_body.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.v2_send_passkey_registration_link import V2SendPasskeyRegistrationLink +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.v2_send_passkey_registration_link import ( - V2SendPasskeyRegistrationLink, -) - - class UserServiceCreatePasskeyRegistrationLinkBody(BaseModel): """ UserServiceCreatePasskeyRegistrationLinkBody @@ -79,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_link if self.send_link: - _dict["sendLink"] = self.send_link.to_dict() + _dict['sendLink'] = self.send_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_list_idp_links_body.py b/zitadel_client/models/user_service_list_idp_links_body.py index 8b011301..8cebd7ea 100644 --- a/zitadel_client/models/user_service_list_idp_links_body.py +++ b/zitadel_client/models/user_service_list_idp_links_body.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_query import V2ListQuery - +from typing import Optional, Set +from typing_extensions import Self class UserServiceListIDPLinksBody(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict["query"] = self.query.to_dict() + _dict['query'] = self.query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_password_reset_body.py b/zitadel_client/models/user_service_password_reset_body.py index e54fb199..9084ff35 100644 --- a/zitadel_client/models/user_service_password_reset_body.py +++ b/zitadel_client/models/user_service_password_reset_body.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_send_password_reset_link import V2SendPasswordResetLink - +from typing import Optional, Set +from typing_extensions import Self class UserServicePasswordResetBody(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_link if self.send_link: - _dict["sendLink"] = self.send_link.to_dict() + _dict['sendLink'] = self.send_link.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_register_passkey_body.py b/zitadel_client/models/user_service_register_passkey_body.py index e53619ae..84c01b7f 100644 --- a/zitadel_client/models/user_service_register_passkey_body.py +++ b/zitadel_client/models/user_service_register_passkey_body.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_passkey_authenticator import V2PasskeyAuthenticator from zitadel_client.models.v2_passkey_registration_code import V2PasskeyRegistrationCode - +from typing import Optional, Set +from typing_extensions import Self class UserServiceRegisterPasskeyBody(BaseModel): """ @@ -32,7 +30,7 @@ class UserServiceRegisterPasskeyBody(BaseModel): """ # noqa: E501 code: Optional[V2PasskeyRegistrationCode] = None authenticator: Optional[V2PasskeyAuthenticator] = V2PasskeyAuthenticator.PASSKEY_AUTHENTICATOR_UNSPECIFIED - domain: Optional[StrictStr] = Field(default=None, description='"Domain on which the user is authenticated."') + domain: Optional[StrictStr] = Field(default=None, description="\"Domain on which the user is authenticated.\"") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["code", "authenticator", "domain"] @@ -79,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of code if self.code: - _dict["code"] = self.code.to_dict() + _dict['code'] = self.code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_register_u2_f_body.py b/zitadel_client/models/user_service_register_u2_f_body.py index caab5532..f37edf8f 100644 --- a/zitadel_client/models/user_service_register_u2_f_body.py +++ b/zitadel_client/models/user_service_register_u2_f_body.py @@ -13,21 +13,20 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class UserServiceRegisterU2FBody(BaseModel): """ UserServiceRegisterU2FBody """ # noqa: E501 - domain: Optional[StrictStr] = Field(default=None, description='"Domain on which the user is authenticated."') + domain: Optional[StrictStr] = Field(default=None, description="\"Domain on which the user is authenticated.\"") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["domain"] diff --git a/zitadel_client/models/user_service_resend_email_code_body.py b/zitadel_client/models/user_service_resend_email_code_body.py index b208bb2b..bd265b7c 100644 --- a/zitadel_client/models/user_service_resend_email_code_body.py +++ b/zitadel_client/models/user_service_resend_email_code_body.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.v2_send_email_verification_code import ( - V2SendEmailVerificationCode, -) - - class UserServiceResendEmailCodeBody(BaseModel): """ UserServiceResendEmailCodeBody @@ -79,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_resend_phone_code_body.py b/zitadel_client/models/user_service_resend_phone_code_body.py index 87ef1f71..5b3d7360 100644 --- a/zitadel_client/models/user_service_resend_phone_code_body.py +++ b/zitadel_client/models/user_service_resend_phone_code_body.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class UserServiceResendPhoneCodeBody(BaseModel): """ UserServiceResendPhoneCodeBody diff --git a/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py b/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py index 695f9e1e..87d663e1 100644 --- a/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py +++ b/zitadel_client/models/user_service_retrieve_identity_provider_intent_body.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceRetrieveIdentityProviderIntentBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_send_email_code_body.py b/zitadel_client/models/user_service_send_email_code_body.py index 5aacd431..f5821634 100644 --- a/zitadel_client/models/user_service_send_email_code_body.py +++ b/zitadel_client/models/user_service_send_email_code_body.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.v2_send_email_verification_code import ( - V2SendEmailVerificationCode, -) - - class UserServiceSendEmailCodeBody(BaseModel): """ UserServiceSendEmailCodeBody @@ -79,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_set_email_body.py b/zitadel_client/models/user_service_set_email_body.py index a86c75d5..5789a0ba 100644 --- a/zitadel_client/models/user_service_set_email_body.py +++ b/zitadel_client/models/user_service_set_email_body.py @@ -13,19 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - -from zitadel_client.models.v2_send_email_verification_code import ( - V2SendEmailVerificationCode, -) - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode +from typing import Optional, Set +from typing_extensions import Self class UserServiceSetEmailBody(BaseModel): """ @@ -81,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_set_phone_body.py b/zitadel_client/models/user_service_set_phone_body.py index 442ae575..160bf53d 100644 --- a/zitadel_client/models/user_service_set_phone_body.py +++ b/zitadel_client/models/user_service_set_phone_body.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceSetPhoneBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_update_human_user_body.py b/zitadel_client/models/user_service_update_human_user_body.py index 8f57daea..54f2bacb 100644 --- a/zitadel_client/models/user_service_update_human_user_body.py +++ b/zitadel_client/models/user_service_update_human_user_body.py @@ -13,20 +13,19 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.userv2_set_password import Userv2SetPassword from zitadel_client.models.v2_set_human_email1 import V2SetHumanEmail1 from zitadel_client.models.v2_set_human_phone1 import V2SetHumanPhone1 from zitadel_client.models.v2_set_human_profile1 import V2SetHumanProfile1 - +from typing import Optional, Set +from typing_extensions import Self class UserServiceUpdateHumanUserBody(BaseModel): """ @@ -83,16 +82,16 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict["profile"] = self.profile.to_dict() + _dict['profile'] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict["email"] = self.email.to_dict() + _dict['email'] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict["phone"] = self.phone.to_dict() + _dict['phone'] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/user_service_verify_email_body.py b/zitadel_client/models/user_service_verify_email_body.py index 05ba9950..4bda6041 100644 --- a/zitadel_client/models/user_service_verify_email_body.py +++ b/zitadel_client/models/user_service_verify_email_body.py @@ -13,21 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceVerifyEmailBody(BaseModel): """ UserServiceVerifyEmailBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the set email request"', alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the set email request\"", alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_invite_code_body.py b/zitadel_client/models/user_service_verify_invite_code_body.py index 6c52bff4..d3475e44 100644 --- a/zitadel_client/models/user_service_verify_invite_code_body.py +++ b/zitadel_client/models/user_service_verify_invite_code_body.py @@ -13,21 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceVerifyInviteCodeBody(BaseModel): """ UserServiceVerifyInviteCodeBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the invite code request"', alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the invite code request\"", alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_passkey_registration_body.py b/zitadel_client/models/user_service_verify_passkey_registration_body.py index 9e36b5c5..e20dbe89 100644 --- a/zitadel_client/models/user_service_verify_passkey_registration_body.py +++ b/zitadel_client/models/user_service_verify_passkey_registration_body.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceVerifyPasskeyRegistrationBody(BaseModel): """ diff --git a/zitadel_client/models/user_service_verify_phone_body.py b/zitadel_client/models/user_service_verify_phone_body.py index d9ec25a4..68e0f2b8 100644 --- a/zitadel_client/models/user_service_verify_phone_body.py +++ b/zitadel_client/models/user_service_verify_phone_body.py @@ -13,21 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceVerifyPhoneBody(BaseModel): """ UserServiceVerifyPhoneBody """ # noqa: E501 - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during the set phone request"', alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during the set phone request\"", alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verificationCode"] diff --git a/zitadel_client/models/user_service_verify_totp_registration_body.py b/zitadel_client/models/user_service_verify_totp_registration_body.py index a212ee94..37e47395 100644 --- a/zitadel_client/models/user_service_verify_totp_registration_body.py +++ b/zitadel_client/models/user_service_verify_totp_registration_body.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List +from typing import Optional, Set from typing_extensions import Self - class UserServiceVerifyTOTPRegistrationBody(BaseModel): """ UserServiceVerifyTOTPRegistrationBody diff --git a/zitadel_client/models/user_service_verify_u2_f_registration_body.py b/zitadel_client/models/user_service_verify_u2_f_registration_body.py index fb879771..20776919 100644 --- a/zitadel_client/models/user_service_verify_u2_f_registration_body.py +++ b/zitadel_client/models/user_service_verify_u2_f_registration_body.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class UserServiceVerifyU2FRegistrationBody(BaseModel): """ diff --git a/zitadel_client/models/userv2_set_password.py b/zitadel_client/models/userv2_set_password.py index df5f5cb0..c50334c6 100644 --- a/zitadel_client/models/userv2_set_password.py +++ b/zitadel_client/models/userv2_set_password.py @@ -13,18 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_password import V2Password - +from typing import Optional, Set +from typing_extensions import Self class Userv2SetPassword(BaseModel): """ @@ -33,7 +32,7 @@ class Userv2SetPassword(BaseModel): password: Optional[V2Password] = None hashed_password: Optional[V2HashedPassword] = Field(default=None, alias="hashedPassword") current_password: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(alias="currentPassword") - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during password reset request"', alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during password reset request\"", alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["password", "hashedPassword", "currentPassword", "verificationCode"] @@ -80,10 +79,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict["hashedPassword"] = self.hashed_password.to_dict() + _dict['hashedPassword'] = self.hashed_password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/userv2_type.py b/zitadel_client/models/userv2_type.py index cf1398d6..49671a54 100644 --- a/zitadel_client/models/userv2_type.py +++ b/zitadel_client/models/userv2_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class Userv2Type(str, Enum): """ allowed enum values """ - TYPE_UNSPECIFIED = "TYPE_UNSPECIFIED" - TYPE_HUMAN = "TYPE_HUMAN" - TYPE_MACHINE = "TYPE_MACHINE" + TYPE_UNSPECIFIED = 'TYPE_UNSPECIFIED' + TYPE_HUMAN = 'TYPE_HUMAN' + TYPE_MACHINE = 'TYPE_MACHINE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_access_token_type.py b/zitadel_client/models/v2_access_token_type.py index e4acc12c..cf0a1bbe 100644 --- a/zitadel_client/models/v2_access_token_type.py +++ b/zitadel_client/models/v2_access_token_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,8 +26,8 @@ class V2AccessTokenType(str, Enum): """ allowed enum values """ - ACCESS_TOKEN_TYPE_BEARER = "ACCESS_TOKEN_TYPE_BEARER" - ACCESS_TOKEN_TYPE_JWT = "ACCESS_TOKEN_TYPE_JWT" + ACCESS_TOKEN_TYPE_BEARER = 'ACCESS_TOKEN_TYPE_BEARER' + ACCESS_TOKEN_TYPE_JWT = 'ACCESS_TOKEN_TYPE_JWT' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_add_human_user_request.py b/zitadel_client/models/v2_add_human_user_request.py index b2e679db..00620946 100644 --- a/zitadel_client/models/v2_add_human_user_request.py +++ b/zitadel_client/models/v2_add_human_user_request.py @@ -13,15 +13,13 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_password import V2Password @@ -29,10 +27,9 @@ from zitadel_client.models.v2_set_human_phone import V2SetHumanPhone from zitadel_client.models.v2_set_human_profile import V2SetHumanProfile from zitadel_client.models.v2_set_metadata_entry import V2SetMetadataEntry -from zitadel_client.models.zitadelobjectv2_organization import ( - Zitadelobjectv2Organization, -) - +from zitadel_client.models.zitadelobjectv2_organization import Zitadelobjectv2Organization +from typing import Optional, Set +from typing_extensions import Self class V2AddHumanUserRequest(BaseModel): """ @@ -95,36 +92,36 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of organization if self.organization: - _dict["organization"] = self.organization.to_dict() + _dict['organization'] = self.organization.to_dict() # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict["profile"] = self.profile.to_dict() + _dict['profile'] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict["email"] = self.email.to_dict() + _dict['email'] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict["phone"] = self.phone.to_dict() + _dict['phone'] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in metadata (list) _items = [] if self.metadata: for _item_metadata in self.metadata: if _item_metadata: _items.append(_item_metadata.to_dict()) - _dict["metadata"] = _items + _dict['metadata'] = _items # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict["hashedPassword"] = self.hashed_password.to_dict() + _dict['hashedPassword'] = self.hashed_password.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in idp_links (list) _items = [] if self.idp_links: for _item_idp_links in self.idp_links: if _item_idp_links: _items.append(_item_idp_links.to_dict()) - _dict["idpLinks"] = _items + _dict['idpLinks'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_human_user_request1.py b/zitadel_client/models/v2_add_human_user_request1.py index 8dc7e36d..8841918d 100644 --- a/zitadel_client/models/v2_add_human_user_request1.py +++ b/zitadel_client/models/v2_add_human_user_request1.py @@ -13,15 +13,13 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_hashed_password import V2HashedPassword from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_organization import V2Organization @@ -30,7 +28,8 @@ from zitadel_client.models.v2_set_human_phone1 import V2SetHumanPhone1 from zitadel_client.models.v2_set_human_profile1 import V2SetHumanProfile1 from zitadel_client.models.v2_set_metadata_entry1 import V2SetMetadataEntry1 - +from typing import Optional, Set +from typing_extensions import Self class V2AddHumanUserRequest1(BaseModel): """ @@ -93,36 +92,36 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of organization if self.organization: - _dict["organization"] = self.organization.to_dict() + _dict['organization'] = self.organization.to_dict() # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict["profile"] = self.profile.to_dict() + _dict['profile'] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict["email"] = self.email.to_dict() + _dict['email'] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict["phone"] = self.phone.to_dict() + _dict['phone'] = self.phone.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in metadata (list) _items = [] if self.metadata: for _item_metadata in self.metadata: if _item_metadata: _items.append(_item_metadata.to_dict()) - _dict["metadata"] = _items + _dict['metadata'] = _items # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of hashed_password if self.hashed_password: - _dict["hashedPassword"] = self.hashed_password.to_dict() + _dict['hashedPassword'] = self.hashed_password.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in idp_links (list) _items = [] if self.idp_links: for _item_idp_links in self.idp_links: if _item_idp_links: _items.append(_item_idp_links.to_dict()) - _dict["idpLinks"] = _items + _dict['idpLinks'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_human_user_response.py b/zitadel_client/models/v2_add_human_user_response.py index 6d663207..d1fcd30b 100644 --- a/zitadel_client/models/v2_add_human_user_response.py +++ b/zitadel_client/models/v2_add_human_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2AddHumanUserResponse(BaseModel): """ @@ -79,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_idp_link_response.py b/zitadel_client/models/v2_add_idp_link_response.py index 1041772e..955aacdb 100644 --- a/zitadel_client/models/v2_add_idp_link_response.py +++ b/zitadel_client/models/v2_add_idp_link_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2AddIDPLinkResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_organization_request.py b/zitadel_client/models/v2_add_organization_request.py index 1bc150ff..34eaa6af 100644 --- a/zitadel_client/models/v2_add_organization_request.py +++ b/zitadel_client/models/v2_add_organization_request.py @@ -13,19 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - -from zitadel_client.models.add_organization_request_admin import ( - AddOrganizationRequestAdmin, -) - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from zitadel_client.models.add_organization_request_admin import AddOrganizationRequestAdmin +from typing import Optional, Set +from typing_extensions import Self class V2AddOrganizationRequest(BaseModel): """ @@ -83,7 +80,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_admins in self.admins: if _item_admins: _items.append(_item_admins.to_dict()) - _dict["admins"] = _items + _dict['admins'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_organization_response.py b/zitadel_client/models/v2_add_organization_response.py index 479335bb..0febd28a 100644 --- a/zitadel_client/models/v2_add_organization_response.py +++ b/zitadel_client/models/v2_add_organization_response.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - -from zitadel_client.models.add_organization_response_created_admin import ( - AddOrganizationResponseCreatedAdmin, -) +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.add_organization_response_created_admin import AddOrganizationResponseCreatedAdmin from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2AddOrganizationResponse(BaseModel): """ @@ -81,14 +77,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in created_admins (list) _items = [] if self.created_admins: for _item_created_admins in self.created_admins: if _item_created_admins: _items.append(_item_created_admins.to_dict()) - _dict["createdAdmins"] = _items + _dict['createdAdmins'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_otp_email_response.py b/zitadel_client/models/v2_add_otp_email_response.py index 99bebbc2..8cfb8e95 100644 --- a/zitadel_client/models/v2_add_otp_email_response.py +++ b/zitadel_client/models/v2_add_otp_email_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2AddOTPEmailResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_add_otpsms_response.py b/zitadel_client/models/v2_add_otpsms_response.py index 8ec00fbc..78d522e4 100644 --- a/zitadel_client/models/v2_add_otpsms_response.py +++ b/zitadel_client/models/v2_add_otpsms_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2AddOTPSMSResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_and_query.py b/zitadel_client/models/v2_and_query.py index 5bc00396..f2ee96bd 100644 --- a/zitadel_client/models/v2_and_query.py +++ b/zitadel_client/models/v2_and_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2AndQuery(BaseModel): """ Connect multiple sub-condition with and AND operator. @@ -78,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict["queries"] = _items + _dict['queries'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -106,7 +105,6 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 - # TODO: Rewrite to not use raise_errors V2AndQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_apple_config.py b/zitadel_client/models/v2_apple_config.py index d3fc1779..0664072c 100644 --- a/zitadel_client/models/v2_apple_config.py +++ b/zitadel_client/models/v2_apple_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2AppleConfig(BaseModel): """ V2AppleConfig diff --git a/zitadel_client/models/v2_auth_factor.py b/zitadel_client/models/v2_auth_factor.py index fc86d799..e88776c2 100644 --- a/zitadel_client/models/v2_auth_factor.py +++ b/zitadel_client/models/v2_auth_factor.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_auth_factor_state import V2AuthFactorState from zitadel_client.models.v2_auth_factor_u2_f import V2AuthFactorU2F - +from typing import Optional, Set +from typing_extensions import Self class V2AuthFactor(BaseModel): """ @@ -81,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of u2f if self.u2f: - _dict["u2f"] = self.u2f.to_dict() + _dict['u2f'] = self.u2f.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_auth_factor_state.py b/zitadel_client/models/v2_auth_factor_state.py index 2dff7140..06c961dc 100644 --- a/zitadel_client/models/v2_auth_factor_state.py +++ b/zitadel_client/models/v2_auth_factor_state.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2AuthFactorState(str, Enum): """ allowed enum values """ - AUTH_FACTOR_STATE_UNSPECIFIED = "AUTH_FACTOR_STATE_UNSPECIFIED" - AUTH_FACTOR_STATE_NOT_READY = "AUTH_FACTOR_STATE_NOT_READY" - AUTH_FACTOR_STATE_READY = "AUTH_FACTOR_STATE_READY" - AUTH_FACTOR_STATE_REMOVED = "AUTH_FACTOR_STATE_REMOVED" + AUTH_FACTOR_STATE_UNSPECIFIED = 'AUTH_FACTOR_STATE_UNSPECIFIED' + AUTH_FACTOR_STATE_NOT_READY = 'AUTH_FACTOR_STATE_NOT_READY' + AUTH_FACTOR_STATE_READY = 'AUTH_FACTOR_STATE_READY' + AUTH_FACTOR_STATE_REMOVED = 'AUTH_FACTOR_STATE_REMOVED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_auth_factor_u2_f.py b/zitadel_client/models/v2_auth_factor_u2_f.py index 9c73c479..87089abe 100644 --- a/zitadel_client/models/v2_auth_factor_u2_f.py +++ b/zitadel_client/models/v2_auth_factor_u2_f.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2AuthFactorU2F(BaseModel): """ V2AuthFactorU2F diff --git a/zitadel_client/models/v2_auth_request.py b/zitadel_client/models/v2_auth_request.py index ce0e6af7..94ec17dc 100644 --- a/zitadel_client/models/v2_auth_request.py +++ b/zitadel_client/models/v2_auth_request.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_prompt import V2Prompt - +from typing import Optional, Set +from typing_extensions import Self class V2AuthRequest(BaseModel): """ diff --git a/zitadel_client/models/v2_authentication_method_type.py b/zitadel_client/models/v2_authentication_method_type.py index b8775c5d..edba9411 100644 --- a/zitadel_client/models/v2_authentication_method_type.py +++ b/zitadel_client/models/v2_authentication_method_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,14 +26,14 @@ class V2AuthenticationMethodType(str, Enum): """ allowed enum values """ - AUTHENTICATION_METHOD_TYPE_UNSPECIFIED = "AUTHENTICATION_METHOD_TYPE_UNSPECIFIED" - AUTHENTICATION_METHOD_TYPE_PASSWORD = "AUTHENTICATION_METHOD_TYPE_PASSWORD" - AUTHENTICATION_METHOD_TYPE_PASSKEY = "AUTHENTICATION_METHOD_TYPE_PASSKEY" - AUTHENTICATION_METHOD_TYPE_IDP = "AUTHENTICATION_METHOD_TYPE_IDP" - AUTHENTICATION_METHOD_TYPE_TOTP = "AUTHENTICATION_METHOD_TYPE_TOTP" - AUTHENTICATION_METHOD_TYPE_U2_F = "AUTHENTICATION_METHOD_TYPE_U2F" - AUTHENTICATION_METHOD_TYPE_OTP_SMS = "AUTHENTICATION_METHOD_TYPE_OTP_SMS" - AUTHENTICATION_METHOD_TYPE_OTP_EMAIL = "AUTHENTICATION_METHOD_TYPE_OTP_EMAIL" + AUTHENTICATION_METHOD_TYPE_UNSPECIFIED = 'AUTHENTICATION_METHOD_TYPE_UNSPECIFIED' + AUTHENTICATION_METHOD_TYPE_PASSWORD = 'AUTHENTICATION_METHOD_TYPE_PASSWORD' + AUTHENTICATION_METHOD_TYPE_PASSKEY = 'AUTHENTICATION_METHOD_TYPE_PASSKEY' + AUTHENTICATION_METHOD_TYPE_IDP = 'AUTHENTICATION_METHOD_TYPE_IDP' + AUTHENTICATION_METHOD_TYPE_TOTP = 'AUTHENTICATION_METHOD_TYPE_TOTP' + AUTHENTICATION_METHOD_TYPE_U2_F = 'AUTHENTICATION_METHOD_TYPE_U2F' + AUTHENTICATION_METHOD_TYPE_OTP_SMS = 'AUTHENTICATION_METHOD_TYPE_OTP_SMS' + AUTHENTICATION_METHOD_TYPE_OTP_EMAIL = 'AUTHENTICATION_METHOD_TYPE_OTP_EMAIL' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_authorization_error.py b/zitadel_client/models/v2_authorization_error.py index 4dce8055..93f0efc9 100644 --- a/zitadel_client/models/v2_authorization_error.py +++ b/zitadel_client/models/v2_authorization_error.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_error_reason import V2ErrorReason - +from typing import Optional, Set +from typing_extensions import Self class V2AuthorizationError(BaseModel): """ diff --git a/zitadel_client/models/v2_auto_linking_option.py b/zitadel_client/models/v2_auto_linking_option.py index 3ed6125b..d3cb820f 100644 --- a/zitadel_client/models/v2_auto_linking_option.py +++ b/zitadel_client/models/v2_auto_linking_option.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class V2AutoLinkingOption(str, Enum): """ allowed enum values """ - AUTO_LINKING_OPTION_UNSPECIFIED = "AUTO_LINKING_OPTION_UNSPECIFIED" - AUTO_LINKING_OPTION_USERNAME = "AUTO_LINKING_OPTION_USERNAME" - AUTO_LINKING_OPTION_EMAIL = "AUTO_LINKING_OPTION_EMAIL" + AUTO_LINKING_OPTION_UNSPECIFIED = 'AUTO_LINKING_OPTION_UNSPECIFIED' + AUTO_LINKING_OPTION_USERNAME = 'AUTO_LINKING_OPTION_USERNAME' + AUTO_LINKING_OPTION_EMAIL = 'AUTO_LINKING_OPTION_EMAIL' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_azure_ad_config.py b/zitadel_client/models/v2_azure_ad_config.py index 9076d13f..f262adbc 100644 --- a/zitadel_client/models/v2_azure_ad_config.py +++ b/zitadel_client/models/v2_azure_ad_config.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_azure_ad_tenant import V2AzureADTenant - +from typing import Optional, Set +from typing_extensions import Self class V2AzureADConfig(BaseModel): """ @@ -79,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of tenant if self.tenant: - _dict["tenant"] = self.tenant.to_dict() + _dict['tenant'] = self.tenant.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_azure_ad_tenant.py b/zitadel_client/models/v2_azure_ad_tenant.py index 4c54cfda..a1d45d67 100644 --- a/zitadel_client/models/v2_azure_ad_tenant.py +++ b/zitadel_client/models/v2_azure_ad_tenant.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_azure_ad_tenant_type import V2AzureADTenantType - +from typing import Optional, Set +from typing_extensions import Self class V2AzureADTenant(BaseModel): """ diff --git a/zitadel_client/models/v2_azure_ad_tenant_type.py b/zitadel_client/models/v2_azure_ad_tenant_type.py index 07217537..7804f2f8 100644 --- a/zitadel_client/models/v2_azure_ad_tenant_type.py +++ b/zitadel_client/models/v2_azure_ad_tenant_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class V2AzureADTenantType(str, Enum): """ allowed enum values """ - AZURE_AD_TENANT_TYPE_COMMON = "AZURE_AD_TENANT_TYPE_COMMON" - AZURE_AD_TENANT_TYPE_ORGANISATIONS = "AZURE_AD_TENANT_TYPE_ORGANISATIONS" - AZURE_AD_TENANT_TYPE_CONSUMERS = "AZURE_AD_TENANT_TYPE_CONSUMERS" + AZURE_AD_TENANT_TYPE_COMMON = 'AZURE_AD_TENANT_TYPE_COMMON' + AZURE_AD_TENANT_TYPE_ORGANISATIONS = 'AZURE_AD_TENANT_TYPE_ORGANISATIONS' + AZURE_AD_TENANT_TYPE_CONSUMERS = 'AZURE_AD_TENANT_TYPE_CONSUMERS' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_branding_settings.py b/zitadel_client/models/v2_branding_settings.py index 03aefe83..cb772681 100644 --- a/zitadel_client/models/v2_branding_settings.py +++ b/zitadel_client/models/v2_branding_settings.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType from zitadel_client.models.v2_theme import V2Theme from zitadel_client.models.v2_theme_mode import V2ThemeMode - +from typing import Optional, Set +from typing_extensions import Self class V2BrandingSettings(BaseModel): """ @@ -34,7 +32,7 @@ class V2BrandingSettings(BaseModel): light_theme: Optional[V2Theme] = Field(default=None, alias="lightTheme") dark_theme: Optional[V2Theme] = Field(default=None, alias="darkTheme") font_url: Optional[StrictStr] = Field(default=None, description="url to the font used", alias="fontUrl") - hide_login_name_suffix: Optional[StrictBool] = Field(default=None, description='hides the org suffix on the login form if the scope "urn:zitadel:iam:org:domain:primary:{domainname}" is set', alias="hideLoginNameSuffix") + hide_login_name_suffix: Optional[StrictBool] = Field(default=None, description="hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set", alias="hideLoginNameSuffix") disable_watermark: Optional[StrictBool] = Field(default=None, description="boolean to disable the watermark", alias="disableWatermark") resource_owner_type: Optional[V2ResourceOwnerType] = Field(default=V2ResourceOwnerType.RESOURCE_OWNER_TYPE_UNSPECIFIED, alias="resourceOwnerType") theme_mode: Optional[V2ThemeMode] = Field(default=V2ThemeMode.THEME_MODE_UNSPECIFIED, alias="themeMode") @@ -84,10 +82,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of light_theme if self.light_theme: - _dict["lightTheme"] = self.light_theme.to_dict() + _dict['lightTheme'] = self.light_theme.to_dict() # override the default output from pydantic by calling `to_dict()` of dark_theme if self.dark_theme: - _dict["darkTheme"] = self.dark_theme.to_dict() + _dict['darkTheme'] = self.dark_theme.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_challenges.py b/zitadel_client/models/v2_challenges.py index 12cbe8b3..ce333de2 100644 --- a/zitadel_client/models/v2_challenges.py +++ b/zitadel_client/models/v2_challenges.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_challenges_web_auth_n import V2ChallengesWebAuthN - +from typing import Optional, Set +from typing_extensions import Self class V2Challenges(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict["webAuthN"] = self.web_auth_n.to_dict() + _dict['webAuthN'] = self.web_auth_n.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_challenges_web_auth_n.py b/zitadel_client/models/v2_challenges_web_auth_n.py index ef0f69ac..0a08b137 100644 --- a/zitadel_client/models/v2_challenges_web_auth_n.py +++ b/zitadel_client/models/v2_challenges_web_auth_n.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2ChallengesWebAuthN(BaseModel): """ V2ChallengesWebAuthN diff --git a/zitadel_client/models/v2_check_idp_intent.py b/zitadel_client/models/v2_check_idp_intent.py index b2206b0f..2eafe74e 100644 --- a/zitadel_client/models/v2_check_idp_intent.py +++ b/zitadel_client/models/v2_check_idp_intent.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CheckIDPIntent(BaseModel): """ diff --git a/zitadel_client/models/v2_check_otp.py b/zitadel_client/models/v2_check_otp.py index ae2a4b16..43eeec27 100644 --- a/zitadel_client/models/v2_check_otp.py +++ b/zitadel_client/models/v2_check_otp.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CheckOTP(BaseModel): """ diff --git a/zitadel_client/models/v2_check_password.py b/zitadel_client/models/v2_check_password.py index ca754eb8..b7029e1d 100644 --- a/zitadel_client/models/v2_check_password.py +++ b/zitadel_client/models/v2_check_password.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CheckPassword(BaseModel): """ diff --git a/zitadel_client/models/v2_check_totp.py b/zitadel_client/models/v2_check_totp.py index 0fe76f0a..84dd5a83 100644 --- a/zitadel_client/models/v2_check_totp.py +++ b/zitadel_client/models/v2_check_totp.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CheckTOTP(BaseModel): """ diff --git a/zitadel_client/models/v2_check_user.py b/zitadel_client/models/v2_check_user.py index d084853d..5bc7869b 100644 --- a/zitadel_client/models/v2_check_user.py +++ b/zitadel_client/models/v2_check_user.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CheckUser(BaseModel): """ diff --git a/zitadel_client/models/v2_check_web_auth_n.py b/zitadel_client/models/v2_check_web_auth_n.py index dacf3493..2fbc6165 100644 --- a/zitadel_client/models/v2_check_web_auth_n.py +++ b/zitadel_client/models/v2_check_web_auth_n.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List +from typing import Optional, Set from typing_extensions import Self - class V2CheckWebAuthN(BaseModel): """ V2CheckWebAuthN diff --git a/zitadel_client/models/v2_checks.py b/zitadel_client/models/v2_checks.py index fd1b7f05..05041810 100644 --- a/zitadel_client/models/v2_checks.py +++ b/zitadel_client/models/v2_checks.py @@ -13,22 +13,20 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_check_idp_intent import V2CheckIDPIntent from zitadel_client.models.v2_check_otp import V2CheckOTP from zitadel_client.models.v2_check_password import V2CheckPassword from zitadel_client.models.v2_check_totp import V2CheckTOTP from zitadel_client.models.v2_check_user import V2CheckUser from zitadel_client.models.v2_check_web_auth_n import V2CheckWebAuthN - +from typing import Optional, Set +from typing_extensions import Self class V2Checks(BaseModel): """ @@ -87,25 +85,25 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict["user"] = self.user.to_dict() + _dict['user'] = self.user.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict["webAuthN"] = self.web_auth_n.to_dict() + _dict['webAuthN'] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_intent if self.idp_intent: - _dict["idpIntent"] = self.idp_intent.to_dict() + _dict['idpIntent'] = self.idp_intent.to_dict() # override the default output from pydantic by calling `to_dict()` of totp if self.totp: - _dict["totp"] = self.totp.to_dict() + _dict['totp'] = self.totp.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict["otpSms"] = self.otp_sms.to_dict() + _dict['otpSms'] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict["otpEmail"] = self.otp_email.to_dict() + _dict['otpEmail'] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_callback_response.py b/zitadel_client/models/v2_create_callback_response.py index 888c57bf..94b8444b 100644 --- a/zitadel_client/models/v2_create_callback_response.py +++ b/zitadel_client/models/v2_create_callback_response.py @@ -13,24 +13,22 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2CreateCallbackResponse(BaseModel): """ V2CreateCallbackResponse """ # noqa: E501 details: Optional[V2Details] = None - callback_url: Optional[StrictStr] = Field(default=None, description='Callback URL where the user should be redirected, using a "302 FOUND" status. Contains details for the application to obtain the tokens on success, or error details on failure. Note that this field must be treated as credentials, as the contained code can be used to obtain tokens on behalve of the user.', alias="callbackUrl") + callback_url: Optional[StrictStr] = Field(default=None, description="Callback URL where the user should be redirected, using a \"302 FOUND\" status. Contains details for the application to obtain the tokens on success, or error details on failure. Note that this field must be treated as credentials, as the contained code can be used to obtain tokens on behalve of the user.", alias="callbackUrl") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "callbackUrl"] @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_invite_code_response.py b/zitadel_client/models/v2_create_invite_code_response.py index 5296e592..f956ae2c 100644 --- a/zitadel_client/models/v2_create_invite_code_response.py +++ b/zitadel_client/models/v2_create_invite_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2CreateInviteCodeResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_passkey_registration_link_response.py b/zitadel_client/models/v2_create_passkey_registration_link_response.py index 64ee26ea..c39aa5a8 100644 --- a/zitadel_client/models/v2_create_passkey_registration_link_response.py +++ b/zitadel_client/models/v2_create_passkey_registration_link_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_passkey_registration_code import V2PasskeyRegistrationCode - +from typing import Optional, Set +from typing_extensions import Self class V2CreatePasskeyRegistrationLinkResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of code if self.code: - _dict["code"] = self.code.to_dict() + _dict['code'] = self.code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_session_request.py b/zitadel_client/models/v2_create_session_request.py index 6ffa311f..b4c02bc9 100644 --- a/zitadel_client/models/v2_create_session_request.py +++ b/zitadel_client/models/v2_create_session_request.py @@ -13,29 +13,28 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Annotated, Self +import json +from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated from zitadel_client.models.v2_checks import V2Checks from zitadel_client.models.v2_request_challenges import V2RequestChallenges from zitadel_client.models.v2_user_agent import V2UserAgent - +from typing import Optional, Set +from typing_extensions import Self class V2CreateSessionRequest(BaseModel): """ V2CreateSessionRequest """ # noqa: E501 checks: Optional[V2Checks] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list to be stored on the session"') + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list to be stored on the session\"") challenges: Optional[V2RequestChallenges] = None user_agent: Optional[V2UserAgent] = Field(default=None, alias="userAgent") - lifetime: Optional[StrictStr] = Field(default=None, description='"duration (in seconds) after which the session will be automatically invalidated"') + lifetime: Optional[StrictStr] = Field(default=None, description="\"duration (in seconds) after which the session will be automatically invalidated\"") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["checks", "metadata", "challenges", "userAgent", "lifetime"] @@ -82,13 +81,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of checks if self.checks: - _dict["checks"] = self.checks.to_dict() + _dict['checks'] = self.checks.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict["challenges"] = self.challenges.to_dict() + _dict['challenges'] = self.challenges.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent if self.user_agent: - _dict["userAgent"] = self.user_agent.to_dict() + _dict['userAgent'] = self.user_agent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_create_session_response.py b/zitadel_client/models/v2_create_session_response.py index cfd475e8..1bff1d89 100644 --- a/zitadel_client/models/v2_create_session_response.py +++ b/zitadel_client/models/v2_create_session_response.py @@ -13,26 +13,24 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_challenges import V2Challenges from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2CreateSessionResponse(BaseModel): """ V2CreateSessionResponse """ # noqa: E501 details: Optional[V2Details] = None - session_id: Optional[StrictStr] = Field(default=None, description='"id of the session"', alias="sessionId") - session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, which is required for delete session, get session or the request of other resources."', alias="sessionToken") + session_id: Optional[StrictStr] = Field(default=None, description="\"id of the session\"", alias="sessionId") + session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, which is required for delete session, get session or the request of other resources.\"", alias="sessionToken") challenges: Optional[V2Challenges] = None additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "sessionId", "sessionToken", "challenges"] @@ -80,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict["challenges"] = self.challenges.to_dict() + _dict['challenges'] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_creation_date_query.py b/zitadel_client/models/v2_creation_date_query.py index 07814506..fc8aee2c 100644 --- a/zitadel_client/models/v2_creation_date_query.py +++ b/zitadel_client/models/v2_creation_date_query.py @@ -13,21 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.zitadelv1_timestamp_query_method import Zitadelv1TimestampQueryMethod +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.zitadelv1_timestamp_query_method import ( - Zitadelv1TimestampQueryMethod, -) - - class V2CreationDateQuery(BaseModel): """ V2CreationDateQuery diff --git a/zitadel_client/models/v2_creator_query.py b/zitadel_client/models/v2_creator_query.py index 7e9cceec..8797525e 100644 --- a/zitadel_client/models/v2_creator_query.py +++ b/zitadel_client/models/v2_creator_query.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2CreatorQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_deactivate_user_response.py b/zitadel_client/models/v2_deactivate_user_response.py index 44ee9e9c..67f64f9e 100644 --- a/zitadel_client/models/v2_deactivate_user_response.py +++ b/zitadel_client/models/v2_deactivate_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2DeactivateUserResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_delete_session_response.py b/zitadel_client/models/v2_delete_session_response.py index 6be2d6f9..16e14a85 100644 --- a/zitadel_client/models/v2_delete_session_response.py +++ b/zitadel_client/models/v2_delete_session_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2DeleteSessionResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_delete_user_response.py b/zitadel_client/models/v2_delete_user_response.py index 359050ca..ec2f8304 100644 --- a/zitadel_client/models/v2_delete_user_response.py +++ b/zitadel_client/models/v2_delete_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2DeleteUserResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_details.py b/zitadel_client/models/v2_details.py index 935c7500..9680a123 100644 --- a/zitadel_client/models/v2_details.py +++ b/zitadel_client/models/v2_details.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2Details(BaseModel): """ V2Details diff --git a/zitadel_client/models/v2_display_name_query.py b/zitadel_client/models/v2_display_name_query.py index 7303f367..83e50748 100644 --- a/zitadel_client/models/v2_display_name_query.py +++ b/zitadel_client/models/v2_display_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2DisplayNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_domain_settings.py b/zitadel_client/models/v2_domain_settings.py index 17f08bff..2cc692fe 100644 --- a/zitadel_client/models/v2_domain_settings.py +++ b/zitadel_client/models/v2_domain_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType - +from typing import Optional, Set +from typing_extensions import Self class V2DomainSettings(BaseModel): """ diff --git a/zitadel_client/models/v2_email_query.py b/zitadel_client/models/v2_email_query.py index 19d1d4c2..5df4c98d 100644 --- a/zitadel_client/models/v2_email_query.py +++ b/zitadel_client/models/v2_email_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2EmailQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_embedded_iframe_settings.py b/zitadel_client/models/v2_embedded_iframe_settings.py index 7cfaaecc..df23fc1a 100644 --- a/zitadel_client/models/v2_embedded_iframe_settings.py +++ b/zitadel_client/models/v2_embedded_iframe_settings.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2EmbeddedIframeSettings(BaseModel): """ V2EmbeddedIframeSettings diff --git a/zitadel_client/models/v2_error_reason.py b/zitadel_client/models/v2_error_reason.py index 4231a97b..59deea75 100644 --- a/zitadel_client/models/v2_error_reason.py +++ b/zitadel_client/models/v2_error_reason.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,23 +26,23 @@ class V2ErrorReason(str, Enum): """ allowed enum values """ - ERROR_REASON_UNSPECIFIED = "ERROR_REASON_UNSPECIFIED" - ERROR_REASON_INVALID_REQUEST = "ERROR_REASON_INVALID_REQUEST" - ERROR_REASON_UNAUTHORIZED_CLIENT = "ERROR_REASON_UNAUTHORIZED_CLIENT" - ERROR_REASON_ACCESS_DENIED = "ERROR_REASON_ACCESS_DENIED" - ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE = "ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE" - ERROR_REASON_INVALID_SCOPE = "ERROR_REASON_INVALID_SCOPE" - ERROR_REASON_SERVER_ERROR = "ERROR_REASON_SERVER_ERROR" - ERROR_REASON_TEMPORARY_UNAVAILABLE = "ERROR_REASON_TEMPORARY_UNAVAILABLE" - ERROR_REASON_INTERACTION_REQUIRED = "ERROR_REASON_INTERACTION_REQUIRED" - ERROR_REASON_LOGIN_REQUIRED = "ERROR_REASON_LOGIN_REQUIRED" - ERROR_REASON_ACCOUNT_SELECTION_REQUIRED = "ERROR_REASON_ACCOUNT_SELECTION_REQUIRED" - ERROR_REASON_CONSENT_REQUIRED = "ERROR_REASON_CONSENT_REQUIRED" - ERROR_REASON_INVALID_REQUEST_URI = "ERROR_REASON_INVALID_REQUEST_URI" - ERROR_REASON_INVALID_REQUEST_OBJECT = "ERROR_REASON_INVALID_REQUEST_OBJECT" - ERROR_REASON_REQUEST_NOT_SUPPORTED = "ERROR_REASON_REQUEST_NOT_SUPPORTED" - ERROR_REASON_REQUEST_URI_NOT_SUPPORTED = "ERROR_REASON_REQUEST_URI_NOT_SUPPORTED" - ERROR_REASON_REGISTRATION_NOT_SUPPORTED = "ERROR_REASON_REGISTRATION_NOT_SUPPORTED" + ERROR_REASON_UNSPECIFIED = 'ERROR_REASON_UNSPECIFIED' + ERROR_REASON_INVALID_REQUEST = 'ERROR_REASON_INVALID_REQUEST' + ERROR_REASON_UNAUTHORIZED_CLIENT = 'ERROR_REASON_UNAUTHORIZED_CLIENT' + ERROR_REASON_ACCESS_DENIED = 'ERROR_REASON_ACCESS_DENIED' + ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE = 'ERROR_REASON_UNSUPPORTED_RESPONSE_TYPE' + ERROR_REASON_INVALID_SCOPE = 'ERROR_REASON_INVALID_SCOPE' + ERROR_REASON_SERVER_ERROR = 'ERROR_REASON_SERVER_ERROR' + ERROR_REASON_TEMPORARY_UNAVAILABLE = 'ERROR_REASON_TEMPORARY_UNAVAILABLE' + ERROR_REASON_INTERACTION_REQUIRED = 'ERROR_REASON_INTERACTION_REQUIRED' + ERROR_REASON_LOGIN_REQUIRED = 'ERROR_REASON_LOGIN_REQUIRED' + ERROR_REASON_ACCOUNT_SELECTION_REQUIRED = 'ERROR_REASON_ACCOUNT_SELECTION_REQUIRED' + ERROR_REASON_CONSENT_REQUIRED = 'ERROR_REASON_CONSENT_REQUIRED' + ERROR_REASON_INVALID_REQUEST_URI = 'ERROR_REASON_INVALID_REQUEST_URI' + ERROR_REASON_INVALID_REQUEST_OBJECT = 'ERROR_REASON_INVALID_REQUEST_OBJECT' + ERROR_REASON_REQUEST_NOT_SUPPORTED = 'ERROR_REASON_REQUEST_NOT_SUPPORTED' + ERROR_REASON_REQUEST_URI_NOT_SUPPORTED = 'ERROR_REASON_REQUEST_URI_NOT_SUPPORTED' + ERROR_REASON_REGISTRATION_NOT_SUPPORTED = 'ERROR_REASON_REGISTRATION_NOT_SUPPORTED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_factors.py b/zitadel_client/models/v2_factors.py index 5fcbc1cf..0eef209d 100644 --- a/zitadel_client/models/v2_factors.py +++ b/zitadel_client/models/v2_factors.py @@ -13,22 +13,20 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_intent_factor import V2IntentFactor from zitadel_client.models.v2_otp_factor import V2OTPFactor from zitadel_client.models.v2_password_factor import V2PasswordFactor from zitadel_client.models.v2_totp_factor import V2TOTPFactor from zitadel_client.models.v2_user_factor import V2UserFactor from zitadel_client.models.v2_web_auth_n_factor import V2WebAuthNFactor - +from typing import Optional, Set +from typing_extensions import Self class V2Factors(BaseModel): """ @@ -87,25 +85,25 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict["user"] = self.user.to_dict() + _dict['user'] = self.user.to_dict() # override the default output from pydantic by calling `to_dict()` of password if self.password: - _dict["password"] = self.password.to_dict() + _dict['password'] = self.password.to_dict() # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict["webAuthN"] = self.web_auth_n.to_dict() + _dict['webAuthN'] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of intent if self.intent: - _dict["intent"] = self.intent.to_dict() + _dict['intent'] = self.intent.to_dict() # override the default output from pydantic by calling `to_dict()` of totp if self.totp: - _dict["totp"] = self.totp.to_dict() + _dict['totp'] = self.totp.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict["otpSms"] = self.otp_sms.to_dict() + _dict['otpSms'] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict["otpEmail"] = self.otp_email.to_dict() + _dict['otpEmail'] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_feature_flag.py b/zitadel_client/models/v2_feature_flag.py index df9768d5..7059d860 100644 --- a/zitadel_client/models/v2_feature_flag.py +++ b/zitadel_client/models/v2_feature_flag.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_source import V2Source - +from typing import Optional, Set +from typing_extensions import Self class V2FeatureFlag(BaseModel): """ diff --git a/zitadel_client/models/v2_first_name_query.py b/zitadel_client/models/v2_first_name_query.py index 564f7c49..910c09b8 100644 --- a/zitadel_client/models/v2_first_name_query.py +++ b/zitadel_client/models/v2_first_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2FirstNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_gender.py b/zitadel_client/models/v2_gender.py index 13dac193..af93b739 100644 --- a/zitadel_client/models/v2_gender.py +++ b/zitadel_client/models/v2_gender.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2Gender(str, Enum): """ allowed enum values """ - GENDER_UNSPECIFIED = "GENDER_UNSPECIFIED" - GENDER_FEMALE = "GENDER_FEMALE" - GENDER_MALE = "GENDER_MALE" - GENDER_DIVERSE = "GENDER_DIVERSE" + GENDER_UNSPECIFIED = 'GENDER_UNSPECIFIED' + GENDER_FEMALE = 'GENDER_FEMALE' + GENDER_MALE = 'GENDER_MALE' + GENDER_DIVERSE = 'GENDER_DIVERSE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_generic_oidc_config.py b/zitadel_client/models/v2_generic_oidc_config.py index 99da1802..0f54e42b 100644 --- a/zitadel_client/models/v2_generic_oidc_config.py +++ b/zitadel_client/models/v2_generic_oidc_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GenericOIDCConfig(BaseModel): """ V2GenericOIDCConfig diff --git a/zitadel_client/models/v2_get_active_identity_providers_response.py b/zitadel_client/models/v2_get_active_identity_providers_response.py index 971f2d35..98c08b75 100644 --- a/zitadel_client/models/v2_get_active_identity_providers_response.py +++ b/zitadel_client/models/v2_get_active_identity_providers_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_identity_provider import V2IdentityProvider from zitadel_client.models.v2_list_details import V2ListDetails - +from typing import Optional, Set +from typing_extensions import Self class V2GetActiveIdentityProvidersResponse(BaseModel): """ @@ -78,14 +76,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in identity_providers (list) _items = [] if self.identity_providers: for _item_identity_providers in self.identity_providers: if _item_identity_providers: _items.append(_item_identity_providers.to_dict()) - _dict["identityProviders"] = _items + _dict['identityProviders'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_auth_request_response.py b/zitadel_client/models/v2_get_auth_request_response.py index 2524c5df..cc2f46e0 100644 --- a/zitadel_client/models/v2_get_auth_request_response.py +++ b/zitadel_client/models/v2_get_auth_request_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_auth_request import V2AuthRequest - +from typing import Optional, Set +from typing_extensions import Self class V2GetAuthRequestResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of auth_request if self.auth_request: - _dict["authRequest"] = self.auth_request.to_dict() + _dict['authRequest'] = self.auth_request.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_branding_settings_response.py b/zitadel_client/models/v2_get_branding_settings_response.py index 43fb2413..3dda06e5 100644 --- a/zitadel_client/models/v2_get_branding_settings_response.py +++ b/zitadel_client/models/v2_get_branding_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_branding_settings import V2BrandingSettings from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2GetBrandingSettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_domain_settings_response.py b/zitadel_client/models/v2_get_domain_settings_response.py index 1484ad5e..498ce153 100644 --- a/zitadel_client/models/v2_get_domain_settings_response.py +++ b/zitadel_client/models/v2_get_domain_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_domain_settings import V2DomainSettings - +from typing import Optional, Set +from typing_extensions import Self class V2GetDomainSettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_general_settings_response.py b/zitadel_client/models/v2_get_general_settings_response.py index 76aecb58..4d65df54 100644 --- a/zitadel_client/models/v2_get_general_settings_response.py +++ b/zitadel_client/models/v2_get_general_settings_response.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GetGeneralSettingsResponse(BaseModel): """ V2GetGeneralSettingsResponse diff --git a/zitadel_client/models/v2_get_idpby_id_response.py b/zitadel_client/models/v2_get_idpby_id_response.py index 9968c753..d26cc51d 100644 --- a/zitadel_client/models/v2_get_idpby_id_response.py +++ b/zitadel_client/models/v2_get_idpby_id_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_idp import V2IDP - +from typing import Optional, Set +from typing_extensions import Self class V2GetIDPByIDResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of idp if self.idp: - _dict["idp"] = self.idp.to_dict() + _dict['idp'] = self.idp.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_instance_features_response.py b/zitadel_client/models/v2_get_instance_features_response.py index 1f66a772..a18836ba 100644 --- a/zitadel_client/models/v2_get_instance_features_response.py +++ b/zitadel_client/models/v2_get_instance_features_response.py @@ -13,22 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_feature_flag import V2FeatureFlag -from zitadel_client.models.v2_improved_performance_feature_flag import ( - V2ImprovedPerformanceFeatureFlag, -) +from zitadel_client.models.v2_improved_performance_feature_flag import V2ImprovedPerformanceFeatureFlag from zitadel_client.models.v2_login_v2_feature_flag import V2LoginV2FeatureFlag - +from typing import Optional, Set +from typing_extensions import Self class V2GetInstanceFeaturesResponse(BaseModel): """ @@ -95,49 +91,49 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of login_default_org if self.login_default_org: - _dict["loginDefaultOrg"] = self.login_default_org.to_dict() + _dict['loginDefaultOrg'] = self.login_default_org.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_trigger_introspection_projections if self.oidc_trigger_introspection_projections: - _dict["oidcTriggerIntrospectionProjections"] = self.oidc_trigger_introspection_projections.to_dict() + _dict['oidcTriggerIntrospectionProjections'] = self.oidc_trigger_introspection_projections.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_legacy_introspection if self.oidc_legacy_introspection: - _dict["oidcLegacyIntrospection"] = self.oidc_legacy_introspection.to_dict() + _dict['oidcLegacyIntrospection'] = self.oidc_legacy_introspection.to_dict() # override the default output from pydantic by calling `to_dict()` of user_schema if self.user_schema: - _dict["userSchema"] = self.user_schema.to_dict() + _dict['userSchema'] = self.user_schema.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_token_exchange if self.oidc_token_exchange: - _dict["oidcTokenExchange"] = self.oidc_token_exchange.to_dict() + _dict['oidcTokenExchange'] = self.oidc_token_exchange.to_dict() # override the default output from pydantic by calling `to_dict()` of actions if self.actions: - _dict["actions"] = self.actions.to_dict() + _dict['actions'] = self.actions.to_dict() # override the default output from pydantic by calling `to_dict()` of improved_performance if self.improved_performance: - _dict["improvedPerformance"] = self.improved_performance.to_dict() + _dict['improvedPerformance'] = self.improved_performance.to_dict() # override the default output from pydantic by calling `to_dict()` of web_key if self.web_key: - _dict["webKey"] = self.web_key.to_dict() + _dict['webKey'] = self.web_key.to_dict() # override the default output from pydantic by calling `to_dict()` of debug_oidc_parent_error if self.debug_oidc_parent_error: - _dict["debugOidcParentError"] = self.debug_oidc_parent_error.to_dict() + _dict['debugOidcParentError'] = self.debug_oidc_parent_error.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_single_v1_session_termination if self.oidc_single_v1_session_termination: - _dict["oidcSingleV1SessionTermination"] = self.oidc_single_v1_session_termination.to_dict() + _dict['oidcSingleV1SessionTermination'] = self.oidc_single_v1_session_termination.to_dict() # override the default output from pydantic by calling `to_dict()` of disable_user_token_event if self.disable_user_token_event: - _dict["disableUserTokenEvent"] = self.disable_user_token_event.to_dict() + _dict['disableUserTokenEvent'] = self.disable_user_token_event.to_dict() # override the default output from pydantic by calling `to_dict()` of enable_back_channel_logout if self.enable_back_channel_logout: - _dict["enableBackChannelLogout"] = self.enable_back_channel_logout.to_dict() + _dict['enableBackChannelLogout'] = self.enable_back_channel_logout.to_dict() # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict["loginV2"] = self.login_v2.to_dict() + _dict['loginV2'] = self.login_v2.to_dict() # override the default output from pydantic by calling `to_dict()` of permission_check_v2 if self.permission_check_v2: - _dict["permissionCheckV2"] = self.permission_check_v2.to_dict() + _dict['permissionCheckV2'] = self.permission_check_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_legal_and_support_settings_response.py b/zitadel_client/models/v2_get_legal_and_support_settings_response.py index 4bb0d64f..0df41781 100644 --- a/zitadel_client/models/v2_get_legal_and_support_settings_response.py +++ b/zitadel_client/models/v2_get_legal_and_support_settings_response.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details -from zitadel_client.models.v2_legal_and_support_settings import ( - V2LegalAndSupportSettings, -) - +from zitadel_client.models.v2_legal_and_support_settings import V2LegalAndSupportSettings +from typing import Optional, Set +from typing_extensions import Self class V2GetLegalAndSupportSettingsResponse(BaseModel): """ @@ -80,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_lockout_settings_response.py b/zitadel_client/models/v2_get_lockout_settings_response.py index e906adb6..94d33420 100644 --- a/zitadel_client/models/v2_get_lockout_settings_response.py +++ b/zitadel_client/models/v2_get_lockout_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_lockout_settings import V2LockoutSettings - +from typing import Optional, Set +from typing_extensions import Self class V2GetLockoutSettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_login_settings_response.py b/zitadel_client/models/v2_get_login_settings_response.py index dbfba327..40843924 100644 --- a/zitadel_client/models/v2_get_login_settings_response.py +++ b/zitadel_client/models/v2_get_login_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_login_settings import V2LoginSettings - +from typing import Optional, Set +from typing_extensions import Self class V2GetLoginSettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_organization_features_response.py b/zitadel_client/models/v2_get_organization_features_response.py index 639feb0c..1407e76e 100644 --- a/zitadel_client/models/v2_get_organization_features_response.py +++ b/zitadel_client/models/v2_get_organization_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2GetOrganizationFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_password_complexity_settings_response.py b/zitadel_client/models/v2_get_password_complexity_settings_response.py index 04c82ee2..0ae5be98 100644 --- a/zitadel_client/models/v2_get_password_complexity_settings_response.py +++ b/zitadel_client/models/v2_get_password_complexity_settings_response.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details -from zitadel_client.models.v2_password_complexity_settings import ( - V2PasswordComplexitySettings, -) - +from zitadel_client.models.v2_password_complexity_settings import V2PasswordComplexitySettings +from typing import Optional, Set +from typing_extensions import Self class V2GetPasswordComplexitySettingsResponse(BaseModel): """ @@ -80,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_password_expiry_settings_response.py b/zitadel_client/models/v2_get_password_expiry_settings_response.py index 292bb24c..f6270cb0 100644 --- a/zitadel_client/models/v2_get_password_expiry_settings_response.py +++ b/zitadel_client/models/v2_get_password_expiry_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_password_expiry_settings import V2PasswordExpirySettings - +from typing import Optional, Set +from typing_extensions import Self class V2GetPasswordExpirySettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_security_settings_response.py b/zitadel_client/models/v2_get_security_settings_response.py index 7a2d9264..027e087e 100644 --- a/zitadel_client/models/v2_get_security_settings_response.py +++ b/zitadel_client/models/v2_get_security_settings_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_security_settings import V2SecuritySettings - +from typing import Optional, Set +from typing_extensions import Self class V2GetSecuritySettingsResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of settings if self.settings: - _dict["settings"] = self.settings.to_dict() + _dict['settings'] = self.settings.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_session_response.py b/zitadel_client/models/v2_get_session_response.py index f61163aa..e6dc8732 100644 --- a/zitadel_client/models/v2_get_session_response.py +++ b/zitadel_client/models/v2_get_session_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_session1 import V2Session1 - +from typing import Optional, Set +from typing_extensions import Self class V2GetSessionResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of session if self.session: - _dict["session"] = self.session.to_dict() + _dict['session'] = self.session.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_system_features_response.py b/zitadel_client/models/v2_get_system_features_response.py index fa199558..b449337d 100644 --- a/zitadel_client/models/v2_get_system_features_response.py +++ b/zitadel_client/models/v2_get_system_features_response.py @@ -13,22 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_feature_flag import V2FeatureFlag -from zitadel_client.models.v2_improved_performance_feature_flag import ( - V2ImprovedPerformanceFeatureFlag, -) +from zitadel_client.models.v2_improved_performance_feature_flag import V2ImprovedPerformanceFeatureFlag from zitadel_client.models.v2_login_v2_feature_flag import V2LoginV2FeatureFlag - +from typing import Optional, Set +from typing_extensions import Self class V2GetSystemFeaturesResponse(BaseModel): """ @@ -93,43 +89,43 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of login_default_org if self.login_default_org: - _dict["loginDefaultOrg"] = self.login_default_org.to_dict() + _dict['loginDefaultOrg'] = self.login_default_org.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_trigger_introspection_projections if self.oidc_trigger_introspection_projections: - _dict["oidcTriggerIntrospectionProjections"] = self.oidc_trigger_introspection_projections.to_dict() + _dict['oidcTriggerIntrospectionProjections'] = self.oidc_trigger_introspection_projections.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_legacy_introspection if self.oidc_legacy_introspection: - _dict["oidcLegacyIntrospection"] = self.oidc_legacy_introspection.to_dict() + _dict['oidcLegacyIntrospection'] = self.oidc_legacy_introspection.to_dict() # override the default output from pydantic by calling `to_dict()` of user_schema if self.user_schema: - _dict["userSchema"] = self.user_schema.to_dict() + _dict['userSchema'] = self.user_schema.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_token_exchange if self.oidc_token_exchange: - _dict["oidcTokenExchange"] = self.oidc_token_exchange.to_dict() + _dict['oidcTokenExchange'] = self.oidc_token_exchange.to_dict() # override the default output from pydantic by calling `to_dict()` of actions if self.actions: - _dict["actions"] = self.actions.to_dict() + _dict['actions'] = self.actions.to_dict() # override the default output from pydantic by calling `to_dict()` of improved_performance if self.improved_performance: - _dict["improvedPerformance"] = self.improved_performance.to_dict() + _dict['improvedPerformance'] = self.improved_performance.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc_single_v1_session_termination if self.oidc_single_v1_session_termination: - _dict["oidcSingleV1SessionTermination"] = self.oidc_single_v1_session_termination.to_dict() + _dict['oidcSingleV1SessionTermination'] = self.oidc_single_v1_session_termination.to_dict() # override the default output from pydantic by calling `to_dict()` of disable_user_token_event if self.disable_user_token_event: - _dict["disableUserTokenEvent"] = self.disable_user_token_event.to_dict() + _dict['disableUserTokenEvent'] = self.disable_user_token_event.to_dict() # override the default output from pydantic by calling `to_dict()` of enable_back_channel_logout if self.enable_back_channel_logout: - _dict["enableBackChannelLogout"] = self.enable_back_channel_logout.to_dict() + _dict['enableBackChannelLogout'] = self.enable_back_channel_logout.to_dict() # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict["loginV2"] = self.login_v2.to_dict() + _dict['loginV2'] = self.login_v2.to_dict() # override the default output from pydantic by calling `to_dict()` of permission_check_v2 if self.permission_check_v2: - _dict["permissionCheckV2"] = self.permission_check_v2.to_dict() + _dict['permissionCheckV2'] = self.permission_check_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_user_by_id_response.py b/zitadel_client/models/v2_get_user_by_id_response.py index 59da8269..7cf0d139 100644 --- a/zitadel_client/models/v2_get_user_by_id_response.py +++ b/zitadel_client/models/v2_get_user_by_id_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_user import V2User - +from typing import Optional, Set +from typing_extensions import Self class V2GetUserByIDResponse(BaseModel): """ @@ -78,10 +76,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of user if self.user: - _dict["user"] = self.user.to_dict() + _dict['user'] = self.user.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_get_user_features_response.py b/zitadel_client/models/v2_get_user_features_response.py index 08c0fc5d..291d41bb 100644 --- a/zitadel_client/models/v2_get_user_features_response.py +++ b/zitadel_client/models/v2_get_user_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2GetUserFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_git_hub_config.py b/zitadel_client/models/v2_git_hub_config.py index 0bbc6a66..c8001688 100644 --- a/zitadel_client/models/v2_git_hub_config.py +++ b/zitadel_client/models/v2_git_hub_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GitHubConfig(BaseModel): """ V2GitHubConfig diff --git a/zitadel_client/models/v2_git_hub_enterprise_server_config.py b/zitadel_client/models/v2_git_hub_enterprise_server_config.py index 4d0a5856..c3c9d81f 100644 --- a/zitadel_client/models/v2_git_hub_enterprise_server_config.py +++ b/zitadel_client/models/v2_git_hub_enterprise_server_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GitHubEnterpriseServerConfig(BaseModel): """ V2GitHubEnterpriseServerConfig diff --git a/zitadel_client/models/v2_git_lab_config.py b/zitadel_client/models/v2_git_lab_config.py index 79216e59..fa45d897 100644 --- a/zitadel_client/models/v2_git_lab_config.py +++ b/zitadel_client/models/v2_git_lab_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GitLabConfig(BaseModel): """ V2GitLabConfig diff --git a/zitadel_client/models/v2_git_lab_self_hosted_config.py b/zitadel_client/models/v2_git_lab_self_hosted_config.py index 5dfc3b7a..e320b0c5 100644 --- a/zitadel_client/models/v2_git_lab_self_hosted_config.py +++ b/zitadel_client/models/v2_git_lab_self_hosted_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GitLabSelfHostedConfig(BaseModel): """ V2GitLabSelfHostedConfig diff --git a/zitadel_client/models/v2_google_config.py b/zitadel_client/models/v2_google_config.py index b26f7abd..f0826e08 100644 --- a/zitadel_client/models/v2_google_config.py +++ b/zitadel_client/models/v2_google_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2GoogleConfig(BaseModel): """ V2GoogleConfig diff --git a/zitadel_client/models/v2_hashed_password.py b/zitadel_client/models/v2_hashed_password.py index 15fdf430..a35e0576 100644 --- a/zitadel_client/models/v2_hashed_password.py +++ b/zitadel_client/models/v2_hashed_password.py @@ -13,21 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2HashedPassword(BaseModel): """ V2HashedPassword """ # noqa: E501 - hash: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(description='"Encoded hash of a password in Modular Crypt Format: https://zitadel.com/docs/concepts/architecture/secrets#hashed-secrets"') + hash: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(description="\"Encoded hash of a password in Modular Crypt Format: https://zitadel.com/docs/concepts/architecture/secrets#hashed-secrets\"") change_required: Optional[StrictBool] = Field(default=None, alias="changeRequired") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["hash", "changeRequired"] diff --git a/zitadel_client/models/v2_human_email.py b/zitadel_client/models/v2_human_email.py index 64a9d89f..d3a843a1 100644 --- a/zitadel_client/models/v2_human_email.py +++ b/zitadel_client/models/v2_human_email.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2HumanEmail(BaseModel): """ diff --git a/zitadel_client/models/v2_human_mfa_init_skipped_response.py b/zitadel_client/models/v2_human_mfa_init_skipped_response.py index 7c097ed3..6bb23215 100644 --- a/zitadel_client/models/v2_human_mfa_init_skipped_response.py +++ b/zitadel_client/models/v2_human_mfa_init_skipped_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2HumanMFAInitSkippedResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_human_phone.py b/zitadel_client/models/v2_human_phone.py index 96d1229e..adb80a2b 100644 --- a/zitadel_client/models/v2_human_phone.py +++ b/zitadel_client/models/v2_human_phone.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2HumanPhone(BaseModel): """ diff --git a/zitadel_client/models/v2_human_profile.py b/zitadel_client/models/v2_human_profile.py index fd69cafc..b065b7a4 100644 --- a/zitadel_client/models/v2_human_profile.py +++ b/zitadel_client/models/v2_human_profile.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_gender import V2Gender - +from typing import Optional, Set +from typing_extensions import Self class V2HumanProfile(BaseModel): """ diff --git a/zitadel_client/models/v2_human_user.py b/zitadel_client/models/v2_human_user.py index 8e6f80fb..cc77a57b 100644 --- a/zitadel_client/models/v2_human_user.py +++ b/zitadel_client/models/v2_human_user.py @@ -13,21 +13,19 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_human_email import V2HumanEmail from zitadel_client.models.v2_human_phone import V2HumanPhone from zitadel_client.models.v2_human_profile import V2HumanProfile from zitadel_client.models.v2_user_state import V2UserState - +from typing import Optional, Set +from typing_extensions import Self class V2HumanUser(BaseModel): """ @@ -90,13 +88,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of profile if self.profile: - _dict["profile"] = self.profile.to_dict() + _dict['profile'] = self.profile.to_dict() # override the default output from pydantic by calling `to_dict()` of email if self.email: - _dict["email"] = self.email.to_dict() + _dict['email'] = self.email.to_dict() # override the default output from pydantic by calling `to_dict()` of phone if self.phone: - _dict["phone"] = self.phone.to_dict() + _dict['phone'] = self.phone.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_identity_provider.py b/zitadel_client/models/v2_identity_provider.py index 06b7c10e..14ca4804 100644 --- a/zitadel_client/models/v2_identity_provider.py +++ b/zitadel_client/models/v2_identity_provider.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_identity_provider_type import V2IdentityProviderType from zitadel_client.models.zitadelidpv2_options1 import Zitadelidpv2Options1 - +from typing import Optional, Set +from typing_extensions import Self class V2IdentityProvider(BaseModel): """ @@ -80,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of options if self.options: - _dict["options"] = self.options.to_dict() + _dict['options'] = self.options.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_identity_provider_type.py b/zitadel_client/models/v2_identity_provider_type.py index 69d162f8..5af37e32 100644 --- a/zitadel_client/models/v2_identity_provider_type.py +++ b/zitadel_client/models/v2_identity_provider_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,19 +26,19 @@ class V2IdentityProviderType(str, Enum): """ allowed enum values """ - IDENTITY_PROVIDER_TYPE_UNSPECIFIED = "IDENTITY_PROVIDER_TYPE_UNSPECIFIED" - IDENTITY_PROVIDER_TYPE_OIDC = "IDENTITY_PROVIDER_TYPE_OIDC" - IDENTITY_PROVIDER_TYPE_JWT = "IDENTITY_PROVIDER_TYPE_JWT" - IDENTITY_PROVIDER_TYPE_LDAP = "IDENTITY_PROVIDER_TYPE_LDAP" - IDENTITY_PROVIDER_TYPE_OAUTH = "IDENTITY_PROVIDER_TYPE_OAUTH" - IDENTITY_PROVIDER_TYPE_AZURE_AD = "IDENTITY_PROVIDER_TYPE_AZURE_AD" - IDENTITY_PROVIDER_TYPE_GITHUB = "IDENTITY_PROVIDER_TYPE_GITHUB" - IDENTITY_PROVIDER_TYPE_GITHUB_ES = "IDENTITY_PROVIDER_TYPE_GITHUB_ES" - IDENTITY_PROVIDER_TYPE_GITLAB = "IDENTITY_PROVIDER_TYPE_GITLAB" - IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED = "IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED" - IDENTITY_PROVIDER_TYPE_GOOGLE = "IDENTITY_PROVIDER_TYPE_GOOGLE" - IDENTITY_PROVIDER_TYPE_SAML = "IDENTITY_PROVIDER_TYPE_SAML" - IDENTITY_PROVIDER_TYPE_APPLE = "IDENTITY_PROVIDER_TYPE_APPLE" + IDENTITY_PROVIDER_TYPE_UNSPECIFIED = 'IDENTITY_PROVIDER_TYPE_UNSPECIFIED' + IDENTITY_PROVIDER_TYPE_OIDC = 'IDENTITY_PROVIDER_TYPE_OIDC' + IDENTITY_PROVIDER_TYPE_JWT = 'IDENTITY_PROVIDER_TYPE_JWT' + IDENTITY_PROVIDER_TYPE_LDAP = 'IDENTITY_PROVIDER_TYPE_LDAP' + IDENTITY_PROVIDER_TYPE_OAUTH = 'IDENTITY_PROVIDER_TYPE_OAUTH' + IDENTITY_PROVIDER_TYPE_AZURE_AD = 'IDENTITY_PROVIDER_TYPE_AZURE_AD' + IDENTITY_PROVIDER_TYPE_GITHUB = 'IDENTITY_PROVIDER_TYPE_GITHUB' + IDENTITY_PROVIDER_TYPE_GITHUB_ES = 'IDENTITY_PROVIDER_TYPE_GITHUB_ES' + IDENTITY_PROVIDER_TYPE_GITLAB = 'IDENTITY_PROVIDER_TYPE_GITLAB' + IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED = 'IDENTITY_PROVIDER_TYPE_GITLAB_SELF_HOSTED' + IDENTITY_PROVIDER_TYPE_GOOGLE = 'IDENTITY_PROVIDER_TYPE_GOOGLE' + IDENTITY_PROVIDER_TYPE_SAML = 'IDENTITY_PROVIDER_TYPE_SAML' + IDENTITY_PROVIDER_TYPE_APPLE = 'IDENTITY_PROVIDER_TYPE_APPLE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idp.py b/zitadel_client/models/v2_idp.py index a5d26893..4eaf95bd 100644 --- a/zitadel_client/models/v2_idp.py +++ b/zitadel_client/models/v2_idp.py @@ -13,20 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_config import V2IDPConfig from zitadel_client.models.v2_idp_state import V2IDPState from zitadel_client.models.v2_idp_type import V2IDPType - +from typing import Optional, Set +from typing_extensions import Self class V2IDP(BaseModel): """ @@ -84,10 +82,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of config if self.config: - _dict["config"] = self.config.to_dict() + _dict['config'] = self.config.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_config.py b/zitadel_client/models/v2_idp_config.py index 6f0a05b1..a810f208 100644 --- a/zitadel_client/models/v2_idp_config.py +++ b/zitadel_client/models/v2_idp_config.py @@ -13,22 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_apple_config import V2AppleConfig from zitadel_client.models.v2_azure_ad_config import V2AzureADConfig from zitadel_client.models.v2_generic_oidc_config import V2GenericOIDCConfig from zitadel_client.models.v2_git_hub_config import V2GitHubConfig -from zitadel_client.models.v2_git_hub_enterprise_server_config import ( - V2GitHubEnterpriseServerConfig, -) +from zitadel_client.models.v2_git_hub_enterprise_server_config import V2GitHubEnterpriseServerConfig from zitadel_client.models.v2_git_lab_config import V2GitLabConfig from zitadel_client.models.v2_git_lab_self_hosted_config import V2GitLabSelfHostedConfig from zitadel_client.models.v2_google_config import V2GoogleConfig @@ -37,7 +32,8 @@ from zitadel_client.models.v2_o_auth_config import V2OAuthConfig from zitadel_client.models.v2_saml_config import V2SAMLConfig from zitadel_client.models.zitadelidpv2_options import Zitadelidpv2Options - +from typing import Optional, Set +from typing_extensions import Self class V2IDPConfig(BaseModel): """ @@ -102,43 +98,43 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of options if self.options: - _dict["options"] = self.options.to_dict() + _dict['options'] = self.options.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict["ldap"] = self.ldap.to_dict() + _dict['ldap'] = self.ldap.to_dict() # override the default output from pydantic by calling `to_dict()` of google if self.google: - _dict["google"] = self.google.to_dict() + _dict['google'] = self.google.to_dict() # override the default output from pydantic by calling `to_dict()` of oauth if self.oauth: - _dict["oauth"] = self.oauth.to_dict() + _dict['oauth'] = self.oauth.to_dict() # override the default output from pydantic by calling `to_dict()` of oidc if self.oidc: - _dict["oidc"] = self.oidc.to_dict() + _dict['oidc'] = self.oidc.to_dict() # override the default output from pydantic by calling `to_dict()` of jwt if self.jwt: - _dict["jwt"] = self.jwt.to_dict() + _dict['jwt'] = self.jwt.to_dict() # override the default output from pydantic by calling `to_dict()` of github if self.github: - _dict["github"] = self.github.to_dict() + _dict['github'] = self.github.to_dict() # override the default output from pydantic by calling `to_dict()` of github_es if self.github_es: - _dict["githubEs"] = self.github_es.to_dict() + _dict['githubEs'] = self.github_es.to_dict() # override the default output from pydantic by calling `to_dict()` of gitlab if self.gitlab: - _dict["gitlab"] = self.gitlab.to_dict() + _dict['gitlab'] = self.gitlab.to_dict() # override the default output from pydantic by calling `to_dict()` of gitlab_self_hosted if self.gitlab_self_hosted: - _dict["gitlabSelfHosted"] = self.gitlab_self_hosted.to_dict() + _dict['gitlabSelfHosted'] = self.gitlab_self_hosted.to_dict() # override the default output from pydantic by calling `to_dict()` of azure_ad if self.azure_ad: - _dict["azureAd"] = self.azure_ad.to_dict() + _dict['azureAd'] = self.azure_ad.to_dict() # override the default output from pydantic by calling `to_dict()` of apple if self.apple: - _dict["apple"] = self.apple.to_dict() + _dict['apple'] = self.apple.to_dict() # override the default output from pydantic by calling `to_dict()` of saml if self.saml: - _dict["saml"] = self.saml.to_dict() + _dict['saml'] = self.saml.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_information.py b/zitadel_client/models/v2_idp_information.py index 3fc0d8cf..697a88ee 100644 --- a/zitadel_client/models/v2_idp_information.py +++ b/zitadel_client/models/v2_idp_information.py @@ -13,26 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.v2_idpldap_access_information import V2IDPLDAPAccessInformation +from zitadel_client.models.v2_idpo_auth_access_information import V2IDPOAuthAccessInformation +from zitadel_client.models.v2_idpsaml_access_information import V2IDPSAMLAccessInformation +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.v2_idpldap_access_information import ( - V2IDPLDAPAccessInformation, -) -from zitadel_client.models.v2_idpo_auth_access_information import ( - V2IDPOAuthAccessInformation, -) -from zitadel_client.models.v2_idpsaml_access_information import ( - V2IDPSAMLAccessInformation, -) - - class V2IDPInformation(BaseModel): """ V2IDPInformation @@ -90,13 +82,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of oauth if self.oauth: - _dict["oauth"] = self.oauth.to_dict() + _dict['oauth'] = self.oauth.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict["ldap"] = self.ldap.to_dict() + _dict['ldap'] = self.ldap.to_dict() # override the default output from pydantic by calling `to_dict()` of saml if self.saml: - _dict["saml"] = self.saml.to_dict() + _dict['saml'] = self.saml.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_idp_intent.py b/zitadel_client/models/v2_idp_intent.py index 3d75f2bc..13c1f112 100644 --- a/zitadel_client/models/v2_idp_intent.py +++ b/zitadel_client/models/v2_idp_intent.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2IDPIntent(BaseModel): """ diff --git a/zitadel_client/models/v2_idp_link.py b/zitadel_client/models/v2_idp_link.py index c4b32215..27806a54 100644 --- a/zitadel_client/models/v2_idp_link.py +++ b/zitadel_client/models/v2_idp_link.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2IDPLink(BaseModel): """ diff --git a/zitadel_client/models/v2_idp_state.py b/zitadel_client/models/v2_idp_state.py index 9c89c7e5..f082afbd 100644 --- a/zitadel_client/models/v2_idp_state.py +++ b/zitadel_client/models/v2_idp_state.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,11 +26,11 @@ class V2IDPState(str, Enum): """ allowed enum values """ - IDP_STATE_UNSPECIFIED = "IDP_STATE_UNSPECIFIED" - IDP_STATE_ACTIVE = "IDP_STATE_ACTIVE" - IDP_STATE_INACTIVE = "IDP_STATE_INACTIVE" - IDP_STATE_REMOVED = "IDP_STATE_REMOVED" - IDP_STATE_MIGRATED = "IDP_STATE_MIGRATED" + IDP_STATE_UNSPECIFIED = 'IDP_STATE_UNSPECIFIED' + IDP_STATE_ACTIVE = 'IDP_STATE_ACTIVE' + IDP_STATE_INACTIVE = 'IDP_STATE_INACTIVE' + IDP_STATE_REMOVED = 'IDP_STATE_REMOVED' + IDP_STATE_MIGRATED = 'IDP_STATE_MIGRATED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idp_type.py b/zitadel_client/models/v2_idp_type.py index b2ae90a3..9d236ba3 100644 --- a/zitadel_client/models/v2_idp_type.py +++ b/zitadel_client/models/v2_idp_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,19 +26,19 @@ class V2IDPType(str, Enum): """ allowed enum values """ - IDP_TYPE_UNSPECIFIED = "IDP_TYPE_UNSPECIFIED" - IDP_TYPE_OIDC = "IDP_TYPE_OIDC" - IDP_TYPE_JWT = "IDP_TYPE_JWT" - IDP_TYPE_LDAP = "IDP_TYPE_LDAP" - IDP_TYPE_OAUTH = "IDP_TYPE_OAUTH" - IDP_TYPE_AZURE_AD = "IDP_TYPE_AZURE_AD" - IDP_TYPE_GITHUB = "IDP_TYPE_GITHUB" - IDP_TYPE_GITHUB_ES = "IDP_TYPE_GITHUB_ES" - IDP_TYPE_GITLAB = "IDP_TYPE_GITLAB" - IDP_TYPE_GITLAB_SELF_HOSTED = "IDP_TYPE_GITLAB_SELF_HOSTED" - IDP_TYPE_GOOGLE = "IDP_TYPE_GOOGLE" - IDP_TYPE_APPLE = "IDP_TYPE_APPLE" - IDP_TYPE_SAML = "IDP_TYPE_SAML" + IDP_TYPE_UNSPECIFIED = 'IDP_TYPE_UNSPECIFIED' + IDP_TYPE_OIDC = 'IDP_TYPE_OIDC' + IDP_TYPE_JWT = 'IDP_TYPE_JWT' + IDP_TYPE_LDAP = 'IDP_TYPE_LDAP' + IDP_TYPE_OAUTH = 'IDP_TYPE_OAUTH' + IDP_TYPE_AZURE_AD = 'IDP_TYPE_AZURE_AD' + IDP_TYPE_GITHUB = 'IDP_TYPE_GITHUB' + IDP_TYPE_GITHUB_ES = 'IDP_TYPE_GITHUB_ES' + IDP_TYPE_GITLAB = 'IDP_TYPE_GITLAB' + IDP_TYPE_GITLAB_SELF_HOSTED = 'IDP_TYPE_GITLAB_SELF_HOSTED' + IDP_TYPE_GOOGLE = 'IDP_TYPE_GOOGLE' + IDP_TYPE_APPLE = 'IDP_TYPE_APPLE' + IDP_TYPE_SAML = 'IDP_TYPE_SAML' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_idpldap_access_information.py b/zitadel_client/models/v2_idpldap_access_information.py index c850b51e..d4bfb7f9 100644 --- a/zitadel_client/models/v2_idpldap_access_information.py +++ b/zitadel_client/models/v2_idpldap_access_information.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2IDPLDAPAccessInformation(BaseModel): """ V2IDPLDAPAccessInformation diff --git a/zitadel_client/models/v2_idpo_auth_access_information.py b/zitadel_client/models/v2_idpo_auth_access_information.py index 35a79047..266ef87e 100644 --- a/zitadel_client/models/v2_idpo_auth_access_information.py +++ b/zitadel_client/models/v2_idpo_auth_access_information.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2IDPOAuthAccessInformation(BaseModel): """ V2IDPOAuthAccessInformation diff --git a/zitadel_client/models/v2_idpsaml_access_information.py b/zitadel_client/models/v2_idpsaml_access_information.py index 404b9743..05f68046 100644 --- a/zitadel_client/models/v2_idpsaml_access_information.py +++ b/zitadel_client/models/v2_idpsaml_access_information.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union +import json from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2IDPSAMLAccessInformation(BaseModel): """ @@ -31,7 +31,7 @@ class V2IDPSAMLAccessInformation(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["assertion"] - @field_validator("assertion") + @field_validator('assertion') def assertion_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: diff --git a/zitadel_client/models/v2_ids_query.py b/zitadel_client/models/v2_ids_query.py index 9116855c..e72bd8d2 100644 --- a/zitadel_client/models/v2_ids_query.py +++ b/zitadel_client/models/v2_ids_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2IDsQuery(BaseModel): """ V2IDsQuery diff --git a/zitadel_client/models/v2_improved_performance.py b/zitadel_client/models/v2_improved_performance.py index c314a9f9..7d3ef7b7 100644 --- a/zitadel_client/models/v2_improved_performance.py +++ b/zitadel_client/models/v2_improved_performance.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,12 +26,12 @@ class V2ImprovedPerformance(str, Enum): """ allowed enum values """ - IMPROVED_PERFORMANCE_UNSPECIFIED = "IMPROVED_PERFORMANCE_UNSPECIFIED" - IMPROVED_PERFORMANCE_ORG_BY_ID = "IMPROVED_PERFORMANCE_ORG_BY_ID" - IMPROVED_PERFORMANCE_PROJECT_GRANT = "IMPROVED_PERFORMANCE_PROJECT_GRANT" - IMPROVED_PERFORMANCE_PROJECT = "IMPROVED_PERFORMANCE_PROJECT" - IMPROVED_PERFORMANCE_USER_GRANT = "IMPROVED_PERFORMANCE_USER_GRANT" - IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED = "IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED" + IMPROVED_PERFORMANCE_UNSPECIFIED = 'IMPROVED_PERFORMANCE_UNSPECIFIED' + IMPROVED_PERFORMANCE_ORG_BY_ID = 'IMPROVED_PERFORMANCE_ORG_BY_ID' + IMPROVED_PERFORMANCE_PROJECT_GRANT = 'IMPROVED_PERFORMANCE_PROJECT_GRANT' + IMPROVED_PERFORMANCE_PROJECT = 'IMPROVED_PERFORMANCE_PROJECT' + IMPROVED_PERFORMANCE_USER_GRANT = 'IMPROVED_PERFORMANCE_USER_GRANT' + IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED = 'IMPROVED_PERFORMANCE_ORG_DOMAIN_VERIFIED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_improved_performance_feature_flag.py b/zitadel_client/models/v2_improved_performance_feature_flag.py index 1e669b41..96e99285 100644 --- a/zitadel_client/models/v2_improved_performance_feature_flag.py +++ b/zitadel_client/models/v2_improved_performance_feature_flag.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_source import V2Source - +from typing import Optional, Set +from typing_extensions import Self class V2ImprovedPerformanceFeatureFlag(BaseModel): """ diff --git a/zitadel_client/models/v2_in_user_emails_query.py b/zitadel_client/models/v2_in_user_emails_query.py index 96fe6c12..b010012c 100644 --- a/zitadel_client/models/v2_in_user_emails_query.py +++ b/zitadel_client/models/v2_in_user_emails_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2InUserEmailsQuery(BaseModel): """ Query for users with email in list of emails. diff --git a/zitadel_client/models/v2_in_user_id_query.py b/zitadel_client/models/v2_in_user_id_query.py index b2f0f8fd..4129c98d 100644 --- a/zitadel_client/models/v2_in_user_id_query.py +++ b/zitadel_client/models/v2_in_user_id_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2InUserIDQuery(BaseModel): """ Query for users with ID in list of IDs. diff --git a/zitadel_client/models/v2_intent_factor.py b/zitadel_client/models/v2_intent_factor.py index 61cd91fa..ed8f25ca 100644 --- a/zitadel_client/models/v2_intent_factor.py +++ b/zitadel_client/models/v2_intent_factor.py @@ -13,22 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2IntentFactor(BaseModel): """ V2IntentFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when an intent was last checked"', alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description="\"time when an intent was last checked\"", alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_jwt_config.py b/zitadel_client/models/v2_jwt_config.py index 51d041ef..0ac42259 100644 --- a/zitadel_client/models/v2_jwt_config.py +++ b/zitadel_client/models/v2_jwt_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2JWTConfig(BaseModel): """ V2JWTConfig diff --git a/zitadel_client/models/v2_last_name_query.py b/zitadel_client/models/v2_last_name_query.py index 1c211278..95a24875 100644 --- a/zitadel_client/models/v2_last_name_query.py +++ b/zitadel_client/models/v2_last_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2LastNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_ldap_attributes.py b/zitadel_client/models/v2_ldap_attributes.py index 2f85cf75..2952e36e 100644 --- a/zitadel_client/models/v2_ldap_attributes.py +++ b/zitadel_client/models/v2_ldap_attributes.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2LDAPAttributes(BaseModel): """ V2LDAPAttributes diff --git a/zitadel_client/models/v2_ldap_config.py b/zitadel_client/models/v2_ldap_config.py index cf0b8627..b210b99b 100644 --- a/zitadel_client/models/v2_ldap_config.py +++ b/zitadel_client/models/v2_ldap_config.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_ldap_attributes import V2LDAPAttributes - +from typing import Optional, Set +from typing_extensions import Self class V2LDAPConfig(BaseModel): """ @@ -84,7 +82,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of attributes if self.attributes: - _dict["attributes"] = self.attributes.to_dict() + _dict['attributes'] = self.attributes.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_ldap_credentials.py b/zitadel_client/models/v2_ldap_credentials.py index 061a6134..688a2ccd 100644 --- a/zitadel_client/models/v2_ldap_credentials.py +++ b/zitadel_client/models/v2_ldap_credentials.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2LDAPCredentials(BaseModel): """ diff --git a/zitadel_client/models/v2_legal_and_support_settings.py b/zitadel_client/models/v2_legal_and_support_settings.py index 2d7c9717..697486bf 100644 --- a/zitadel_client/models/v2_legal_and_support_settings.py +++ b/zitadel_client/models/v2_legal_and_support_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType - +from typing import Optional, Set +from typing_extensions import Self class V2LegalAndSupportSettings(BaseModel): """ diff --git a/zitadel_client/models/v2_list_authentication_factors_response.py b/zitadel_client/models/v2_list_authentication_factors_response.py index d698e0fc..a94c9ea2 100644 --- a/zitadel_client/models/v2_list_authentication_factors_response.py +++ b/zitadel_client/models/v2_list_authentication_factors_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_auth_factor import V2AuthFactor - +from typing import Optional, Set +from typing_extensions import Self class V2ListAuthenticationFactorsResponse(BaseModel): """ @@ -80,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict["result"] = _items + _dict['result'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_authentication_method_types_response.py b/zitadel_client/models/v2_list_authentication_method_types_response.py index cdef7ba2..3d68d9e6 100644 --- a/zitadel_client/models/v2_list_authentication_method_types_response.py +++ b/zitadel_client/models/v2_list_authentication_method_types_response.py @@ -13,20 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - -from zitadel_client.models.v2_authentication_method_type import ( - V2AuthenticationMethodType, -) +from typing import Any, ClassVar, Dict, List, Optional +from zitadel_client.models.v2_authentication_method_type import V2AuthenticationMethodType from zitadel_client.models.v2_list_details import V2ListDetails - +from typing import Optional, Set +from typing_extensions import Self class V2ListAuthenticationMethodTypesResponse(BaseModel): """ @@ -80,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_details.py b/zitadel_client/models/v2_list_details.py index 9e23ae1e..02ed59f7 100644 --- a/zitadel_client/models/v2_list_details.py +++ b/zitadel_client/models/v2_list_details.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2ListDetails(BaseModel): """ V2ListDetails diff --git a/zitadel_client/models/v2_list_idp_links_response.py b/zitadel_client/models/v2_list_idp_links_response.py index 254bed59..3b045e0b 100644 --- a/zitadel_client/models/v2_list_idp_links_response.py +++ b/zitadel_client/models/v2_list_idp_links_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_idp_link import V2IDPLink from zitadel_client.models.v2_list_details import V2ListDetails - +from typing import Optional, Set +from typing_extensions import Self class V2ListIDPLinksResponse(BaseModel): """ @@ -78,14 +76,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict["result"] = _items + _dict['result'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_organizations_request.py b/zitadel_client/models/v2_list_organizations_request.py index 89c10fd9..41ea4c67 100644 --- a/zitadel_client/models/v2_list_organizations_request.py +++ b/zitadel_client/models/v2_list_organizations_request.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_query import V2ListQuery from zitadel_client.models.v2_organization_field_name import V2OrganizationFieldName from zitadel_client.models.zitadelorgv2_search_query import Zitadelorgv2SearchQuery - +from typing import Optional, Set +from typing_extensions import Self class V2ListOrganizationsRequest(BaseModel): """ @@ -80,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict["query"] = self.query.to_dict() + _dict['query'] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict["queries"] = _items + _dict['queries'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_organizations_response.py b/zitadel_client/models/v2_list_organizations_response.py index b7f08473..a4d7afeb 100644 --- a/zitadel_client/models/v2_list_organizations_response.py +++ b/zitadel_client/models/v2_list_organizations_response.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_organization_field_name import V2OrganizationFieldName from zitadel_client.models.zitadelorgv2_organization import Zitadelorgv2Organization - +from typing import Optional, Set +from typing_extensions import Self class V2ListOrganizationsResponse(BaseModel): """ @@ -80,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict["result"] = _items + _dict['result'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_passkeys_response.py b/zitadel_client/models/v2_list_passkeys_response.py index 1a23492e..96a7d1dc 100644 --- a/zitadel_client/models/v2_list_passkeys_response.py +++ b/zitadel_client/models/v2_list_passkeys_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_passkey import V2Passkey - +from typing import Optional, Set +from typing_extensions import Self class V2ListPasskeysResponse(BaseModel): """ @@ -78,14 +76,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict["result"] = _items + _dict['result'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_query.py b/zitadel_client/models/v2_list_query.py index 758113f3..e0db26c4 100644 --- a/zitadel_client/models/v2_list_query.py +++ b/zitadel_client/models/v2_list_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2ListQuery(BaseModel): """ Object unspecific list filters like offset, limit and asc/desc. diff --git a/zitadel_client/models/v2_list_sessions_request.py b/zitadel_client/models/v2_list_sessions_request.py index c03a726a..84cb13e7 100644 --- a/zitadel_client/models/v2_list_sessions_request.py +++ b/zitadel_client/models/v2_list_sessions_request.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.objectv2_list_query import Objectv2ListQuery from zitadel_client.models.v2_search_query import V2SearchQuery from zitadel_client.models.v2_session_field_name import V2SessionFieldName - +from typing import Optional, Set +from typing_extensions import Self class V2ListSessionsRequest(BaseModel): """ @@ -80,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict["query"] = self.query.to_dict() + _dict['query'] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict["queries"] = _items + _dict['queries'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_sessions_response.py b/zitadel_client/models/v2_list_sessions_response.py index ef39537c..e20e69cd 100644 --- a/zitadel_client/models/v2_list_sessions_response.py +++ b/zitadel_client/models/v2_list_sessions_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.objectv2_list_details import Objectv2ListDetails from zitadel_client.models.v2_session1 import V2Session1 - +from typing import Optional, Set +from typing_extensions import Self class V2ListSessionsResponse(BaseModel): """ @@ -78,14 +76,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in sessions (list) _items = [] if self.sessions: for _item_sessions in self.sessions: if _item_sessions: _items.append(_item_sessions.to_dict()) - _dict["sessions"] = _items + _dict['sessions'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_users_request.py b/zitadel_client/models/v2_list_users_request.py index 090d27a6..d2a9bb05 100644 --- a/zitadel_client/models/v2_list_users_request.py +++ b/zitadel_client/models/v2_list_users_request.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_query import V2ListQuery from zitadel_client.models.v2_search_query1 import V2SearchQuery1 from zitadel_client.models.v2_user_field_name import V2UserFieldName - +from typing import Optional, Set +from typing_extensions import Self class V2ListUsersRequest(BaseModel): """ @@ -80,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict["query"] = self.query.to_dict() + _dict['query'] = self.query.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in queries (list) _items = [] if self.queries: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict["queries"] = _items + _dict['queries'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_list_users_response.py b/zitadel_client/models/v2_list_users_response.py index 2e984ffb..c39b5f13 100644 --- a/zitadel_client/models/v2_list_users_response.py +++ b/zitadel_client/models/v2_list_users_response.py @@ -13,19 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_list_details import V2ListDetails from zitadel_client.models.v2_user import V2User from zitadel_client.models.v2_user_field_name import V2UserFieldName - +from typing import Optional, Set +from typing_extensions import Self class V2ListUsersResponse(BaseModel): """ @@ -80,14 +78,14 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in result (list) _items = [] if self.result: for _item_result in self.result: if _item_result: _items.append(_item_result.to_dict()) - _dict["result"] = _items + _dict['result'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_lock_user_response.py b/zitadel_client/models/v2_lock_user_response.py index 4e97aa4b..a6528aa8 100644 --- a/zitadel_client/models/v2_lock_user_response.py +++ b/zitadel_client/models/v2_lock_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2LockUserResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_lockout_settings.py b/zitadel_client/models/v2_lockout_settings.py index 8f49005c..701bf7fc 100644 --- a/zitadel_client/models/v2_lockout_settings.py +++ b/zitadel_client/models/v2_lockout_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType - +from typing import Optional, Set +from typing_extensions import Self class V2LockoutSettings(BaseModel): """ diff --git a/zitadel_client/models/v2_login_name_query.py b/zitadel_client/models/v2_login_name_query.py index d1c10613..c70e0328 100644 --- a/zitadel_client/models/v2_login_name_query.py +++ b/zitadel_client/models/v2_login_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2LoginNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_login_settings.py b/zitadel_client/models/v2_login_settings.py index 58a9019e..b04da0e9 100644 --- a/zitadel_client/models/v2_login_settings.py +++ b/zitadel_client/models/v2_login_settings.py @@ -13,20 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_multi_factor_type import V2MultiFactorType from zitadel_client.models.v2_passkeys_type import V2PasskeysType from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType from zitadel_client.models.v2_second_factor_type import V2SecondFactorType - +from typing import Optional, Set +from typing_extensions import Self class V2LoginSettings(BaseModel): """ diff --git a/zitadel_client/models/v2_login_v2.py b/zitadel_client/models/v2_login_v2.py index b4766bbc..b044d6bb 100644 --- a/zitadel_client/models/v2_login_v2.py +++ b/zitadel_client/models/v2_login_v2.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2LoginV2(BaseModel): """ V2LoginV2 diff --git a/zitadel_client/models/v2_login_v2_feature_flag.py b/zitadel_client/models/v2_login_v2_feature_flag.py index c79b221d..2a1382c0 100644 --- a/zitadel_client/models/v2_login_v2_feature_flag.py +++ b/zitadel_client/models/v2_login_v2_feature_flag.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_source import V2Source - +from typing import Optional, Set +from typing_extensions import Self class V2LoginV2FeatureFlag(BaseModel): """ diff --git a/zitadel_client/models/v2_machine_user.py b/zitadel_client/models/v2_machine_user.py index 8e49833b..db05bba9 100644 --- a/zitadel_client/models/v2_machine_user.py +++ b/zitadel_client/models/v2_machine_user.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_access_token_type import V2AccessTokenType - +from typing import Optional, Set +from typing_extensions import Self class V2MachineUser(BaseModel): """ diff --git a/zitadel_client/models/v2_multi_factor_type.py b/zitadel_client/models/v2_multi_factor_type.py index a3f06e88..911cff32 100644 --- a/zitadel_client/models/v2_multi_factor_type.py +++ b/zitadel_client/models/v2_multi_factor_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,8 +26,8 @@ class V2MultiFactorType(str, Enum): """ allowed enum values """ - MULTI_FACTOR_TYPE_UNSPECIFIED = "MULTI_FACTOR_TYPE_UNSPECIFIED" - MULTI_FACTOR_TYPE_U2_F_WITH_VERIFICATION = "MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION" + MULTI_FACTOR_TYPE_UNSPECIFIED = 'MULTI_FACTOR_TYPE_UNSPECIFIED' + MULTI_FACTOR_TYPE_U2_F_WITH_VERIFICATION = 'MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_nick_name_query.py b/zitadel_client/models/v2_nick_name_query.py index 3126472c..8361b4c2 100644 --- a/zitadel_client/models/v2_nick_name_query.py +++ b/zitadel_client/models/v2_nick_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2NickNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_not_query.py b/zitadel_client/models/v2_not_query.py index c8f813a3..a9172154 100644 --- a/zitadel_client/models/v2_not_query.py +++ b/zitadel_client/models/v2_not_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2NotQuery(BaseModel): """ Negate the sub-condition. @@ -74,7 +73,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of query if self.query: - _dict["query"] = self.query.to_dict() + _dict['query'] = self.query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -102,7 +101,6 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 - # TODO: Rewrite to not use raise_errors V2NotQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_notification_type.py b/zitadel_client/models/v2_notification_type.py index e26adcce..11f16631 100644 --- a/zitadel_client/models/v2_notification_type.py +++ b/zitadel_client/models/v2_notification_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class V2NotificationType(str, Enum): """ allowed enum values """ - NOTIFICATION_TYPE_UNSPECIFIED = "NOTIFICATION_TYPE_Unspecified" - NOTIFICATION_TYPE_EMAIL = "NOTIFICATION_TYPE_Email" - NOTIFICATION_TYPE_SMS = "NOTIFICATION_TYPE_SMS" + NOTIFICATION_TYPE_UNSPECIFIED = 'NOTIFICATION_TYPE_Unspecified' + NOTIFICATION_TYPE_EMAIL = 'NOTIFICATION_TYPE_Email' + NOTIFICATION_TYPE_SMS = 'NOTIFICATION_TYPE_SMS' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_o_auth_config.py b/zitadel_client/models/v2_o_auth_config.py index 1851a93d..36790afb 100644 --- a/zitadel_client/models/v2_o_auth_config.py +++ b/zitadel_client/models/v2_o_auth_config.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2OAuthConfig(BaseModel): """ V2OAuthConfig diff --git a/zitadel_client/models/v2_or_query.py b/zitadel_client/models/v2_or_query.py index cc7a95bb..0013ee27 100644 --- a/zitadel_client/models/v2_or_query.py +++ b/zitadel_client/models/v2_or_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2OrQuery(BaseModel): """ Connect multiple sub-condition with and OR operator. @@ -78,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: for _item_queries in self.queries: if _item_queries: _items.append(_item_queries.to_dict()) - _dict["queries"] = _items + _dict['queries'] = _items # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -106,7 +105,6 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return _obj from zitadel_client.models.v2_search_query1 import V2SearchQuery1 - # TODO: Rewrite to not use raise_errors V2OrQuery.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_organization.py b/zitadel_client/models/v2_organization.py index 795e3b83..7dc6fd7d 100644 --- a/zitadel_client/models/v2_organization.py +++ b/zitadel_client/models/v2_organization.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2Organization(BaseModel): """ V2Organization diff --git a/zitadel_client/models/v2_organization_domain_query.py b/zitadel_client/models/v2_organization_domain_query.py index b0c35afa..5d529536 100644 --- a/zitadel_client/models/v2_organization_domain_query.py +++ b/zitadel_client/models/v2_organization_domain_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2OrganizationDomainQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_field_name.py b/zitadel_client/models/v2_organization_field_name.py index d235a8da..fcb06e9a 100644 --- a/zitadel_client/models/v2_organization_field_name.py +++ b/zitadel_client/models/v2_organization_field_name.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,8 +26,8 @@ class V2OrganizationFieldName(str, Enum): """ allowed enum values """ - ORGANIZATION_FIELD_NAME_UNSPECIFIED = "ORGANIZATION_FIELD_NAME_UNSPECIFIED" - ORGANIZATION_FIELD_NAME_NAME = "ORGANIZATION_FIELD_NAME_NAME" + ORGANIZATION_FIELD_NAME_UNSPECIFIED = 'ORGANIZATION_FIELD_NAME_UNSPECIFIED' + ORGANIZATION_FIELD_NAME_NAME = 'ORGANIZATION_FIELD_NAME_NAME' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_organization_id_query.py b/zitadel_client/models/v2_organization_id_query.py index cfc1414c..37f7486d 100644 --- a/zitadel_client/models/v2_organization_id_query.py +++ b/zitadel_client/models/v2_organization_id_query.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2OrganizationIDQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_name_query.py b/zitadel_client/models/v2_organization_name_query.py index 91cc0771..6f8c57b5 100644 --- a/zitadel_client/models/v2_organization_name_query.py +++ b/zitadel_client/models/v2_organization_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2OrganizationNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_organization_state.py b/zitadel_client/models/v2_organization_state.py index d54a8a43..31947946 100644 --- a/zitadel_client/models/v2_organization_state.py +++ b/zitadel_client/models/v2_organization_state.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2OrganizationState(str, Enum): """ allowed enum values """ - ORGANIZATION_STATE_UNSPECIFIED = "ORGANIZATION_STATE_UNSPECIFIED" - ORGANIZATION_STATE_ACTIVE = "ORGANIZATION_STATE_ACTIVE" - ORGANIZATION_STATE_INACTIVE = "ORGANIZATION_STATE_INACTIVE" - ORGANIZATION_STATE_REMOVED = "ORGANIZATION_STATE_REMOVED" + ORGANIZATION_STATE_UNSPECIFIED = 'ORGANIZATION_STATE_UNSPECIFIED' + ORGANIZATION_STATE_ACTIVE = 'ORGANIZATION_STATE_ACTIVE' + ORGANIZATION_STATE_INACTIVE = 'ORGANIZATION_STATE_INACTIVE' + ORGANIZATION_STATE_REMOVED = 'ORGANIZATION_STATE_REMOVED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_organization_state_query.py b/zitadel_client/models/v2_organization_state_query.py index d3695059..8eefcc29 100644 --- a/zitadel_client/models/v2_organization_state_query.py +++ b/zitadel_client/models/v2_organization_state_query.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_organization_state import V2OrganizationState - +from typing import Optional, Set +from typing_extensions import Self class V2OrganizationStateQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_otp_factor.py b/zitadel_client/models/v2_otp_factor.py index e684eace..32812ea7 100644 --- a/zitadel_client/models/v2_otp_factor.py +++ b/zitadel_client/models/v2_otp_factor.py @@ -13,22 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2OTPFactor(BaseModel): """ V2OTPFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when the One-Time Password was last checked"', alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description="\"time when the One-Time Password was last checked\"", alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_passkey.py b/zitadel_client/models/v2_passkey.py index 1af8a4b1..c9c4e496 100644 --- a/zitadel_client/models/v2_passkey.py +++ b/zitadel_client/models/v2_passkey.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_auth_factor_state import V2AuthFactorState - +from typing import Optional, Set +from typing_extensions import Self class V2Passkey(BaseModel): """ diff --git a/zitadel_client/models/v2_passkey_authenticator.py b/zitadel_client/models/v2_passkey_authenticator.py index 28386a3b..96804500 100644 --- a/zitadel_client/models/v2_passkey_authenticator.py +++ b/zitadel_client/models/v2_passkey_authenticator.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class V2PasskeyAuthenticator(str, Enum): """ allowed enum values """ - PASSKEY_AUTHENTICATOR_UNSPECIFIED = "PASSKEY_AUTHENTICATOR_UNSPECIFIED" - PASSKEY_AUTHENTICATOR_PLATFORM = "PASSKEY_AUTHENTICATOR_PLATFORM" - PASSKEY_AUTHENTICATOR_CROSS_PLATFORM = "PASSKEY_AUTHENTICATOR_CROSS_PLATFORM" + PASSKEY_AUTHENTICATOR_UNSPECIFIED = 'PASSKEY_AUTHENTICATOR_UNSPECIFIED' + PASSKEY_AUTHENTICATOR_PLATFORM = 'PASSKEY_AUTHENTICATOR_PLATFORM' + PASSKEY_AUTHENTICATOR_CROSS_PLATFORM = 'PASSKEY_AUTHENTICATOR_CROSS_PLATFORM' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_passkey_registration_code.py b/zitadel_client/models/v2_passkey_registration_code.py index d8fd8bac..e74eb0b0 100644 --- a/zitadel_client/models/v2_passkey_registration_code.py +++ b/zitadel_client/models/v2_passkey_registration_code.py @@ -13,22 +13,22 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2PasskeyRegistrationCode(BaseModel): """ V2PasskeyRegistrationCode """ # noqa: E501 - id: Annotated[str, Field(strict=True, max_length=200)] = Field(description='"id to the one time code generated by ZITADEL"') - code: Annotated[str, Field(strict=True, max_length=200)] = Field(description='"one time code generated by ZITADEL"') + id: Annotated[str, Field(strict=True, max_length=200)] = Field(description="\"id to the one time code generated by ZITADEL\"") + code: Annotated[str, Field(strict=True, max_length=200)] = Field(description="\"one time code generated by ZITADEL\"") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["id", "code"] diff --git a/zitadel_client/models/v2_passkeys_type.py b/zitadel_client/models/v2_passkeys_type.py index c73248c3..e82a49c8 100644 --- a/zitadel_client/models/v2_passkeys_type.py +++ b/zitadel_client/models/v2_passkeys_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,8 +26,8 @@ class V2PasskeysType(str, Enum): """ allowed enum values """ - PASSKEYS_TYPE_NOT_ALLOWED = "PASSKEYS_TYPE_NOT_ALLOWED" - PASSKEYS_TYPE_ALLOWED = "PASSKEYS_TYPE_ALLOWED" + PASSKEYS_TYPE_NOT_ALLOWED = 'PASSKEYS_TYPE_NOT_ALLOWED' + PASSKEYS_TYPE_ALLOWED = 'PASSKEYS_TYPE_ALLOWED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_password.py b/zitadel_client/models/v2_password.py index 98c3fdcb..876fbb00 100644 --- a/zitadel_client/models/v2_password.py +++ b/zitadel_client/models/v2_password.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2Password(BaseModel): """ diff --git a/zitadel_client/models/v2_password_complexity_settings.py b/zitadel_client/models/v2_password_complexity_settings.py index 340d6ea7..16cd83a8 100644 --- a/zitadel_client/models/v2_password_complexity_settings.py +++ b/zitadel_client/models/v2_password_complexity_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType - +from typing import Optional, Set +from typing_extensions import Self class V2PasswordComplexitySettings(BaseModel): """ @@ -33,7 +31,7 @@ class V2PasswordComplexitySettings(BaseModel): requires_uppercase: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain an upper case letter", alias="requiresUppercase") requires_lowercase: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a lowercase letter", alias="requiresLowercase") requires_number: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a number", alias="requiresNumber") - requires_symbol: Optional[StrictBool] = Field(default=None, description='defines if the password MUST contain a symbol. E.g. "$"', alias="requiresSymbol") + requires_symbol: Optional[StrictBool] = Field(default=None, description="defines if the password MUST contain a symbol. E.g. \"$\"", alias="requiresSymbol") resource_owner_type: Optional[V2ResourceOwnerType] = Field(default=V2ResourceOwnerType.RESOURCE_OWNER_TYPE_UNSPECIFIED, alias="resourceOwnerType") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["minLength", "requiresUppercase", "requiresLowercase", "requiresNumber", "requiresSymbol", "resourceOwnerType"] diff --git a/zitadel_client/models/v2_password_expiry_settings.py b/zitadel_client/models/v2_password_expiry_settings.py index 4200c306..af247540 100644 --- a/zitadel_client/models/v2_password_expiry_settings.py +++ b/zitadel_client/models/v2_password_expiry_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_resource_owner_type import V2ResourceOwnerType - +from typing import Optional, Set +from typing_extensions import Self class V2PasswordExpirySettings(BaseModel): """ diff --git a/zitadel_client/models/v2_password_factor.py b/zitadel_client/models/v2_password_factor.py index 43e5eeb7..81ef8271 100644 --- a/zitadel_client/models/v2_password_factor.py +++ b/zitadel_client/models/v2_password_factor.py @@ -13,22 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2PasswordFactor(BaseModel): """ V2PasswordFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when the password was last checked"', alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description="\"time when the password was last checked\"", alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_password_reset_response.py b/zitadel_client/models/v2_password_reset_response.py index 12bdc438..38540bc3 100644 --- a/zitadel_client/models/v2_password_reset_response.py +++ b/zitadel_client/models/v2_password_reset_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2PasswordResetResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_phone_query.py b/zitadel_client/models/v2_phone_query.py index e33ae1d0..8fcdbf98 100644 --- a/zitadel_client/models/v2_phone_query.py +++ b/zitadel_client/models/v2_phone_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2PhoneQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_prompt.py b/zitadel_client/models/v2_prompt.py index 1064ebc6..cf0cee6c 100644 --- a/zitadel_client/models/v2_prompt.py +++ b/zitadel_client/models/v2_prompt.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,12 +26,12 @@ class V2Prompt(str, Enum): """ allowed enum values """ - PROMPT_UNSPECIFIED = "PROMPT_UNSPECIFIED" - PROMPT_NONE = "PROMPT_NONE" - PROMPT_LOGIN = "PROMPT_LOGIN" - PROMPT_CONSENT = "PROMPT_CONSENT" - PROMPT_SELECT_ACCOUNT = "PROMPT_SELECT_ACCOUNT" - PROMPT_CREATE = "PROMPT_CREATE" + PROMPT_UNSPECIFIED = 'PROMPT_UNSPECIFIED' + PROMPT_NONE = 'PROMPT_NONE' + PROMPT_LOGIN = 'PROMPT_LOGIN' + PROMPT_CONSENT = 'PROMPT_CONSENT' + PROMPT_SELECT_ACCOUNT = 'PROMPT_SELECT_ACCOUNT' + PROMPT_CREATE = 'PROMPT_CREATE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_reactivate_user_response.py b/zitadel_client/models/v2_reactivate_user_response.py index 44dbdc90..6c88efa9 100644 --- a/zitadel_client/models/v2_reactivate_user_response.py +++ b/zitadel_client/models/v2_reactivate_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ReactivateUserResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_redirect_urls.py b/zitadel_client/models/v2_redirect_urls.py index 39ada704..fae351b6 100644 --- a/zitadel_client/models/v2_redirect_urls.py +++ b/zitadel_client/models/v2_redirect_urls.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2RedirectURLs(BaseModel): """ diff --git a/zitadel_client/models/v2_register_passkey_response.py b/zitadel_client/models/v2_register_passkey_response.py index 600fe3e9..f28cc63e 100644 --- a/zitadel_client/models/v2_register_passkey_response.py +++ b/zitadel_client/models/v2_register_passkey_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RegisterPasskeyResponse(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_register_totp_response.py b/zitadel_client/models/v2_register_totp_response.py index 1946e03b..1816aa54 100644 --- a/zitadel_client/models/v2_register_totp_response.py +++ b/zitadel_client/models/v2_register_totp_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RegisterTOTPResponse(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_register_u2_f_response.py b/zitadel_client/models/v2_register_u2_f_response.py index 5e60f05c..4e8350d3 100644 --- a/zitadel_client/models/v2_register_u2_f_response.py +++ b/zitadel_client/models/v2_register_u2_f_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RegisterU2FResponse(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_idp_link_response.py b/zitadel_client/models/v2_remove_idp_link_response.py index 84879f2f..b97e22a8 100644 --- a/zitadel_client/models/v2_remove_idp_link_response.py +++ b/zitadel_client/models/v2_remove_idp_link_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemoveIDPLinkResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_otp_email_response.py b/zitadel_client/models/v2_remove_otp_email_response.py index bcaf7ee4..bc4ad36b 100644 --- a/zitadel_client/models/v2_remove_otp_email_response.py +++ b/zitadel_client/models/v2_remove_otp_email_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemoveOTPEmailResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_otpsms_response.py b/zitadel_client/models/v2_remove_otpsms_response.py index 1113dcb8..8a6b049d 100644 --- a/zitadel_client/models/v2_remove_otpsms_response.py +++ b/zitadel_client/models/v2_remove_otpsms_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemoveOTPSMSResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_passkey_response.py b/zitadel_client/models/v2_remove_passkey_response.py index 7d826e95..0ca0f000 100644 --- a/zitadel_client/models/v2_remove_passkey_response.py +++ b/zitadel_client/models/v2_remove_passkey_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemovePasskeyResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_phone_response.py b/zitadel_client/models/v2_remove_phone_response.py index 6f3f6b3c..93b6d345 100644 --- a/zitadel_client/models/v2_remove_phone_response.py +++ b/zitadel_client/models/v2_remove_phone_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemovePhoneResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_totp_response.py b/zitadel_client/models/v2_remove_totp_response.py index 0b40bf91..6b859c12 100644 --- a/zitadel_client/models/v2_remove_totp_response.py +++ b/zitadel_client/models/v2_remove_totp_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemoveTOTPResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_remove_u2_f_response.py b/zitadel_client/models/v2_remove_u2_f_response.py index d8774dd8..ef8d63f0 100644 --- a/zitadel_client/models/v2_remove_u2_f_response.py +++ b/zitadel_client/models/v2_remove_u2_f_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2RemoveU2FResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_request_challenges.py b/zitadel_client/models/v2_request_challenges.py index 0f82e3c4..4794bfa9 100644 --- a/zitadel_client/models/v2_request_challenges.py +++ b/zitadel_client/models/v2_request_challenges.py @@ -13,21 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.request_challenges_otp_email import RequestChallengesOTPEmail from zitadel_client.models.request_challenges_otpsms import RequestChallengesOTPSMS -from zitadel_client.models.v2_request_challenges_web_auth_n import ( - V2RequestChallengesWebAuthN, -) - +from zitadel_client.models.v2_request_challenges_web_auth_n import V2RequestChallengesWebAuthN +from typing import Optional, Set +from typing_extensions import Self class V2RequestChallenges(BaseModel): """ @@ -82,13 +78,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of web_auth_n if self.web_auth_n: - _dict["webAuthN"] = self.web_auth_n.to_dict() + _dict['webAuthN'] = self.web_auth_n.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_sms if self.otp_sms: - _dict["otpSms"] = self.otp_sms.to_dict() + _dict['otpSms'] = self.otp_sms.to_dict() # override the default output from pydantic by calling `to_dict()` of otp_email if self.otp_email: - _dict["otpEmail"] = self.otp_email.to_dict() + _dict['otpEmail'] = self.otp_email.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_request_challenges_web_auth_n.py b/zitadel_client/models/v2_request_challenges_web_auth_n.py index edf96f38..63eeb8fe 100644 --- a/zitadel_client/models/v2_request_challenges_web_auth_n.py +++ b/zitadel_client/models/v2_request_challenges_web_auth_n.py @@ -13,25 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List +from zitadel_client.models.v2_user_verification_requirement import V2UserVerificationRequirement +from typing import Optional, Set from typing_extensions import Self -from zitadel_client.models.v2_user_verification_requirement import ( - V2UserVerificationRequirement, -) - - class V2RequestChallengesWebAuthN(BaseModel): """ V2RequestChallengesWebAuthN """ # noqa: E501 - domain: StrictStr = Field(description='"Domain on which the session was created. Will be used in the WebAuthN challenge."') + domain: StrictStr = Field(description="\"Domain on which the session was created. Will be used in the WebAuthN challenge.\"") user_verification_requirement: V2UserVerificationRequirement = Field(alias="userVerificationRequirement") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["domain", "userVerificationRequirement"] diff --git a/zitadel_client/models/v2_resend_email_code_response.py b/zitadel_client/models/v2_resend_email_code_response.py index 9060ef5a..ab6ef3ba 100644 --- a/zitadel_client/models/v2_resend_email_code_response.py +++ b/zitadel_client/models/v2_resend_email_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResendEmailCodeResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resend_invite_code_response.py b/zitadel_client/models/v2_resend_invite_code_response.py index 4154f023..c1262bea 100644 --- a/zitadel_client/models/v2_resend_invite_code_response.py +++ b/zitadel_client/models/v2_resend_invite_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResendInviteCodeResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resend_phone_code_response.py b/zitadel_client/models/v2_resend_phone_code_response.py index 3ac1b077..ca7ee0c4 100644 --- a/zitadel_client/models/v2_resend_phone_code_response.py +++ b/zitadel_client/models/v2_resend_phone_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResendPhoneCodeResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_instance_features_response.py b/zitadel_client/models/v2_reset_instance_features_response.py index 9a0d5765..773fca1c 100644 --- a/zitadel_client/models/v2_reset_instance_features_response.py +++ b/zitadel_client/models/v2_reset_instance_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResetInstanceFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_organization_features_response.py b/zitadel_client/models/v2_reset_organization_features_response.py index e34d9a35..e6e574e6 100644 --- a/zitadel_client/models/v2_reset_organization_features_response.py +++ b/zitadel_client/models/v2_reset_organization_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResetOrganizationFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_system_features_response.py b/zitadel_client/models/v2_reset_system_features_response.py index 784a755f..4a921238 100644 --- a/zitadel_client/models/v2_reset_system_features_response.py +++ b/zitadel_client/models/v2_reset_system_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResetSystemFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_reset_user_features_response.py b/zitadel_client/models/v2_reset_user_features_response.py index 4b064125..285d93e1 100644 --- a/zitadel_client/models/v2_reset_user_features_response.py +++ b/zitadel_client/models/v2_reset_user_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2ResetUserFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_resource_owner_type.py b/zitadel_client/models/v2_resource_owner_type.py index efa3f629..381b71cd 100644 --- a/zitadel_client/models/v2_resource_owner_type.py +++ b/zitadel_client/models/v2_resource_owner_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,9 +26,9 @@ class V2ResourceOwnerType(str, Enum): """ allowed enum values """ - RESOURCE_OWNER_TYPE_UNSPECIFIED = "RESOURCE_OWNER_TYPE_UNSPECIFIED" - RESOURCE_OWNER_TYPE_INSTANCE = "RESOURCE_OWNER_TYPE_INSTANCE" - RESOURCE_OWNER_TYPE_ORG = "RESOURCE_OWNER_TYPE_ORG" + RESOURCE_OWNER_TYPE_UNSPECIFIED = 'RESOURCE_OWNER_TYPE_UNSPECIFIED' + RESOURCE_OWNER_TYPE_INSTANCE = 'RESOURCE_OWNER_TYPE_INSTANCE' + RESOURCE_OWNER_TYPE_ORG = 'RESOURCE_OWNER_TYPE_ORG' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py b/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py index e4bbc3b9..3a18f09b 100644 --- a/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py +++ b/zitadel_client/models/v2_retrieve_identity_provider_intent_response.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_information import V2IDPInformation - +from typing import Optional, Set +from typing_extensions import Self class V2RetrieveIdentityProviderIntentResponse(BaseModel): """ @@ -79,10 +77,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_information if self.idp_information: - _dict["idpInformation"] = self.idp_information.to_dict() + _dict['idpInformation'] = self.idp_information.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_saml_binding.py b/zitadel_client/models/v2_saml_binding.py index 5faa8098..10bf1643 100644 --- a/zitadel_client/models/v2_saml_binding.py +++ b/zitadel_client/models/v2_saml_binding.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2SAMLBinding(str, Enum): """ allowed enum values """ - SAML_BINDING_UNSPECIFIED = "SAML_BINDING_UNSPECIFIED" - SAML_BINDING_POST = "SAML_BINDING_POST" - SAML_BINDING_REDIRECT = "SAML_BINDING_REDIRECT" - SAML_BINDING_ARTIFACT = "SAML_BINDING_ARTIFACT" + SAML_BINDING_UNSPECIFIED = 'SAML_BINDING_UNSPECIFIED' + SAML_BINDING_POST = 'SAML_BINDING_POST' + SAML_BINDING_REDIRECT = 'SAML_BINDING_REDIRECT' + SAML_BINDING_ARTIFACT = 'SAML_BINDING_ARTIFACT' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_saml_config.py b/zitadel_client/models/v2_saml_config.py index 077d681a..9db78931 100644 --- a/zitadel_client/models/v2_saml_config.py +++ b/zitadel_client/models/v2_saml_config.py @@ -13,25 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union - -from pydantic import ( - BaseModel, - ConfigDict, - Field, - StrictBool, - StrictStr, - field_validator, -) -from typing_extensions import Annotated, Self +import json +from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr, field_validator +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated from zitadel_client.models.v2_saml_binding import V2SAMLBinding from zitadel_client.models.v2_saml_name_id_format import V2SAMLNameIDFormat - +from typing import Optional, Set +from typing_extensions import Self class V2SAMLConfig(BaseModel): """ @@ -45,7 +37,7 @@ class V2SAMLConfig(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["metadataXml", "binding", "withSignedRequest", "nameIdFormat", "transientMappingAttributeName"] - @field_validator("metadata_xml") + @field_validator('metadata_xml') def metadata_xml_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: diff --git a/zitadel_client/models/v2_saml_name_id_format.py b/zitadel_client/models/v2_saml_name_id_format.py index dd334dcd..d123d91f 100644 --- a/zitadel_client/models/v2_saml_name_id_format.py +++ b/zitadel_client/models/v2_saml_name_id_format.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2SAMLNameIDFormat(str, Enum): """ allowed enum values """ - SAML_NAME_ID_FORMAT_UNSPECIFIED = "SAML_NAME_ID_FORMAT_UNSPECIFIED" - SAML_NAME_ID_FORMAT_EMAIL_ADDRESS = "SAML_NAME_ID_FORMAT_EMAIL_ADDRESS" - SAML_NAME_ID_FORMAT_PERSISTENT = "SAML_NAME_ID_FORMAT_PERSISTENT" - SAML_NAME_ID_FORMAT_TRANSIENT = "SAML_NAME_ID_FORMAT_TRANSIENT" + SAML_NAME_ID_FORMAT_UNSPECIFIED = 'SAML_NAME_ID_FORMAT_UNSPECIFIED' + SAML_NAME_ID_FORMAT_EMAIL_ADDRESS = 'SAML_NAME_ID_FORMAT_EMAIL_ADDRESS' + SAML_NAME_ID_FORMAT_PERSISTENT = 'SAML_NAME_ID_FORMAT_PERSISTENT' + SAML_NAME_ID_FORMAT_TRANSIENT = 'SAML_NAME_ID_FORMAT_TRANSIENT' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_search_query.py b/zitadel_client/models/v2_search_query.py index c339da2a..e0452356 100644 --- a/zitadel_client/models/v2_search_query.py +++ b/zitadel_client/models/v2_search_query.py @@ -13,21 +13,19 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_creation_date_query import V2CreationDateQuery from zitadel_client.models.v2_creator_query import V2CreatorQuery from zitadel_client.models.v2_ids_query import V2IDsQuery from zitadel_client.models.v2_user_agent_query import V2UserAgentQuery from zitadel_client.models.v2_user_id_query import V2UserIDQuery - +from typing import Optional, Set +from typing_extensions import Self class V2SearchQuery(BaseModel): """ @@ -84,19 +82,19 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of ids_query if self.ids_query: - _dict["idsQuery"] = self.ids_query.to_dict() + _dict['idsQuery'] = self.ids_query.to_dict() # override the default output from pydantic by calling `to_dict()` of user_id_query if self.user_id_query: - _dict["userIdQuery"] = self.user_id_query.to_dict() + _dict['userIdQuery'] = self.user_id_query.to_dict() # override the default output from pydantic by calling `to_dict()` of creation_date_query if self.creation_date_query: - _dict["creationDateQuery"] = self.creation_date_query.to_dict() + _dict['creationDateQuery'] = self.creation_date_query.to_dict() # override the default output from pydantic by calling `to_dict()` of creator_query if self.creator_query: - _dict["creatorQuery"] = self.creator_query.to_dict() + _dict['creatorQuery'] = self.creator_query.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent_query if self.user_agent_query: - _dict["userAgentQuery"] = self.user_agent_query.to_dict() + _dict['userAgentQuery'] = self.user_agent_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_search_query1.py b/zitadel_client/models/v2_search_query1.py index bc12b0ac..15dca1db 100644 --- a/zitadel_client/models/v2_search_query1.py +++ b/zitadel_client/models/v2_search_query1.py @@ -13,15 +13,12 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_display_name_query import V2DisplayNameQuery from zitadel_client.models.v2_email_query import V2EmailQuery from zitadel_client.models.v2_first_name_query import V2FirstNameQuery @@ -35,7 +32,8 @@ from zitadel_client.models.v2_state_query import V2StateQuery from zitadel_client.models.v2_type_query import V2TypeQuery from zitadel_client.models.v2_user_name_query import V2UserNameQuery - +from typing import Optional, Set +from typing_extensions import Self class V2SearchQuery1(BaseModel): """ @@ -103,52 +101,52 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of user_name_query if self.user_name_query: - _dict["userNameQuery"] = self.user_name_query.to_dict() + _dict['userNameQuery'] = self.user_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of first_name_query if self.first_name_query: - _dict["firstNameQuery"] = self.first_name_query.to_dict() + _dict['firstNameQuery'] = self.first_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of last_name_query if self.last_name_query: - _dict["lastNameQuery"] = self.last_name_query.to_dict() + _dict['lastNameQuery'] = self.last_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of nick_name_query if self.nick_name_query: - _dict["nickNameQuery"] = self.nick_name_query.to_dict() + _dict['nickNameQuery'] = self.nick_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of display_name_query if self.display_name_query: - _dict["displayNameQuery"] = self.display_name_query.to_dict() + _dict['displayNameQuery'] = self.display_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of email_query if self.email_query: - _dict["emailQuery"] = self.email_query.to_dict() + _dict['emailQuery'] = self.email_query.to_dict() # override the default output from pydantic by calling `to_dict()` of state_query if self.state_query: - _dict["stateQuery"] = self.state_query.to_dict() + _dict['stateQuery'] = self.state_query.to_dict() # override the default output from pydantic by calling `to_dict()` of type_query if self.type_query: - _dict["typeQuery"] = self.type_query.to_dict() + _dict['typeQuery'] = self.type_query.to_dict() # override the default output from pydantic by calling `to_dict()` of login_name_query if self.login_name_query: - _dict["loginNameQuery"] = self.login_name_query.to_dict() + _dict['loginNameQuery'] = self.login_name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of in_user_ids_query if self.in_user_ids_query: - _dict["inUserIdsQuery"] = self.in_user_ids_query.to_dict() + _dict['inUserIdsQuery'] = self.in_user_ids_query.to_dict() # override the default output from pydantic by calling `to_dict()` of or_query if self.or_query: - _dict["orQuery"] = self.or_query.to_dict() + _dict['orQuery'] = self.or_query.to_dict() # override the default output from pydantic by calling `to_dict()` of and_query if self.and_query: - _dict["andQuery"] = self.and_query.to_dict() + _dict['andQuery'] = self.and_query.to_dict() # override the default output from pydantic by calling `to_dict()` of not_query if self.not_query: - _dict["notQuery"] = self.not_query.to_dict() + _dict['notQuery'] = self.not_query.to_dict() # override the default output from pydantic by calling `to_dict()` of in_user_emails_query if self.in_user_emails_query: - _dict["inUserEmailsQuery"] = self.in_user_emails_query.to_dict() + _dict['inUserEmailsQuery'] = self.in_user_emails_query.to_dict() # override the default output from pydantic by calling `to_dict()` of organization_id_query if self.organization_id_query: - _dict["organizationIdQuery"] = self.organization_id_query.to_dict() + _dict['organizationIdQuery'] = self.organization_id_query.to_dict() # override the default output from pydantic by calling `to_dict()` of phone_query if self.phone_query: - _dict["phoneQuery"] = self.phone_query.to_dict() + _dict['phoneQuery'] = self.phone_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): @@ -193,7 +191,6 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: from zitadel_client.models.v2_and_query import V2AndQuery from zitadel_client.models.v2_not_query import V2NotQuery from zitadel_client.models.v2_or_query import V2OrQuery - # TODO: Rewrite to not use raise_errors V2SearchQuery1.model_rebuild(raise_errors=False) diff --git a/zitadel_client/models/v2_second_factor_type.py b/zitadel_client/models/v2_second_factor_type.py index 6aa5ee40..8640c486 100644 --- a/zitadel_client/models/v2_second_factor_type.py +++ b/zitadel_client/models/v2_second_factor_type.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,11 +26,11 @@ class V2SecondFactorType(str, Enum): """ allowed enum values """ - SECOND_FACTOR_TYPE_UNSPECIFIED = "SECOND_FACTOR_TYPE_UNSPECIFIED" - SECOND_FACTOR_TYPE_OTP = "SECOND_FACTOR_TYPE_OTP" - SECOND_FACTOR_TYPE_U2_F = "SECOND_FACTOR_TYPE_U2F" - SECOND_FACTOR_TYPE_OTP_EMAIL = "SECOND_FACTOR_TYPE_OTP_EMAIL" - SECOND_FACTOR_TYPE_OTP_SMS = "SECOND_FACTOR_TYPE_OTP_SMS" + SECOND_FACTOR_TYPE_UNSPECIFIED = 'SECOND_FACTOR_TYPE_UNSPECIFIED' + SECOND_FACTOR_TYPE_OTP = 'SECOND_FACTOR_TYPE_OTP' + SECOND_FACTOR_TYPE_U2_F = 'SECOND_FACTOR_TYPE_U2F' + SECOND_FACTOR_TYPE_OTP_EMAIL = 'SECOND_FACTOR_TYPE_OTP_EMAIL' + SECOND_FACTOR_TYPE_OTP_SMS = 'SECOND_FACTOR_TYPE_OTP_SMS' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_security_settings.py b/zitadel_client/models/v2_security_settings.py index 63c48dd1..e40ef1b1 100644 --- a/zitadel_client/models/v2_security_settings.py +++ b/zitadel_client/models/v2_security_settings.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings - +from typing import Optional, Set +from typing_extensions import Self class V2SecuritySettings(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of embedded_iframe if self.embedded_iframe: - _dict["embeddedIframe"] = self.embedded_iframe.to_dict() + _dict['embeddedIframe'] = self.embedded_iframe.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_send_email_code_response.py b/zitadel_client/models/v2_send_email_code_response.py index c5385810..b8dbeb02 100644 --- a/zitadel_client/models/v2_send_email_code_response.py +++ b/zitadel_client/models/v2_send_email_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SendEmailCodeResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_send_email_verification_code.py b/zitadel_client/models/v2_send_email_verification_code.py index 151087c9..8c7603aa 100644 --- a/zitadel_client/models/v2_send_email_verification_code.py +++ b/zitadel_client/models/v2_send_email_verification_code.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SendEmailVerificationCode(BaseModel): """ diff --git a/zitadel_client/models/v2_send_invite_code.py b/zitadel_client/models/v2_send_invite_code.py index 11a714a2..ac9026df 100644 --- a/zitadel_client/models/v2_send_invite_code.py +++ b/zitadel_client/models/v2_send_invite_code.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SendInviteCode(BaseModel): """ diff --git a/zitadel_client/models/v2_send_passkey_registration_link.py b/zitadel_client/models/v2_send_passkey_registration_link.py index 27dc7391..74c17334 100644 --- a/zitadel_client/models/v2_send_passkey_registration_link.py +++ b/zitadel_client/models/v2_send_passkey_registration_link.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SendPasskeyRegistrationLink(BaseModel): """ diff --git a/zitadel_client/models/v2_send_password_reset_link.py b/zitadel_client/models/v2_send_password_reset_link.py index 3115eb40..d8ad95dc 100644 --- a/zitadel_client/models/v2_send_password_reset_link.py +++ b/zitadel_client/models/v2_send_password_reset_link.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_notification_type import V2NotificationType - +from typing import Optional, Set +from typing_extensions import Self class V2SendPasswordResetLink(BaseModel): """ diff --git a/zitadel_client/models/v2_session.py b/zitadel_client/models/v2_session.py index a40b6c98..0853dcdd 100644 --- a/zitadel_client/models/v2_session.py +++ b/zitadel_client/models/v2_session.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2Session(BaseModel): """ diff --git a/zitadel_client/models/v2_session1.py b/zitadel_client/models/v2_session1.py index a82182c1..a2018d4a 100644 --- a/zitadel_client/models/v2_session1.py +++ b/zitadel_client/models/v2_session1.py @@ -13,32 +13,31 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set, Union - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Annotated, Self +import json +from datetime import datetime +from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated from zitadel_client.models.v2_factors import V2Factors from zitadel_client.models.v2_user_agent import V2UserAgent - +from typing import Optional, Set +from typing_extensions import Self class V2Session1(BaseModel): """ V2Session1 """ # noqa: E501 - id: Optional[StrictStr] = Field(default=None, description='"id of the session"') - creation_date: Optional[datetime] = Field(default=None, description='"time when the session was created"', alias="creationDate") - change_date: Optional[datetime] = Field(default=None, description='"time when the session was last updated"', alias="changeDate") - sequence: Optional[StrictStr] = Field(default=None, description='"sequence of the session"') + id: Optional[StrictStr] = Field(default=None, description="\"id of the session\"") + creation_date: Optional[datetime] = Field(default=None, description="\"time when the session was created\"", alias="creationDate") + change_date: Optional[datetime] = Field(default=None, description="\"time when the session was last updated\"", alias="changeDate") + sequence: Optional[StrictStr] = Field(default=None, description="\"sequence of the session\"") factors: Optional[V2Factors] = None - metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description='"custom key value list"') + metadata: Optional[Dict[str, Union[Annotated[bytes, Field(strict=True)], Annotated[str, Field(strict=True)]]]] = Field(default=None, description="\"custom key value list\"") user_agent: Optional[V2UserAgent] = Field(default=None, alias="userAgent") - expiration_date: Optional[datetime] = Field(default=None, description='"time the session will be automatically invalidated"', alias="expirationDate") + expiration_date: Optional[datetime] = Field(default=None, description="\"time the session will be automatically invalidated\"", alias="expirationDate") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["id", "creationDate", "changeDate", "sequence", "factors", "metadata", "userAgent", "expirationDate"] @@ -85,10 +84,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of factors if self.factors: - _dict["factors"] = self.factors.to_dict() + _dict['factors'] = self.factors.to_dict() # override the default output from pydantic by calling `to_dict()` of user_agent if self.user_agent: - _dict["userAgent"] = self.user_agent.to_dict() + _dict['userAgent'] = self.user_agent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_session_field_name.py b/zitadel_client/models/v2_session_field_name.py index d37f6041..5249886f 100644 --- a/zitadel_client/models/v2_session_field_name.py +++ b/zitadel_client/models/v2_session_field_name.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,8 +26,8 @@ class V2SessionFieldName(str, Enum): """ allowed enum values """ - SESSION_FIELD_NAME_UNSPECIFIED = "SESSION_FIELD_NAME_UNSPECIFIED" - SESSION_FIELD_NAME_CREATION_DATE = "SESSION_FIELD_NAME_CREATION_DATE" + SESSION_FIELD_NAME_UNSPECIFIED = 'SESSION_FIELD_NAME_UNSPECIFIED' + SESSION_FIELD_NAME_CREATION_DATE = 'SESSION_FIELD_NAME_CREATION_DATE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_set_email_response.py b/zitadel_client/models/v2_set_email_response.py index c33c23db..f536c693 100644 --- a/zitadel_client/models/v2_set_email_response.py +++ b/zitadel_client/models/v2_set_email_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetEmailResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_email.py b/zitadel_client/models/v2_set_human_email.py index 54592096..6221709f 100644 --- a/zitadel_client/models/v2_set_human_email.py +++ b/zitadel_client/models/v2_set_human_email.py @@ -13,19 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - -from zitadel_client.models.v2_send_email_verification_code import ( - V2SendEmailVerificationCode, -) - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanEmail(BaseModel): """ @@ -81,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_email1.py b/zitadel_client/models/v2_set_human_email1.py index 9b008966..807ebe56 100644 --- a/zitadel_client/models/v2_set_human_email1.py +++ b/zitadel_client/models/v2_set_human_email1.py @@ -13,19 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - -from zitadel_client.models.v2_send_email_verification_code import ( - V2SendEmailVerificationCode, -) - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from zitadel_client.models.v2_send_email_verification_code import V2SendEmailVerificationCode +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanEmail1(BaseModel): """ @@ -81,7 +78,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of send_code if self.send_code: - _dict["sendCode"] = self.send_code.to_dict() + _dict['sendCode'] = self.send_code.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_human_phone.py b/zitadel_client/models/v2_set_human_phone.py index 572ba097..8c44bdeb 100644 --- a/zitadel_client/models/v2_set_human_phone.py +++ b/zitadel_client/models/v2_set_human_phone.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanPhone(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_phone1.py b/zitadel_client/models/v2_set_human_phone1.py index 7f4aacd5..0df6db8e 100644 --- a/zitadel_client/models/v2_set_human_phone1.py +++ b/zitadel_client/models/v2_set_human_phone1.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanPhone1(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_profile.py b/zitadel_client/models/v2_set_human_profile.py index 242a9cf9..3a55c795 100644 --- a/zitadel_client/models/v2_set_human_profile.py +++ b/zitadel_client/models/v2_set_human_profile.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_gender import V2Gender - +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanProfile(BaseModel): """ diff --git a/zitadel_client/models/v2_set_human_profile1.py b/zitadel_client/models/v2_set_human_profile1.py index 331bce94..6e34c85a 100644 --- a/zitadel_client/models/v2_set_human_profile1.py +++ b/zitadel_client/models/v2_set_human_profile1.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_gender import V2Gender - +from typing import Optional, Set +from typing_extensions import Self class V2SetHumanProfile1(BaseModel): """ diff --git a/zitadel_client/models/v2_set_instance_features_request.py b/zitadel_client/models/v2_set_instance_features_request.py index c7a70c8e..1cd08f7e 100644 --- a/zitadel_client/models/v2_set_instance_features_request.py +++ b/zitadel_client/models/v2_set_instance_features_request.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_login_v2 import V2LoginV2 - +from typing import Optional, Set +from typing_extensions import Self class V2SetInstanceFeaturesRequest(BaseModel): """ @@ -90,7 +88,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict["loginV2"] = self.login_v2.to_dict() + _dict['loginV2'] = self.login_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_instance_features_response.py b/zitadel_client/models/v2_set_instance_features_response.py index 8b5a64a1..d8dcac72 100644 --- a/zitadel_client/models/v2_set_instance_features_response.py +++ b/zitadel_client/models/v2_set_instance_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetInstanceFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_metadata_entry.py b/zitadel_client/models/v2_set_metadata_entry.py index 8e38ddc2..90c6b3d0 100644 --- a/zitadel_client/models/v2_set_metadata_entry.py +++ b/zitadel_client/models/v2_set_metadata_entry.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union +import json from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Union +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SetMetadataEntry(BaseModel): """ @@ -32,7 +32,7 @@ class V2SetMetadataEntry(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["key", "value"] - @field_validator("value") + @field_validator('value') def value_validate_regular_expression(cls, value): """Validates the regular expression""" if not re.match(r"^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?$", value): diff --git a/zitadel_client/models/v2_set_metadata_entry1.py b/zitadel_client/models/v2_set_metadata_entry1.py index 074cf1d7..df03cff0 100644 --- a/zitadel_client/models/v2_set_metadata_entry1.py +++ b/zitadel_client/models/v2_set_metadata_entry1.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union +import json from pydantic import BaseModel, ConfigDict, Field, field_validator -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Union +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2SetMetadataEntry1(BaseModel): """ @@ -32,7 +32,7 @@ class V2SetMetadataEntry1(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["key", "value"] - @field_validator("value") + @field_validator('value') def value_validate_regular_expression(cls, value): """Validates the regular expression""" if not re.match(r"^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?$", value): diff --git a/zitadel_client/models/v2_set_organization_features_response.py b/zitadel_client/models/v2_set_organization_features_response.py index 1327b357..f72c70b7 100644 --- a/zitadel_client/models/v2_set_organization_features_response.py +++ b/zitadel_client/models/v2_set_organization_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetOrganizationFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_password_response.py b/zitadel_client/models/v2_set_password_response.py index 79f03dab..26973e91 100644 --- a/zitadel_client/models/v2_set_password_response.py +++ b/zitadel_client/models/v2_set_password_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetPasswordResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_phone_response.py b/zitadel_client/models/v2_set_phone_response.py index e947694c..1015911b 100644 --- a/zitadel_client/models/v2_set_phone_response.py +++ b/zitadel_client/models/v2_set_phone_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetPhoneResponse(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_security_settings_request.py b/zitadel_client/models/v2_set_security_settings_request.py index 57ae240d..c7d675ab 100644 --- a/zitadel_client/models/v2_set_security_settings_request.py +++ b/zitadel_client/models/v2_set_security_settings_request.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_embedded_iframe_settings import V2EmbeddedIframeSettings - +from typing import Optional, Set +from typing_extensions import Self class V2SetSecuritySettingsRequest(BaseModel): """ @@ -77,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of embedded_iframe if self.embedded_iframe: - _dict["embeddedIframe"] = self.embedded_iframe.to_dict() + _dict['embeddedIframe'] = self.embedded_iframe.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_security_settings_response.py b/zitadel_client/models/v2_set_security_settings_response.py index 16a4940d..29c486da 100644 --- a/zitadel_client/models/v2_set_security_settings_response.py +++ b/zitadel_client/models/v2_set_security_settings_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetSecuritySettingsResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_session_response.py b/zitadel_client/models/v2_set_session_response.py index 19657506..1344df41 100644 --- a/zitadel_client/models/v2_set_session_response.py +++ b/zitadel_client/models/v2_set_session_response.py @@ -13,25 +13,23 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_challenges import V2Challenges from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetSessionResponse(BaseModel): """ V2SetSessionResponse """ # noqa: E501 details: Optional[V2Details] = None - session_token: Optional[StrictStr] = Field(default=None, description='"The current token of the session, which is required for delete session, get session or the request of other resources."', alias="sessionToken") + session_token: Optional[StrictStr] = Field(default=None, description="\"The current token of the session, which is required for delete session, get session or the request of other resources.\"", alias="sessionToken") challenges: Optional[V2Challenges] = None additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "sessionToken", "challenges"] @@ -79,10 +77,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of challenges if self.challenges: - _dict["challenges"] = self.challenges.to_dict() + _dict['challenges'] = self.challenges.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_system_features_request.py b/zitadel_client/models/v2_set_system_features_request.py index 050171f9..b82f30e9 100644 --- a/zitadel_client/models/v2_set_system_features_request.py +++ b/zitadel_client/models/v2_set_system_features_request.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_improved_performance import V2ImprovedPerformance from zitadel_client.models.v2_login_v2 import V2LoginV2 - +from typing import Optional, Set +from typing_extensions import Self class V2SetSystemFeaturesRequest(BaseModel): """ @@ -88,7 +86,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of login_v2 if self.login_v2: - _dict["loginV2"] = self.login_v2.to_dict() + _dict['loginV2'] = self.login_v2.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_system_features_response.py b/zitadel_client/models/v2_set_system_features_response.py index 5ed5ebe0..7be6170e 100644 --- a/zitadel_client/models/v2_set_system_features_response.py +++ b/zitadel_client/models/v2_set_system_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetSystemFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_set_user_features_response.py b/zitadel_client/models/v2_set_user_features_response.py index 246c2252..fc419292 100644 --- a/zitadel_client/models/v2_set_user_features_response.py +++ b/zitadel_client/models/v2_set_user_features_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2SetUserFeaturesResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_source.py b/zitadel_client/models/v2_source.py index fb65ebad..769ad46f 100644 --- a/zitadel_client/models/v2_source.py +++ b/zitadel_client/models/v2_source.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,13 +26,13 @@ class V2Source(str, Enum): """ allowed enum values """ - SOURCE_UNSPECIFIED = "SOURCE_UNSPECIFIED" - SOURCE_SYSTEM = "SOURCE_SYSTEM" - SOURCE_INSTANCE = "SOURCE_INSTANCE" - SOURCE_ORGANIZATION = "SOURCE_ORGANIZATION" - SOURCE_PROJECT = "SOURCE_PROJECT" - SOURCE_APP = "SOURCE_APP" - SOURCE_USER = "SOURCE_USER" + SOURCE_UNSPECIFIED = 'SOURCE_UNSPECIFIED' + SOURCE_SYSTEM = 'SOURCE_SYSTEM' + SOURCE_INSTANCE = 'SOURCE_INSTANCE' + SOURCE_ORGANIZATION = 'SOURCE_ORGANIZATION' + SOURCE_PROJECT = 'SOURCE_PROJECT' + SOURCE_APP = 'SOURCE_APP' + SOURCE_USER = 'SOURCE_USER' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_start_identity_provider_intent_request.py b/zitadel_client/models/v2_start_identity_provider_intent_request.py index 9c4c6f5f..8b96ec6e 100644 --- a/zitadel_client/models/v2_start_identity_provider_intent_request.py +++ b/zitadel_client/models/v2_start_identity_provider_intent_request.py @@ -13,18 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_ldap_credentials import V2LDAPCredentials from zitadel_client.models.v2_redirect_urls import V2RedirectURLs - +from typing import Optional, Set +from typing_extensions import Self class V2StartIdentityProviderIntentRequest(BaseModel): """ @@ -79,10 +78,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of urls if self.urls: - _dict["urls"] = self.urls.to_dict() + _dict['urls'] = self.urls.to_dict() # override the default output from pydantic by calling `to_dict()` of ldap if self.ldap: - _dict["ldap"] = self.ldap.to_dict() + _dict['ldap'] = self.ldap.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_start_identity_provider_intent_response.py b/zitadel_client/models/v2_start_identity_provider_intent_response.py index 9508bb84..26836956 100644 --- a/zitadel_client/models/v2_start_identity_provider_intent_response.py +++ b/zitadel_client/models/v2_start_identity_provider_intent_response.py @@ -13,18 +13,17 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set, Union +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional, Union +from typing_extensions import Annotated from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_idp_intent import V2IDPIntent - +from typing import Optional, Set +from typing_extensions import Self class V2StartIdentityProviderIntentResponse(BaseModel): """ @@ -37,7 +36,7 @@ class V2StartIdentityProviderIntentResponse(BaseModel): additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["details", "authUrl", "idpIntent", "postForm"] - @field_validator("post_form") + @field_validator('post_form') def post_form_validate_regular_expression(cls, value): """Validates the regular expression""" if value is None: @@ -90,10 +89,10 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of idp_intent if self.idp_intent: - _dict["idpIntent"] = self.idp_intent.to_dict() + _dict['idpIntent'] = self.idp_intent.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_state_query.py b/zitadel_client/models/v2_state_query.py index ff8da917..374a5f8a 100644 --- a/zitadel_client/models/v2_state_query.py +++ b/zitadel_client/models/v2_state_query.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List from zitadel_client.models.v2_user_state import V2UserState - +from typing import Optional, Set +from typing_extensions import Self class V2StateQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_text_query_method.py b/zitadel_client/models/v2_text_query_method.py index 1c3fddf8..e5cfecf1 100644 --- a/zitadel_client/models/v2_text_query_method.py +++ b/zitadel_client/models/v2_text_query_method.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,14 +26,14 @@ class V2TextQueryMethod(str, Enum): """ allowed enum values """ - TEXT_QUERY_METHOD_EQUALS = "TEXT_QUERY_METHOD_EQUALS" - TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE = "TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE" - TEXT_QUERY_METHOD_STARTS_WITH = "TEXT_QUERY_METHOD_STARTS_WITH" - TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE = "TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE" - TEXT_QUERY_METHOD_CONTAINS = "TEXT_QUERY_METHOD_CONTAINS" - TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE = "TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE" - TEXT_QUERY_METHOD_ENDS_WITH = "TEXT_QUERY_METHOD_ENDS_WITH" - TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE = "TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE" + TEXT_QUERY_METHOD_EQUALS = 'TEXT_QUERY_METHOD_EQUALS' + TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE = 'TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE' + TEXT_QUERY_METHOD_STARTS_WITH = 'TEXT_QUERY_METHOD_STARTS_WITH' + TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE = 'TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE' + TEXT_QUERY_METHOD_CONTAINS = 'TEXT_QUERY_METHOD_CONTAINS' + TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE = 'TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE' + TEXT_QUERY_METHOD_ENDS_WITH = 'TEXT_QUERY_METHOD_ENDS_WITH' + TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE = 'TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_theme.py b/zitadel_client/models/v2_theme.py index 3d04282c..4fd3651e 100644 --- a/zitadel_client/models/v2_theme.py +++ b/zitadel_client/models/v2_theme.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2Theme(BaseModel): """ V2Theme diff --git a/zitadel_client/models/v2_theme_mode.py b/zitadel_client/models/v2_theme_mode.py index 4dde16ef..01251e34 100644 --- a/zitadel_client/models/v2_theme_mode.py +++ b/zitadel_client/models/v2_theme_mode.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2ThemeMode(str, Enum): """ allowed enum values """ - THEME_MODE_UNSPECIFIED = "THEME_MODE_UNSPECIFIED" - THEME_MODE_AUTO = "THEME_MODE_AUTO" - THEME_MODE_LIGHT = "THEME_MODE_LIGHT" - THEME_MODE_DARK = "THEME_MODE_DARK" + THEME_MODE_UNSPECIFIED = 'THEME_MODE_UNSPECIFIED' + THEME_MODE_AUTO = 'THEME_MODE_AUTO' + THEME_MODE_LIGHT = 'THEME_MODE_LIGHT' + THEME_MODE_DARK = 'THEME_MODE_DARK' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_totp_factor.py b/zitadel_client/models/v2_totp_factor.py index 8d05ea83..0e67dd13 100644 --- a/zitadel_client/models/v2_totp_factor.py +++ b/zitadel_client/models/v2_totp_factor.py @@ -13,22 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2TOTPFactor(BaseModel): """ V2TOTPFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when the Time-based One-Time Password was last checked"', alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description="\"time when the Time-based One-Time Password was last checked\"", alias="verifiedAt") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt"] diff --git a/zitadel_client/models/v2_type_query.py b/zitadel_client/models/v2_type_query.py index 99450e5c..8f0944a2 100644 --- a/zitadel_client/models/v2_type_query.py +++ b/zitadel_client/models/v2_type_query.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List from zitadel_client.models.userv2_type import Userv2Type - +from typing import Optional, Set +from typing_extensions import Self class V2TypeQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_unlock_user_response.py b/zitadel_client/models/v2_unlock_user_response.py index eae205a8..f0f5f937 100644 --- a/zitadel_client/models/v2_unlock_user_response.py +++ b/zitadel_client/models/v2_unlock_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2UnlockUserResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_update_human_user_response.py b/zitadel_client/models/v2_update_human_user_response.py index cd91036b..b3a8730e 100644 --- a/zitadel_client/models/v2_update_human_user_response.py +++ b/zitadel_client/models/v2_update_human_user_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2UpdateHumanUserResponse(BaseModel): """ @@ -78,7 +76,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user.py b/zitadel_client/models/v2_user.py index f876dd34..3521ebbe 100644 --- a/zitadel_client/models/v2_user.py +++ b/zitadel_client/models/v2_user.py @@ -13,20 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_human_user import V2HumanUser from zitadel_client.models.v2_machine_user import V2MachineUser from zitadel_client.models.v2_user_state import V2UserState - +from typing import Optional, Set +from typing_extensions import Self class V2User(BaseModel): """ @@ -86,13 +84,13 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # override the default output from pydantic by calling `to_dict()` of human if self.human: - _dict["human"] = self.human.to_dict() + _dict['human'] = self.human.to_dict() # override the default output from pydantic by calling `to_dict()` of machine if self.machine: - _dict["machine"] = self.machine.to_dict() + _dict['machine'] = self.machine.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_agent.py b/zitadel_client/models/v2_user_agent.py index 28ac499a..7c916654 100644 --- a/zitadel_client/models/v2_user_agent.py +++ b/zitadel_client/models/v2_user_agent.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.user_agent_header_values import UserAgentHeaderValues - +from typing import Optional, Set +from typing_extensions import Self class V2UserAgent(BaseModel): """ @@ -83,7 +81,7 @@ def to_dict(self) -> Dict[str, Any]: for _key_header in self.header: if self.header[_key_header]: _field_dict[_key_header] = self.header[_key_header].to_dict() - _dict["header"] = _field_dict + _dict['header'] = _field_dict # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_agent_query.py b/zitadel_client/models/v2_user_agent_query.py index a13e0513..19c52e23 100644 --- a/zitadel_client/models/v2_user_agent_query.py +++ b/zitadel_client/models/v2_user_agent_query.py @@ -13,15 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated +from typing import Optional, Set +from typing_extensions import Self class V2UserAgentQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_user_factor.py b/zitadel_client/models/v2_user_factor.py index 9b3f777e..b37d957e 100644 --- a/zitadel_client/models/v2_user_factor.py +++ b/zitadel_client/models/v2_user_factor.py @@ -13,26 +13,25 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2UserFactor(BaseModel): """ V2UserFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when the user was last checked"', alias="verifiedAt") - id: Optional[StrictStr] = Field(default=None, description='"id of the checked user"') - login_name: Optional[StrictStr] = Field(default=None, description='"login name of the checked user"', alias="loginName") - display_name: Optional[StrictStr] = Field(default=None, description='"display name of the checked user"', alias="displayName") - organization_id: Optional[StrictStr] = Field(default=None, description='"organization id of the checked user"', alias="organizationId") + verified_at: Optional[datetime] = Field(default=None, description="\"time when the user was last checked\"", alias="verifiedAt") + id: Optional[StrictStr] = Field(default=None, description="\"id of the checked user\"") + login_name: Optional[StrictStr] = Field(default=None, description="\"login name of the checked user\"", alias="loginName") + display_name: Optional[StrictStr] = Field(default=None, description="\"display name of the checked user\"", alias="displayName") + organization_id: Optional[StrictStr] = Field(default=None, description="\"organization id of the checked user\"", alias="organizationId") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt", "id", "loginName", "displayName", "organizationId"] diff --git a/zitadel_client/models/v2_user_field_name.py b/zitadel_client/models/v2_user_field_name.py index f2399db0..9d777b2b 100644 --- a/zitadel_client/models/v2_user_field_name.py +++ b/zitadel_client/models/v2_user_field_name.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,16 +26,16 @@ class V2UserFieldName(str, Enum): """ allowed enum values """ - USER_FIELD_NAME_UNSPECIFIED = "USER_FIELD_NAME_UNSPECIFIED" - USER_FIELD_NAME_USER_NAME = "USER_FIELD_NAME_USER_NAME" - USER_FIELD_NAME_FIRST_NAME = "USER_FIELD_NAME_FIRST_NAME" - USER_FIELD_NAME_LAST_NAME = "USER_FIELD_NAME_LAST_NAME" - USER_FIELD_NAME_NICK_NAME = "USER_FIELD_NAME_NICK_NAME" - USER_FIELD_NAME_DISPLAY_NAME = "USER_FIELD_NAME_DISPLAY_NAME" - USER_FIELD_NAME_EMAIL = "USER_FIELD_NAME_EMAIL" - USER_FIELD_NAME_STATE = "USER_FIELD_NAME_STATE" - USER_FIELD_NAME_TYPE = "USER_FIELD_NAME_TYPE" - USER_FIELD_NAME_CREATION_DATE = "USER_FIELD_NAME_CREATION_DATE" + USER_FIELD_NAME_UNSPECIFIED = 'USER_FIELD_NAME_UNSPECIFIED' + USER_FIELD_NAME_USER_NAME = 'USER_FIELD_NAME_USER_NAME' + USER_FIELD_NAME_FIRST_NAME = 'USER_FIELD_NAME_FIRST_NAME' + USER_FIELD_NAME_LAST_NAME = 'USER_FIELD_NAME_LAST_NAME' + USER_FIELD_NAME_NICK_NAME = 'USER_FIELD_NAME_NICK_NAME' + USER_FIELD_NAME_DISPLAY_NAME = 'USER_FIELD_NAME_DISPLAY_NAME' + USER_FIELD_NAME_EMAIL = 'USER_FIELD_NAME_EMAIL' + USER_FIELD_NAME_STATE = 'USER_FIELD_NAME_STATE' + USER_FIELD_NAME_TYPE = 'USER_FIELD_NAME_TYPE' + USER_FIELD_NAME_CREATION_DATE = 'USER_FIELD_NAME_CREATION_DATE' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_user_id_query.py b/zitadel_client/models/v2_user_id_query.py index 20b61096..4c26b444 100644 --- a/zitadel_client/models/v2_user_id_query.py +++ b/zitadel_client/models/v2_user_id_query.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2UserIDQuery(BaseModel): """ V2UserIDQuery diff --git a/zitadel_client/models/v2_user_name_query.py b/zitadel_client/models/v2_user_name_query.py index 6d1f1b5d..ad80a186 100644 --- a/zitadel_client/models/v2_user_name_query.py +++ b/zitadel_client/models/v2_user_name_query.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_text_query_method import V2TextQueryMethod - +from typing import Optional, Set +from typing_extensions import Self class V2UserNameQuery(BaseModel): """ diff --git a/zitadel_client/models/v2_user_service_set_password_body.py b/zitadel_client/models/v2_user_service_set_password_body.py index d7186019..e3dd9667 100644 --- a/zitadel_client/models/v2_user_service_set_password_body.py +++ b/zitadel_client/models/v2_user_service_set_password_body.py @@ -13,17 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Annotated, Self - +from typing import Any, ClassVar, Dict, List, Optional +from typing_extensions import Annotated from zitadel_client.models.v2_password import V2Password - +from typing import Optional, Set +from typing_extensions import Self class V2UserServiceSetPasswordBody(BaseModel): """ @@ -31,7 +30,7 @@ class V2UserServiceSetPasswordBody(BaseModel): """ # noqa: E501 new_password: Optional[V2Password] = Field(default=None, alias="newPassword") current_password: Annotated[str, Field(min_length=1, strict=True, max_length=200)] = Field(alias="currentPassword") - verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description='"the verification code generated during password reset request"', alias="verificationCode") + verification_code: Annotated[str, Field(min_length=1, strict=True, max_length=20)] = Field(description="\"the verification code generated during password reset request\"", alias="verificationCode") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["newPassword", "currentPassword", "verificationCode"] @@ -78,7 +77,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of new_password if self.new_password: - _dict["newPassword"] = self.new_password.to_dict() + _dict['newPassword'] = self.new_password.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_user_state.py b/zitadel_client/models/v2_user_state.py index 9f9e3fdc..6b97c76f 100644 --- a/zitadel_client/models/v2_user_state.py +++ b/zitadel_client/models/v2_user_state.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,12 +26,12 @@ class V2UserState(str, Enum): """ allowed enum values """ - USER_STATE_UNSPECIFIED = "USER_STATE_UNSPECIFIED" - USER_STATE_ACTIVE = "USER_STATE_ACTIVE" - USER_STATE_INACTIVE = "USER_STATE_INACTIVE" - USER_STATE_DELETED = "USER_STATE_DELETED" - USER_STATE_LOCKED = "USER_STATE_LOCKED" - USER_STATE_INITIAL = "USER_STATE_INITIAL" + USER_STATE_UNSPECIFIED = 'USER_STATE_UNSPECIFIED' + USER_STATE_ACTIVE = 'USER_STATE_ACTIVE' + USER_STATE_INACTIVE = 'USER_STATE_INACTIVE' + USER_STATE_DELETED = 'USER_STATE_DELETED' + USER_STATE_LOCKED = 'USER_STATE_LOCKED' + USER_STATE_INITIAL = 'USER_STATE_INITIAL' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_user_verification_requirement.py b/zitadel_client/models/v2_user_verification_requirement.py index 8dc0fde7..c8256ede 100644 --- a/zitadel_client/models/v2_user_verification_requirement.py +++ b/zitadel_client/models/v2_user_verification_requirement.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,10 +26,10 @@ class V2UserVerificationRequirement(str, Enum): """ allowed enum values """ - USER_VERIFICATION_REQUIREMENT_UNSPECIFIED = "USER_VERIFICATION_REQUIREMENT_UNSPECIFIED" - USER_VERIFICATION_REQUIREMENT_REQUIRED = "USER_VERIFICATION_REQUIREMENT_REQUIRED" - USER_VERIFICATION_REQUIREMENT_PREFERRED = "USER_VERIFICATION_REQUIREMENT_PREFERRED" - USER_VERIFICATION_REQUIREMENT_DISCOURAGED = "USER_VERIFICATION_REQUIREMENT_DISCOURAGED" + USER_VERIFICATION_REQUIREMENT_UNSPECIFIED = 'USER_VERIFICATION_REQUIREMENT_UNSPECIFIED' + USER_VERIFICATION_REQUIREMENT_REQUIRED = 'USER_VERIFICATION_REQUIREMENT_REQUIRED' + USER_VERIFICATION_REQUIREMENT_PREFERRED = 'USER_VERIFICATION_REQUIREMENT_PREFERRED' + USER_VERIFICATION_REQUIREMENT_DISCOURAGED = 'USER_VERIFICATION_REQUIREMENT_DISCOURAGED' @classmethod def from_json(cls, json_str: str) -> Self: diff --git a/zitadel_client/models/v2_verify_email_response.py b/zitadel_client/models/v2_verify_email_response.py index a4ca56d5..a18c9f50 100644 --- a/zitadel_client/models/v2_verify_email_response.py +++ b/zitadel_client/models/v2_verify_email_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyEmailResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_invite_code_response.py b/zitadel_client/models/v2_verify_invite_code_response.py index 6bd6a762..8beccd2c 100644 --- a/zitadel_client/models/v2_verify_invite_code_response.py +++ b/zitadel_client/models/v2_verify_invite_code_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyInviteCodeResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_passkey_registration_response.py b/zitadel_client/models/v2_verify_passkey_registration_response.py index 50b2825c..5760a1c5 100644 --- a/zitadel_client/models/v2_verify_passkey_registration_response.py +++ b/zitadel_client/models/v2_verify_passkey_registration_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyPasskeyRegistrationResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_phone_response.py b/zitadel_client/models/v2_verify_phone_response.py index f768c99f..f990c227 100644 --- a/zitadel_client/models/v2_verify_phone_response.py +++ b/zitadel_client/models/v2_verify_phone_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyPhoneResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_totp_registration_response.py b/zitadel_client/models/v2_verify_totp_registration_response.py index 1d6e777b..23541568 100644 --- a/zitadel_client/models/v2_verify_totp_registration_response.py +++ b/zitadel_client/models/v2_verify_totp_registration_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyTOTPRegistrationResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_verify_u2_f_registration_response.py b/zitadel_client/models/v2_verify_u2_f_registration_response.py index 10779217..34bdcabc 100644 --- a/zitadel_client/models/v2_verify_u2_f_registration_response.py +++ b/zitadel_client/models/v2_verify_u2_f_registration_response.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details - +from typing import Optional, Set +from typing_extensions import Self class V2VerifyU2FRegistrationResponse(BaseModel): """ @@ -76,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/v2_web_auth_n_factor.py b/zitadel_client/models/v2_web_auth_n_factor.py index ba82b123..2c9f9f57 100644 --- a/zitadel_client/models/v2_web_auth_n_factor.py +++ b/zitadel_client/models/v2_web_auth_n_factor.py @@ -13,22 +13,21 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from datetime import datetime -from typing import Any, ClassVar, Dict, List, Optional, Set +import json +from datetime import datetime from pydantic import BaseModel, ConfigDict, Field, StrictBool +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class V2WebAuthNFactor(BaseModel): """ V2WebAuthNFactor """ # noqa: E501 - verified_at: Optional[datetime] = Field(default=None, description='"time when the passkey challenge was last checked"', alias="verifiedAt") + verified_at: Optional[datetime] = Field(default=None, description="\"time when the passkey challenge was last checked\"", alias="verifiedAt") user_verified: Optional[StrictBool] = Field(default=None, alias="userVerified") additional_properties: Dict[str, Any] = {} __properties: ClassVar[List[str]] = ["verifiedAt", "userVerified"] diff --git a/zitadel_client/models/zitadelidpv2_options.py b/zitadel_client/models/zitadelidpv2_options.py index 69035a0a..007f77a3 100644 --- a/zitadel_client/models/zitadelidpv2_options.py +++ b/zitadel_client/models/zitadelidpv2_options.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption - +from typing import Optional, Set +from typing_extensions import Self class Zitadelidpv2Options(BaseModel): """ diff --git a/zitadel_client/models/zitadelidpv2_options1.py b/zitadel_client/models/zitadelidpv2_options1.py index 553f2252..a4c9c562 100644 --- a/zitadel_client/models/zitadelidpv2_options1.py +++ b/zitadel_client/models/zitadelidpv2_options1.py @@ -13,17 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictBool -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_auto_linking_option import V2AutoLinkingOption - +from typing import Optional, Set +from typing_extensions import Self class Zitadelidpv2Options1(BaseModel): """ diff --git a/zitadel_client/models/zitadelobjectv2_organization.py b/zitadel_client/models/zitadelobjectv2_organization.py index 0e587adf..3db9d255 100644 --- a/zitadel_client/models/zitadelobjectv2_organization.py +++ b/zitadel_client/models/zitadelobjectv2_organization.py @@ -13,16 +13,15 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr +from typing import Any, ClassVar, Dict, List, Optional +from typing import Optional, Set from typing_extensions import Self - class Zitadelobjectv2Organization(BaseModel): """ Zitadelobjectv2Organization diff --git a/zitadel_client/models/zitadelorgv2_organization.py b/zitadel_client/models/zitadelorgv2_organization.py index 7a54220e..0fd4d540 100644 --- a/zitadel_client/models/zitadelorgv2_organization.py +++ b/zitadel_client/models/zitadelorgv2_organization.py @@ -13,18 +13,16 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_details import V2Details from zitadel_client.models.v2_organization_state import V2OrganizationState - +from typing import Optional, Set +from typing_extensions import Self class Zitadelorgv2Organization(BaseModel): """ @@ -81,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of details if self.details: - _dict["details"] = self.details.to_dict() + _dict['details'] = self.details.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/zitadelorgv2_search_query.py b/zitadel_client/models/zitadelorgv2_search_query.py index 86003e61..ae35f0c4 100644 --- a/zitadel_client/models/zitadelorgv2_search_query.py +++ b/zitadel_client/models/zitadelorgv2_search_query.py @@ -13,20 +13,18 @@ from __future__ import annotations - -import json import pprint import re # noqa: F401 -from typing import Any, ClassVar, Dict, List, Optional, Set +import json from pydantic import BaseModel, ConfigDict, Field -from typing_extensions import Self - +from typing import Any, ClassVar, Dict, List, Optional from zitadel_client.models.v2_organization_domain_query import V2OrganizationDomainQuery from zitadel_client.models.v2_organization_id_query import V2OrganizationIDQuery from zitadel_client.models.v2_organization_name_query import V2OrganizationNameQuery from zitadel_client.models.v2_organization_state_query import V2OrganizationStateQuery - +from typing import Optional, Set +from typing_extensions import Self class Zitadelorgv2SearchQuery(BaseModel): """ @@ -83,16 +81,16 @@ def to_dict(self) -> Dict[str, Any]: ) # override the default output from pydantic by calling `to_dict()` of name_query if self.name_query: - _dict["nameQuery"] = self.name_query.to_dict() + _dict['nameQuery'] = self.name_query.to_dict() # override the default output from pydantic by calling `to_dict()` of domain_query if self.domain_query: - _dict["domainQuery"] = self.domain_query.to_dict() + _dict['domainQuery'] = self.domain_query.to_dict() # override the default output from pydantic by calling `to_dict()` of state_query if self.state_query: - _dict["stateQuery"] = self.state_query.to_dict() + _dict['stateQuery'] = self.state_query.to_dict() # override the default output from pydantic by calling `to_dict()` of id_query if self.id_query: - _dict["idQuery"] = self.id_query.to_dict() + _dict['idQuery'] = self.id_query.to_dict() # puts key-value pairs in additional_properties in the top level if self.additional_properties is not None: for _key, _value in self.additional_properties.items(): diff --git a/zitadel_client/models/zitadelv1_timestamp_query_method.py b/zitadel_client/models/zitadelv1_timestamp_query_method.py index aa636cd2..7208ab47 100644 --- a/zitadel_client/models/zitadelv1_timestamp_query_method.py +++ b/zitadel_client/models/zitadelv1_timestamp_query_method.py @@ -13,10 +13,8 @@ from __future__ import annotations - import json from enum import Enum - from typing_extensions import Self @@ -28,11 +26,11 @@ class Zitadelv1TimestampQueryMethod(str, Enum): """ allowed enum values """ - TIMESTAMP_QUERY_METHOD_EQUALS = "TIMESTAMP_QUERY_METHOD_EQUALS" - TIMESTAMP_QUERY_METHOD_GREATER = "TIMESTAMP_QUERY_METHOD_GREATER" - TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS = "TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS" - TIMESTAMP_QUERY_METHOD_LESS = "TIMESTAMP_QUERY_METHOD_LESS" - TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS = "TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS" + TIMESTAMP_QUERY_METHOD_EQUALS = 'TIMESTAMP_QUERY_METHOD_EQUALS' + TIMESTAMP_QUERY_METHOD_GREATER = 'TIMESTAMP_QUERY_METHOD_GREATER' + TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS = 'TIMESTAMP_QUERY_METHOD_GREATER_OR_EQUALS' + TIMESTAMP_QUERY_METHOD_LESS = 'TIMESTAMP_QUERY_METHOD_LESS' + TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS = 'TIMESTAMP_QUERY_METHOD_LESS_OR_EQUALS' @classmethod def from_json(cls, json_str: str) -> Self: From 406b422fcba9e45b4b835b0c59b56e894454efd1 Mon Sep 17 00:00:00 2001 From: Mridang Agarwalla Date: Fri, 18 Apr 2025 09:41:06 +0300 Subject: [PATCH 3/6] Introduced formatting and linting for the library --- pyproject.toml | 3 +- ..._client_credentials_authentication_spec.py | 57 +++++-------------- ...rsonal_access_token_authentication_spec.py | 47 ++++----------- ...est_using_web_token_authentication_spec.py | 23 ++------ .../test_client_credentials_authenticator.py | 8 +-- test/auth/test_oauth_authenticator.py | 4 +- .../test_personal_access_authenticator.py | 8 +-- test/auth/test_web_token_authenticator.py | 10 +--- test/test_api_client.py | 10 +--- test/test_zitadel.py | 10 +--- zitadel_client/__init__.py | 2 +- zitadel_client/api_client.py | 50 ++++------------ .../auth/client_credentials_authenticator.py | 16 ++---- zitadel_client/auth/oauth_authenticator.py | 4 +- zitadel_client/auth/open_id.py | 10 ++-- .../auth/web_token_authenticator.py | 20 ++----- zitadel_client/exceptions.py | 20 +++---- zitadel_client/rest.py | 17 ++---- 18 files changed, 87 insertions(+), 232 deletions(-) diff --git a/pyproject.toml b/pyproject.toml index 71d46502..9064ca68 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -92,7 +92,7 @@ disable_error_code = ["import-untyped"] max-line-length = 99 [tool.ruff] -line-length = 88 +line-length = 130 fix = true target-version = "py39" exclude = [ @@ -103,3 +103,4 @@ exclude = [ [tool.ruff.lint] select = ["E", "F", "I", "B", "C", "N", "Q", "S", "T"] extend-select = ["A"] +ignore = ["S101"] # Ignore assert statements diff --git a/spec/sdk_test_using_client_credentials_authentication_spec.py b/spec/sdk_test_using_client_credentials_authentication_spec.py index a697b8c1..65135332 100644 --- a/spec/sdk_test_using_client_credentials_authentication_spec.py +++ b/spec/sdk_test_using_client_credentials_authentication_spec.py @@ -7,6 +7,7 @@ from zitadel_client.auth.client_credentials_authenticator import ( ClientCredentialsAuthenticator, ) +from zitadel_client.exceptions import UnauthorizedException @pytest.fixture @@ -30,24 +31,15 @@ def base_url() -> str | None: @pytest.fixture def user_id(client_id: str, client_secret: str, base_url: str) -> str | None: """Fixture to create a user and return their ID.""" - with zitadel.Zitadel( - ClientCredentialsAuthenticator.builder( - base_url, client_id, client_secret - ).build() - ) as client: + with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, client_id, client_secret).build()) as client: try: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile( - given_name="John", family_name="Doe" - ), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail( - email=f"johndoe{uuid.uuid4().hex}@caos.ag" - ), + profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag"), ) ) - print("User created:", response) return response.user_id except Exception as e: pytest.fail(f"Exception while creating user: {e}") @@ -57,44 +49,25 @@ def test_should_deactivate_and_reactivate_user_with_valid_token( user_id: str, client_id: str, client_secret: str, base_url: str ) -> None: """Test to (de)activate the user with a valid token.""" - with zitadel.Zitadel( - ClientCredentialsAuthenticator.builder( - base_url, client_id, client_secret - ).build() - ) as client: + with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, client_id, client_secret).build()) as client: try: deactivate_response = client.users.deactivate_user(user_id=user_id) - print("User deactivated:", deactivate_response) + assert deactivate_response is not None, "Deactivation response is None" reactivate_response = client.users.reactivate_user(user_id=user_id) - print("User reactivated:", reactivate_response) - # Adjust based on actual response format - # assert reactivate_response["status"] == "success" + assert reactivate_response is not None, "Reactivation response is None" except Exception as e: - pytest.fail( - f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" - ) + pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") -def test_should_not_deactivate_or_reactivate_user_with_invalid_token( - user_id: str, base_url: str -) -> None: +def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, base_url: str) -> None: """Test to attempt (de)activating the user with an invalid token.""" - with zitadel.Zitadel( - ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build() - ) as client: - try: + with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build()) as client: + with pytest.raises(Exception) as excinfo: client.users.deactivate_user(user_id=user_id) - pytest.fail( - "Expected exception when deactivating user with invalid token, but got response." - ) - except Exception as e: - print("Caught expected UnauthorizedException:", e) + #assert "Unauthorized" in str(excinfo.value) - try: + with pytest.raises(Exception) as excinfo: client.users.reactivate_user(user_id=user_id) - pytest.fail( - "Expected exception when reactivating user with invalid token, but got response." - ) - except Exception as e: - print("Caught expected UnauthorizedException:", e) + print(excinfo) + #assert "Unauthorized" in str(excinfo.value), "Expected exception when reactivating user with invalid token, but got response." diff --git a/spec/sdk_test_using_personal_access_token_authentication_spec.py b/spec/sdk_test_using_personal_access_token_authentication_spec.py index b30e4ba3..7c36e337 100644 --- a/spec/sdk_test_using_personal_access_token_authentication_spec.py +++ b/spec/sdk_test_using_personal_access_token_authentication_spec.py @@ -31,60 +31,39 @@ def base_url() -> str | None: @pytest.fixture def user_id(valid_token: str, base_url: str) -> str | None: """Fixture to create a user and return their ID.""" - with zitadel.Zitadel( - PersonalAccessTokenAuthenticator(base_url, valid_token) - ) as client: + with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, valid_token)) as client: try: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile( - given_name="John", family_name="Doe" - ), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail( - email=f"johndoe{uuid.uuid4().hex}@caos.ag" - ), + profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag"), ) ) - print("User created:", response) return response.user_id except Exception as e: pytest.fail(f"Exception while creating user: {e}") -def test_should_deactivate_and_reactivate_user_with_valid_token( - user_id: str, valid_token: str, base_url: str -) -> None: +def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, valid_token: str, base_url: str) -> None: """Test to (de)activate the user with a valid token.""" - with zitadel.Zitadel( - PersonalAccessTokenAuthenticator(base_url, valid_token) - ) as client: + with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, valid_token)) as client: try: deactivate_response = client.users.deactivate_user(user_id=user_id) - print("User deactivated:", deactivate_response) + assert deactivate_response is not None, "Deactivation response is None" reactivate_response = client.users.reactivate_user(user_id=user_id) - print("User reactivated:", reactivate_response) - # Adjust based on actual response format - # assert reactivate_response["status"] == "success" + assert reactivate_response is not None, "Reactivation response is None" except Exception as e: - pytest.fail( - f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" - ) + pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") -def test_should_not_deactivate_or_reactivate_user_with_invalid_token( - user_id: str, invalid_token: str, base_url: str -) -> None: +def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, invalid_token: str, base_url: str) -> None: """Test to attempt (de)activating the user with an invalid token.""" - with zitadel.Zitadel( - PersonalAccessTokenAuthenticator(base_url, invalid_token) - ) as client: + with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, invalid_token)) as client: try: client.users.deactivate_user(user_id=user_id) - pytest.fail( - "Expected exception when deactivating user with invalid token, but got response." - ) + pytest.fail("Expected exception when deactivating user with invalid token, but got response.") except UnauthorizedException as e: print("Caught expected UnauthorizedException:", e) except Exception as e: @@ -92,9 +71,7 @@ def test_should_not_deactivate_or_reactivate_user_with_invalid_token( try: client.users.reactivate_user(user_id=user_id) - pytest.fail( - "Expected exception when reactivating user with invalid token, but got response." - ) + pytest.fail("Expected exception when reactivating user with invalid token, but got response.") except UnauthorizedException as e: print("Caught expected UnauthorizedException:", e) except Exception as e: diff --git a/spec/sdk_test_using_web_token_authentication_spec.py b/spec/sdk_test_using_web_token_authentication_spec.py index f69a915f..c91b09f8 100644 --- a/spec/sdk_test_using_web_token_authentication_spec.py +++ b/spec/sdk_test_using_web_token_authentication_spec.py @@ -32,34 +32,23 @@ def user_id(key_file: str, base_url: str) -> str | None: response = client.users.add_human_user( body=zitadel.models.V2AddHumanUserRequest( username=uuid.uuid4().hex, - profile=zitadel.models.V2SetHumanProfile( - given_name="John", family_name="Doe" - ), # type: ignore[call-arg] - email=zitadel.models.V2SetHumanEmail( - email=f"johndoe{uuid.uuid4().hex}@caos.ag" - ), + profile=zitadel.models.V2SetHumanProfile(given_name="John", family_name="Doe"), # type: ignore[call-arg] + email=zitadel.models.V2SetHumanEmail(email=f"johndoe{uuid.uuid4().hex}@caos.ag"), ) ) - print("User created:", response) return response.user_id except Exception as e: pytest.fail(f"Exception while creating user: {e}") -def test_should_deactivate_and_reactivate_user_with_valid_token( - user_id: str, key_file: str, base_url: str -) -> None: +def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, key_file: str, base_url: str) -> None: """Test to (de)activate the user with a valid token.""" with zitadel.Zitadel(WebTokenAuthenticator.from_json(base_url, key_file)) as client: try: deactivate_response = client.users.deactivate_user(user_id=user_id) - print("User deactivated:", deactivate_response) + assert deactivate_response is not None, "Deactivation response is None" reactivate_response = client.users.reactivate_user(user_id=user_id) - print("User reactivated:", reactivate_response) - # Adjust based on actual response format - # assert reactivate_response["status"] == "success" + assert reactivate_response is not None, "Reactivation response is None" except Exception as e: - pytest.fail( - f"Exception when calling deactivate_user or reactivate_user with valid token: {e}" - ) + pytest.fail(f"Exception when calling deactivate_user or reactivate_user with valid token: {e}") diff --git a/test/auth/test_client_credentials_authenticator.py b/test/auth/test_client_credentials_authenticator.py index b0c2d071..7180ba0c 100644 --- a/test/auth/test_client_credentials_authenticator.py +++ b/test/auth/test_client_credentials_authenticator.py @@ -18,16 +18,12 @@ def test_refresh_token(self) -> None: assert self.oauth_host is not None authenticator = ( - ClientCredentialsAuthenticator.builder( - self.oauth_host, "dummy-client", "dummy-secret" - ) + ClientCredentialsAuthenticator.builder(self.oauth_host, "dummy-client", "dummy-secret") .scopes("openid", "foo") .build() ) - self.assertTrue( - authenticator.get_auth_token(), "Access token should not be empty" - ) + self.assertTrue(authenticator.get_auth_token(), "Access token should not be empty") token = authenticator.refresh_token() self.assertEqual( {"Authorization": "Bearer " + token.access_token}, diff --git a/test/auth/test_oauth_authenticator.py b/test/auth/test_oauth_authenticator.py index e173bd31..397479bd 100644 --- a/test/auth/test_oauth_authenticator.py +++ b/test/auth/test_oauth_authenticator.py @@ -20,9 +20,7 @@ class OAuthAuthenticatorTest(unittest.TestCase): @classmethod def setUpClass(cls) -> None: - cls.mock_oauth2_server = DockerContainer( - "ghcr.io/navikt/mock-oauth2-server:2.1.10" - ).with_exposed_ports(8080) + cls.mock_oauth2_server = DockerContainer("ghcr.io/navikt/mock-oauth2-server:2.1.10").with_exposed_ports(8080) cls.mock_oauth2_server.start() host = cls.mock_oauth2_server.get_container_host_ip() port = cls.mock_oauth2_server.get_exposed_port(8080) diff --git a/test/auth/test_personal_access_authenticator.py b/test/auth/test_personal_access_authenticator.py index 9609b988..595673cd 100644 --- a/test/auth/test_personal_access_authenticator.py +++ b/test/auth/test_personal_access_authenticator.py @@ -7,10 +7,6 @@ class PersonalAccessTokenAuthenticatorTest(unittest.TestCase): def test_returns_expected_headers_and_host(self) -> None: - auth = PersonalAccessTokenAuthenticator( - "https://api.example.com", "my-secret-token" - ) - self.assertEqual( - {"Authorization": "Bearer my-secret-token"}, auth.get_auth_headers() - ) + auth = PersonalAccessTokenAuthenticator("https://api.example.com", "my-secret-token") + self.assertEqual({"Authorization": "Bearer my-secret-token"}, auth.get_auth_headers()) self.assertEqual("https://api.example.com", auth.get_host()) diff --git a/test/auth/test_web_token_authenticator.py b/test/auth/test_web_token_authenticator.py index 6ec27481..2ec9cf38 100644 --- a/test/auth/test_web_token_authenticator.py +++ b/test/auth/test_web_token_authenticator.py @@ -29,16 +29,10 @@ def test_refresh_token_using_builder(self) -> None: assert self.oauth_host is not None authenticator = ( - WebTokenAuthenticator.builder( - self.oauth_host, "dummy-client", private_key_pem - ) - .token_lifetime_seconds(3600) - .build() + WebTokenAuthenticator.builder(self.oauth_host, "dummy-client", private_key_pem).token_lifetime_seconds(3600).build() ) - self.assertTrue( - authenticator.get_auth_token(), "Access token should not be empty" - ) + self.assertTrue(authenticator.get_auth_token(), "Access token should not be empty") token = authenticator.refresh_token() self.assertEqual( {"Authorization": "Bearer " + token.access_token}, diff --git a/test/test_api_client.py b/test/test_api_client.py index 944920bb..d8a1c804 100644 --- a/test/test_api_client.py +++ b/test/test_api_client.py @@ -26,9 +26,7 @@ def setUpClass(cls) -> None: Starts the WireMock Docker container and exposes the required port. Sets up the OAuth server URL. """ - cls.mock_oauth2_server = DockerContainer( - "wiremock/wiremock:3.12.1" - ).with_exposed_ports(8080) + cls.mock_oauth2_server = DockerContainer("wiremock/wiremock:3.12.1").with_exposed_ports(8080) cls.mock_oauth2_server.start() host = cls.mock_oauth2_server.get_container_host_ip() @@ -78,11 +76,7 @@ def test_assert_headers_and_content_type(self) -> None: ) as response: response.read().decode() - api_client = ApiClient( - Configuration( - authenticator=PersonalAccessTokenAuthenticator(self.oauth_host, "mm") - ) - ) + api_client = ApiClient(Configuration(authenticator=PersonalAccessTokenAuthenticator(self.oauth_host, "mm"))) api_response = api_client.call_api( *( diff --git a/test/test_zitadel.py b/test/test_zitadel.py index 0200a895..faecaafa 100644 --- a/test/test_zitadel.py +++ b/test/test_zitadel.py @@ -16,11 +16,9 @@ class ZitadelServicesTest(unittest.TestCase): def test_services_dynamic(self) -> None: expected = set() package = importlib.import_module("zitadel_client.api") - for _, modname, _ in pkgutil.walk_packages( - package.__path__, package.__name__ + "." - ): + for _, modname, _ in pkgutil.walk_packages(package.__path__, package.__name__ + "."): module = importlib.import_module(modname) - for name, obj in inspect.getmembers(module, inspect.isclass): + for _, obj in inspect.getmembers(module, inspect.isclass): if obj.__module__ == modname and obj.__name__.endswith("ServiceApi"): expected.add(obj) zitadel = Zitadel(NoAuthAuthenticator("http://dummy")) @@ -29,8 +27,6 @@ def test_services_dynamic(self) -> None: for attr in dir(zitadel) if not attr.startswith("_") and hasattr(getattr(zitadel, attr), "__class__") - and getattr(zitadel, attr).__class__.__module__.startswith( - "zitadel_client.api" - ) + and getattr(zitadel, attr).__class__.__module__.startswith("zitadel_client.api") } self.assertEqual(expected, actual) diff --git a/zitadel_client/__init__.py b/zitadel_client/__init__.py index e88a14c4..3198153c 100644 --- a/zitadel_client/__init__.py +++ b/zitadel_client/__init__.py @@ -9,6 +9,6 @@ ApiKeyError, ApiTypeError, ApiValueError, - OpenApiException, + OpenApiError, ) from .zitadel import Zitadel diff --git a/zitadel_client/api_client.py b/zitadel_client/api_client.py index a605b861..a2b86c44 100644 --- a/zitadel_client/api_client.py +++ b/zitadel_client/api_client.py @@ -130,9 +130,7 @@ def param_serialize( header_params.update(self.default_headers) if header_params: header_params = self.sanitize_for_serialization(header_params) - header_params = dict( - self.parameters_to_tuples(header_params, collection_formats) - ) + header_params = dict(self.parameters_to_tuples(header_params, collection_formats)) # path parameters if path_params: @@ -140,9 +138,7 @@ def param_serialize( path_params = self.parameters_to_tuples(path_params, collection_formats) for k, v in path_params: # specified safe chars, encode everything - resource_path = resource_path.replace( - "{%s}" % k, quote(str(v), safe=config.safe_chars_for_path_param) - ) + resource_path = resource_path.replace("{%s}" % k, quote(str(v), safe=config.safe_chars_for_path_param)) # post parameters if post_params or files: @@ -224,15 +220,9 @@ def response_deserialize( assert response_data.data is not None, msg response_type = response_types_map.get(str(response_data.status), None) - if ( - not response_type - and isinstance(response_data.status, int) - and 100 <= response_data.status <= 599 - ): + if not response_type and isinstance(response_data.status, int) and 100 <= response_data.status <= 599: # if not found, look for '1XX', '2XX', etc. - response_type = response_types_map.get( - str(response_data.status)[0] + "XX", None - ) + response_type = response_types_map.get(str(response_data.status)[0] + "XX", None) # deserialize response data response_text = None @@ -249,9 +239,7 @@ def response_deserialize( match = re.search(r"charset=([a-zA-Z\-\d]+)[\s;]?", content_type) encoding = match.group(1) if match else "utf-8" response_text = response_data.data.decode(encoding) - return_data = self.deserialize( - response_text, response_type, content_type - ) + return_data = self.deserialize(response_text, response_type, content_type) finally: if not 200 <= response_data.status <= 299: raise ApiException.from_response( @@ -314,14 +302,10 @@ def sanitize_for_serialization(self, obj): else: obj_dict = obj.__dict__ - return { - key: self.sanitize_for_serialization(val) for key, val in obj_dict.items() - } + return {key: self.sanitize_for_serialization(val) for key, val in obj_dict.items()} @no_type_check - def deserialize( - self, response_text: str, response_type: str, content_type: Optional[str] - ): + def deserialize(self, response_text: str, response_type: str, content_type: Optional[str]): """Deserializes response into an object. :param response_text: RESTResponse object to be deserialized. @@ -350,9 +334,7 @@ def deserialize( elif re.match(r"^text\/[a-z.+-]+\s*(;|$)", content_type, re.IGNORECASE): data = response_text else: - raise ApiException( - status=0, reason="Unsupported content type: {0}".format(content_type) - ) + raise ApiException(status=0, reason="Unsupported content type: {0}".format(content_type)) return self.__deserialize(data, response_type) @@ -467,9 +449,7 @@ def parameters_to_url_query(params, collection_formats): delimiter = "|" else: # csv is the default delimiter = "," - new_params.append( - (k, delimiter.join(quote(str(value)) for value in v)) - ) + new_params.append((k, delimiter.join(quote(str(value)) for value in v))) else: new_params.append((k, quote(str(v)))) @@ -608,9 +588,7 @@ def __deserialize_date(string): except ImportError: return string except ValueError: - raise rest.ApiException( - status=0, reason="Failed to parse `{0}` as date object".format(string) - ) + raise rest.ApiException(status=0, reason="Failed to parse `{0}` as date object".format(string)) @no_type_check @staticmethod @@ -644,9 +622,7 @@ def __deserialize_enum(data, klass): try: return klass(data) except ValueError: - raise rest.ApiException( - status=0, reason=("Failed to parse `{0}` as `{1}`".format(data, klass)) - ) + raise rest.ApiException(status=0, reason=("Failed to parse `{0}` as `{1}`".format(data, klass))) @no_type_check @staticmethod @@ -663,6 +639,4 @@ def __deserialize_model(data, klass: Any): @no_type_check @classmethod def get_default(cls): - return ApiClient( - configuration=Configuration(authenticator=NoAuthAuthenticator()) - ) + return ApiClient(configuration=Configuration(authenticator=NoAuthAuthenticator())) diff --git a/zitadel_client/auth/client_credentials_authenticator.py b/zitadel_client/auth/client_credentials_authenticator.py index 45d9dfda..c0325b11 100644 --- a/zitadel_client/auth/client_credentials_authenticator.py +++ b/zitadel_client/auth/client_credentials_authenticator.py @@ -16,9 +16,7 @@ class ClientCredentialsAuthenticator(OAuthAuthenticator): Uses client_id and client_secret to obtain an access token from the OAuth2 token endpoint. """ - def __init__( - self, open_id: OpenId, client_id: str, client_secret: str, auth_scopes: Set[str] - ): + def __init__(self, open_id: OpenId, client_id: str, client_secret: str, auth_scopes: Set[str]): """ Constructs a ClientCredentialsAuthenticator. @@ -46,9 +44,7 @@ def get_grant(self) -> Dict[str, str]: return {"grant_type": "client_credentials"} @staticmethod - def builder( - host: str, client_id: str, client_secret: str - ) -> "ClientCredentialsAuthenticatorBuilder": + def builder(host: str, client_id: str, client_secret: str) -> "ClientCredentialsAuthenticatorBuilder": """ Returns a builder for constructing a ClientCredentialsAuthenticator. @@ -60,9 +56,7 @@ def builder( return ClientCredentialsAuthenticatorBuilder(host, client_id, client_secret) -class ClientCredentialsAuthenticatorBuilder( - OAuthAuthenticatorBuilder["ClientCredentialsAuthenticatorBuilder"] -): +class ClientCredentialsAuthenticatorBuilder(OAuthAuthenticatorBuilder["ClientCredentialsAuthenticatorBuilder"]): """ Builder class for constructing ClientCredentialsAuthenticator instances. @@ -88,6 +82,4 @@ def build(self) -> ClientCredentialsAuthenticator: :return: A configured ClientCredentialsAuthenticator. """ - return ClientCredentialsAuthenticator( - self.open_id, self.client_id, self.client_secret, self.auth_scopes - ) + return ClientCredentialsAuthenticator(self.open_id, self.client_id, self.client_secret, self.auth_scopes) diff --git a/zitadel_client/auth/oauth_authenticator.py b/zitadel_client/auth/oauth_authenticator.py index ea6f76dd..eb413a1f 100644 --- a/zitadel_client/auth/oauth_authenticator.py +++ b/zitadel_client/auth/oauth_authenticator.py @@ -64,9 +64,7 @@ def refresh_token(self) -> Token: :return: A new Token. """ try: - token_response = self.oauth_session.fetch_token( - url=(self.open_id.get_token_endpoint()), **(self.get_grant()) - ) + token_response = self.oauth_session.fetch_token(url=(self.open_id.get_token_endpoint()), **(self.get_grant())) access_token = token_response["access_token"] expires_in = token_response.get("expires_in", 3600) expires_at = datetime.now(timezone.utc) + timedelta(seconds=expires_in) diff --git a/zitadel_client/auth/open_id.py b/zitadel_client/auth/open_id.py index 02764878..365d50a6 100644 --- a/zitadel_client/auth/open_id.py +++ b/zitadel_client/auth/open_id.py @@ -26,14 +26,12 @@ def __init__(self, hostname: str): try: with urllib.request.urlopen(well_known_url) as response: if response.status != 200: - raise Exception( - f"Failed to fetch OpenID configuration: HTTP {response.status}" - ) + raise Exception(f"Failed to fetch OpenID configuration: HTTP {response.status}") config = json.loads(response.read().decode("utf-8")) except urllib.error.URLError as e: - raise Exception(f"URL error occurred: {e}") - except json.JSONDecodeError: - raise Exception("Failed to decode JSON response") + raise Exception(f"URL error occurred: {e}") from e + except json.JSONDecodeError as e: + raise Exception("Failed to decode JSON response") from e token_endpoint = config.get("token_endpoint") if not token_endpoint: diff --git a/zitadel_client/auth/web_token_authenticator.py b/zitadel_client/auth/web_token_authenticator.py index 2f896782..311c0a1f 100644 --- a/zitadel_client/auth/web_token_authenticator.py +++ b/zitadel_client/auth/web_token_authenticator.py @@ -115,20 +115,12 @@ def from_json(cls, host: str, json_path: str) -> "WebTokenAuthenticator": private_key = config.get("key") key_id = config.get("keyId") if not user_id or not key_id or not private_key: - raise Exception( - "Missing required keys 'userId', 'key_id' or 'key' in JSON file." - ) - - return ( - (WebTokenAuthenticator.builder(host, user_id, private_key)) - .key_identifier(key_id) - .build() - ) + raise Exception("Missing required keys 'userId', 'key_id' or 'key' in JSON file.") + + return (WebTokenAuthenticator.builder(host, user_id, private_key)).key_identifier(key_id).build() @staticmethod - def builder( - host: str, user_id: str, private_key: str - ) -> "WebTokenAuthenticatorBuilder": + def builder(host: str, user_id: str, private_key: str) -> "WebTokenAuthenticatorBuilder": """ Returns a builder for constructing a JWTAuthenticator. @@ -140,9 +132,7 @@ def builder( return WebTokenAuthenticatorBuilder(host, user_id, user_id, host, private_key) -class WebTokenAuthenticatorBuilder( - OAuthAuthenticatorBuilder["WebTokenAuthenticatorBuilder"] -): +class WebTokenAuthenticatorBuilder(OAuthAuthenticatorBuilder["WebTokenAuthenticatorBuilder"]): """ Builder for JWTAuthenticator. diff --git a/zitadel_client/exceptions.py b/zitadel_client/exceptions.py index 68b6babe..274bd357 100644 --- a/zitadel_client/exceptions.py +++ b/zitadel_client/exceptions.py @@ -5,11 +5,11 @@ import zitadel_client.rest_response -class OpenApiException(Exception): - """The base exception class for all OpenAPIExceptions""" +class OpenApiError(Exception): + """The base exception class for all OpenApiErrors""" -class ApiTypeError(OpenApiException, TypeError): +class ApiTypeError(OpenApiError, TypeError): def __init__( self, msg: str, @@ -43,7 +43,7 @@ def __init__( super(ApiTypeError, self).__init__(full_msg) -class ApiValueError(OpenApiException, ValueError): +class ApiValueError(OpenApiError, ValueError): def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: """ Args: @@ -61,7 +61,7 @@ def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: super(ApiValueError, self).__init__(full_msg) -class ApiAttributeError(OpenApiException, AttributeError): +class ApiAttributeError(OpenApiError, AttributeError): def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: """ Raised when an attribute reference or assignment fails. @@ -80,7 +80,7 @@ def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: super(ApiAttributeError, self).__init__(full_msg) -class ApiKeyError(OpenApiException, KeyError): +class ApiKeyError(OpenApiError, KeyError): def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: """ Args: @@ -97,7 +97,7 @@ def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: super(ApiKeyError, self).__init__(full_msg) -class ApiException(OpenApiException): +class ApiException(OpenApiError): def __init__( self, status: Optional[int] = None, @@ -121,7 +121,7 @@ def __init__( if self.body is None and http_resp.data is not None: try: self.body = http_resp.data.decode("utf-8") - except Exception: + except Exception: # noqa: S110 pass self.headers = http_resp.getheaders() @@ -150,9 +150,7 @@ def from_response( raise ConflictException(http_resp=http_resp, body=body, data=data) if http_resp.status == 422: - raise UnprocessableEntityException( - http_resp=http_resp, body=body, data=data - ) + raise UnprocessableEntityException(http_resp=http_resp, body=body, data=data) if 500 <= http_resp.status <= 599: raise ServiceException(http_resp=http_resp, body=body, data=data) diff --git a/zitadel_client/rest.py b/zitadel_client/rest.py index da220e68..feb7c596 100644 --- a/zitadel_client/rest.py +++ b/zitadel_client/rest.py @@ -79,9 +79,7 @@ def request( assert method in ["GET", "HEAD", "DELETE", "POST", "PUT", "PATCH", "OPTIONS"] if post_params and body: - raise ApiValueError( - "body parameter cannot be used with post_params parameter." - ) + raise ApiValueError("body parameter cannot be used with post_params parameter.") post_params = post_params or {} headers = headers or {} @@ -91,9 +89,7 @@ def request( if isinstance(_request_timeout, (int, float)): timeout = urllib3.Timeout(total=_request_timeout) elif isinstance(_request_timeout, tuple) and len(_request_timeout) == 2: - timeout = urllib3.Timeout( - connect=_request_timeout[0], read=_request_timeout[1] - ) + timeout = urllib3.Timeout(connect=_request_timeout[0], read=_request_timeout[1]) try: # For `POST`, `PUT`, `PATCH`, `OPTIONS`, `DELETE` @@ -128,10 +124,7 @@ def request( # overwritten. del headers["Content-Type"] # Ensures that dict objects are serialized - post_params = [ - (a, json.dumps(b)) if isinstance(b, dict) else (a, b) - for a, b in post_params - ] + post_params = [(a, json.dumps(b)) if isinstance(b, dict) else (a, b) for a, b in post_params] r = self.pool_manager.request( method, url, @@ -153,9 +146,7 @@ def request( headers=headers, preload_content=False, ) - elif headers["Content-Type"].startswith("text/") and isinstance( - body, bool - ): + elif headers["Content-Type"].startswith("text/") and isinstance(body, bool): request_body = "true" if body else "false" r = self.pool_manager.request( method, From e2892d38c935c9b5a40f87f28836e6f40abc9788 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Fri, 18 Apr 2025 06:41:38 +0000 Subject: [PATCH 4/6] style: Apply automated code formatting [skip ci] --- spec/sdk_test_using_client_credentials_authentication_spec.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/spec/sdk_test_using_client_credentials_authentication_spec.py b/spec/sdk_test_using_client_credentials_authentication_spec.py index 65135332..17845728 100644 --- a/spec/sdk_test_using_client_credentials_authentication_spec.py +++ b/spec/sdk_test_using_client_credentials_authentication_spec.py @@ -65,9 +65,9 @@ def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: st with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build()) as client: with pytest.raises(Exception) as excinfo: client.users.deactivate_user(user_id=user_id) - #assert "Unauthorized" in str(excinfo.value) + # assert "Unauthorized" in str(excinfo.value) with pytest.raises(Exception) as excinfo: client.users.reactivate_user(user_id=user_id) print(excinfo) - #assert "Unauthorized" in str(excinfo.value), "Expected exception when reactivating user with invalid token, but got response." + # assert "Unauthorized" in str(excinfo.value), "Expected exception when reactivating user with invalid token, but got response." From 731177f310718d0dc32561483e595f3fe12c5a77 Mon Sep 17 00:00:00 2001 From: Mridang Agarwalla Date: Fri, 18 Apr 2025 10:28:42 +0300 Subject: [PATCH 5/6] Introduced formatting and linting for the library --- ..._client_credentials_authentication_spec.py | 8 ++---- ...rsonal_access_token_authentication_spec.py | 14 ++--------- test/test_api_client.py | 7 +++--- zitadel_client/__init__.py | 20 +++++++-------- zitadel_client/api_client.py | 25 ++++++++----------- zitadel_client/auth/open_id.py | 5 +++- zitadel_client/configuration.py | 10 +++++++- zitadel_client/exceptions.py | 2 +- zitadel_client/rest.py | 4 +-- 9 files changed, 45 insertions(+), 50 deletions(-) diff --git a/spec/sdk_test_using_client_credentials_authentication_spec.py b/spec/sdk_test_using_client_credentials_authentication_spec.py index 65135332..7f9f5329 100644 --- a/spec/sdk_test_using_client_credentials_authentication_spec.py +++ b/spec/sdk_test_using_client_credentials_authentication_spec.py @@ -7,7 +7,6 @@ from zitadel_client.auth.client_credentials_authenticator import ( ClientCredentialsAuthenticator, ) -from zitadel_client.exceptions import UnauthorizedException @pytest.fixture @@ -63,11 +62,8 @@ def test_should_deactivate_and_reactivate_user_with_valid_token( def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, base_url: str) -> None: """Test to attempt (de)activating the user with an invalid token.""" with zitadel.Zitadel(ClientCredentialsAuthenticator.builder(base_url, "id", "secret").build()) as client: - with pytest.raises(Exception) as excinfo: + with pytest.raises(Exception, match="Failed to refresh token: invalid_client: client not found"): client.users.deactivate_user(user_id=user_id) - #assert "Unauthorized" in str(excinfo.value) - with pytest.raises(Exception) as excinfo: + with pytest.raises(Exception, match="Failed to refresh token: invalid_client: client not found"): client.users.reactivate_user(user_id=user_id) - print(excinfo) - #assert "Unauthorized" in str(excinfo.value), "Expected exception when reactivating user with invalid token, but got response." diff --git a/spec/sdk_test_using_personal_access_token_authentication_spec.py b/spec/sdk_test_using_personal_access_token_authentication_spec.py index 7c36e337..a7bf243b 100644 --- a/spec/sdk_test_using_personal_access_token_authentication_spec.py +++ b/spec/sdk_test_using_personal_access_token_authentication_spec.py @@ -61,18 +61,8 @@ def test_should_deactivate_and_reactivate_user_with_valid_token(user_id: str, va def test_should_not_deactivate_or_reactivate_user_with_invalid_token(user_id: str, invalid_token: str, base_url: str) -> None: """Test to attempt (de)activating the user with an invalid token.""" with zitadel.Zitadel(PersonalAccessTokenAuthenticator(base_url, invalid_token)) as client: - try: + with pytest.raises(UnauthorizedException): client.users.deactivate_user(user_id=user_id) - pytest.fail("Expected exception when deactivating user with invalid token, but got response.") - except UnauthorizedException as e: - print("Caught expected UnauthorizedException:", e) - except Exception as e: - pytest.fail(f"Invalid exception when calling the function: {e}") - try: + with pytest.raises(UnauthorizedException): client.users.reactivate_user(user_id=user_id) - pytest.fail("Expected exception when reactivating user with invalid token, but got response.") - except UnauthorizedException as e: - print("Caught expected UnauthorizedException:", e) - except Exception as e: - pytest.fail(f"Invalid exception when calling the function: {e}") diff --git a/test/test_api_client.py b/test/test_api_client.py index d8a1c804..557abda2 100644 --- a/test/test_api_client.py +++ b/test/test_api_client.py @@ -48,8 +48,8 @@ def test_assert_headers_and_content_type(self) -> None: """ time.sleep(20) - with urllib.request.urlopen( - urllib.request.Request( + with urllib.request.urlopen( # noqa S310 allow all URL schemes + urllib.request.Request( # noqa S310 allow all URL schemes self.oauth_host + "/__admin/mappings", data=json.dumps( { @@ -59,7 +59,8 @@ def test_assert_headers_and_content_type(self) -> None: "headers": { "Authorization": {"equalTo": "Bearer mm"}, "User-Agent": { - "matches": "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" + "matches": + "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" }, }, }, diff --git a/zitadel_client/__init__.py b/zitadel_client/__init__.py index 3198153c..fbff712e 100644 --- a/zitadel_client/__init__.py +++ b/zitadel_client/__init__.py @@ -1,14 +1,14 @@ __version__ = "0.0.1" -from .api_client import ApiClient -from .api_response import ApiResponse -from .configuration import Configuration +from .api_client import ApiClient # noqa F401 +from .api_response import ApiResponse # noqa F401 +from .configuration import Configuration # noqa F401 from .exceptions import ( - ApiAttributeError, - ApiException, - ApiKeyError, - ApiTypeError, - ApiValueError, - OpenApiError, + ApiAttributeError, # noqa F401 + ApiException, # noqa F401 + ApiKeyError, # noqa F401 + ApiTypeError, # noqa F401 + ApiValueError, # noqa F401 + OpenApiError, # noqa F401 ) -from .zitadel import Zitadel +from .zitadel import Zitadel # noqa F401 diff --git a/zitadel_client/api_client.py b/zitadel_client/api_client.py index a2b86c44..b938cfd7 100644 --- a/zitadel_client/api_client.py +++ b/zitadel_client/api_client.py @@ -256,7 +256,7 @@ def response_deserialize( ) @no_type_check - def sanitize_for_serialization(self, obj): + def sanitize_for_serialization(self, obj): # noqa C901 too complex """Builds a JSON POST object. If obj is None, return None. @@ -340,7 +340,7 @@ def deserialize(self, response_text: str, response_type: str, content_type: Opti @no_type_check @staticmethod - def __deserialize(data, klass): + def __deserialize(data, klass): # noqa C901 too complex """Deserializes dict, list, str into an object. :param data: dict, list or str. @@ -372,7 +372,7 @@ def __deserialize(data, klass): if klass in ApiClient.PRIMITIVE_TYPES: return ApiClient.__deserialize_primitive(data, klass) - elif klass == object: + elif klass is object: return ApiClient.__deserialize_object(data) elif klass == datetime.date: return ApiClient.__deserialize_date(data) @@ -418,7 +418,7 @@ def parameters_to_tuples(params, collection_formats): @no_type_check @staticmethod - def parameters_to_url_query(params, collection_formats): + def parameters_to_url_query(params, collection_formats): # noqa C901 too complex """Get parameters as list of tuples, formatting collections. :param params: Parameters as dict or list of two-tuples @@ -483,7 +483,7 @@ def files_parameters( else: raise ValueError("Unsupported file value") mimetype = mimetypes.guess_type(filename)[0] or "application/octet-stream" - params.append(tuple([k, tuple([filename, filedata, mimetype])])) + params.append((k, (filename, filedata, mimetype))) return params @staticmethod @@ -587,8 +587,8 @@ def __deserialize_date(string): return parse(string).date() except ImportError: return string - except ValueError: - raise rest.ApiException(status=0, reason="Failed to parse `{0}` as date object".format(string)) + except ValueError as err: + raise rest.ApiException(status=0, reason="Failed to parse `{0}` as date object".format(string)) from err @no_type_check @staticmethod @@ -604,11 +604,8 @@ def __deserialize_datetime(string): return parse(string) except ImportError: return string - except ValueError: - raise rest.ApiException( - status=0, - reason=("Failed to parse `{0}` as datetime object".format(string)), - ) + except ValueError as err: + raise rest.ApiException(status=0,reason=("Failed to parse `{0}` as datetime object".format(string))) from err @no_type_check @staticmethod @@ -621,8 +618,8 @@ def __deserialize_enum(data, klass): """ try: return klass(data) - except ValueError: - raise rest.ApiException(status=0, reason=("Failed to parse `{0}` as `{1}`".format(data, klass))) + except ValueError as err: + raise rest.ApiException(status=0, reason=("Failed to parse `{0}` as `{1}`".format(data, klass))) from err @no_type_check @staticmethod diff --git a/zitadel_client/auth/open_id.py b/zitadel_client/auth/open_id.py index 365d50a6..79c23131 100644 --- a/zitadel_client/auth/open_id.py +++ b/zitadel_client/auth/open_id.py @@ -24,7 +24,10 @@ def __init__(self, hostname: str): well_known_url = self.build_well_known_url(hostname) try: - with urllib.request.urlopen(well_known_url) as response: + if not well_known_url.lower().startswith(("http://", "https://")): + raise ValueError("Invalid URL scheme. Only 'http' and 'https' are allowed.") + + with urllib.request.urlopen(well_known_url) as response: # noqa S310 if response.status != 200: raise Exception(f"Failed to fetch OpenID configuration: HTTP {response.status}") config = json.loads(response.read().decode("utf-8")) diff --git a/zitadel_client/configuration.py b/zitadel_client/configuration.py index 94200594..203b1894 100644 --- a/zitadel_client/configuration.py +++ b/zitadel_client/configuration.py @@ -16,7 +16,15 @@ class Configuration: """This class contains various settings of the API client.""" - USER_AGENT = f"zitadel-client/{Version.VERSION} (lang=python; lang_version={platform.python_version()}; os={platform.system()}; arch={platform.machine()})".lower() + USER_AGENT = " ".join([ + f"zitadel-client/{Version.VERSION}", + f"({'; '.join([ + 'lang=python', + f'lang_version={platform.python_version()}', + f'os={platform.system()}', + f'arch={platform.machine()}' + ])})" + ]).lower() def __init__( self, diff --git a/zitadel_client/exceptions.py b/zitadel_client/exceptions.py index 274bd357..6002b42b 100644 --- a/zitadel_client/exceptions.py +++ b/zitadel_client/exceptions.py @@ -97,7 +97,7 @@ def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: super(ApiKeyError, self).__init__(full_msg) -class ApiException(OpenApiError): +class ApiException(OpenApiError): # noqa N818 should be named with an Error suffix later def __init__( self, status: Optional[int] = None, diff --git a/zitadel_client/rest.py b/zitadel_client/rest.py index feb7c596..3e48b53b 100644 --- a/zitadel_client/rest.py +++ b/zitadel_client/rest.py @@ -52,7 +52,7 @@ def __init__(self, configuration) -> None: # type: ignore self.pool_manager: urllib3.PoolManager self.pool_manager = urllib3.PoolManager(**pool_args) - def request( + def request( # noqa C901 too complex self, method: str, url: str, @@ -174,6 +174,6 @@ def request( ) except urllib3.exceptions.SSLError as e: msg = "\n".join([type(e).__name__, str(e)]) - raise ApiException(status=0, reason=msg) + raise ApiException(status=0, reason=msg) from e return RESTResponse(r) From 156688aec143b8620ca46dfe510946558dd6fd51 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Fri, 18 Apr 2025 07:31:16 +0000 Subject: [PATCH 6/6] style: Apply automated code formatting [skip ci] --- test/test_api_client.py | 7 +++---- zitadel_client/__init__.py | 20 ++++++++++---------- zitadel_client/api_client.py | 10 +++++----- zitadel_client/auth/open_id.py | 2 +- zitadel_client/configuration.py | 24 +++++++++++++++--------- zitadel_client/exceptions.py | 2 +- zitadel_client/rest.py | 2 +- 7 files changed, 36 insertions(+), 31 deletions(-) diff --git a/test/test_api_client.py b/test/test_api_client.py index 557abda2..66a5d8ac 100644 --- a/test/test_api_client.py +++ b/test/test_api_client.py @@ -48,8 +48,8 @@ def test_assert_headers_and_content_type(self) -> None: """ time.sleep(20) - with urllib.request.urlopen( # noqa S310 allow all URL schemes - urllib.request.Request( # noqa S310 allow all URL schemes + with urllib.request.urlopen( # noqa S310 allow all URL schemes + urllib.request.Request( # noqa S310 allow all URL schemes self.oauth_host + "/__admin/mappings", data=json.dumps( { @@ -59,8 +59,7 @@ def test_assert_headers_and_content_type(self) -> None: "headers": { "Authorization": {"equalTo": "Bearer mm"}, "User-Agent": { - "matches": - "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" + "matches": "^zitadel-client/0\\.0\\.0 \\(lang=python; lang_version=[^;]+; os=[^;]+; arch=[^;]+\\)$" }, }, }, diff --git a/zitadel_client/__init__.py b/zitadel_client/__init__.py index fbff712e..86922053 100644 --- a/zitadel_client/__init__.py +++ b/zitadel_client/__init__.py @@ -1,14 +1,14 @@ __version__ = "0.0.1" -from .api_client import ApiClient # noqa F401 -from .api_response import ApiResponse # noqa F401 -from .configuration import Configuration # noqa F401 +from .api_client import ApiClient # noqa F401 +from .api_response import ApiResponse # noqa F401 +from .configuration import Configuration # noqa F401 from .exceptions import ( - ApiAttributeError, # noqa F401 - ApiException, # noqa F401 - ApiKeyError, # noqa F401 - ApiTypeError, # noqa F401 - ApiValueError, # noqa F401 - OpenApiError, # noqa F401 + ApiAttributeError, # noqa F401 + ApiException, # noqa F401 + ApiKeyError, # noqa F401 + ApiTypeError, # noqa F401 + ApiValueError, # noqa F401 + OpenApiError, # noqa F401 ) -from .zitadel import Zitadel # noqa F401 +from .zitadel import Zitadel # noqa F401 diff --git a/zitadel_client/api_client.py b/zitadel_client/api_client.py index b938cfd7..ea33b4b1 100644 --- a/zitadel_client/api_client.py +++ b/zitadel_client/api_client.py @@ -256,7 +256,7 @@ def response_deserialize( ) @no_type_check - def sanitize_for_serialization(self, obj): # noqa C901 too complex + def sanitize_for_serialization(self, obj): # noqa C901 too complex """Builds a JSON POST object. If obj is None, return None. @@ -340,7 +340,7 @@ def deserialize(self, response_text: str, response_type: str, content_type: Opti @no_type_check @staticmethod - def __deserialize(data, klass): # noqa C901 too complex + def __deserialize(data, klass): # noqa C901 too complex """Deserializes dict, list, str into an object. :param data: dict, list or str. @@ -418,7 +418,7 @@ def parameters_to_tuples(params, collection_formats): @no_type_check @staticmethod - def parameters_to_url_query(params, collection_formats): # noqa C901 too complex + def parameters_to_url_query(params, collection_formats): # noqa C901 too complex """Get parameters as list of tuples, formatting collections. :param params: Parameters as dict or list of two-tuples @@ -588,7 +588,7 @@ def __deserialize_date(string): except ImportError: return string except ValueError as err: - raise rest.ApiException(status=0, reason="Failed to parse `{0}` as date object".format(string)) from err + raise rest.ApiException(status=0, reason="Failed to parse `{0}` as date object".format(string)) from err @no_type_check @staticmethod @@ -605,7 +605,7 @@ def __deserialize_datetime(string): except ImportError: return string except ValueError as err: - raise rest.ApiException(status=0,reason=("Failed to parse `{0}` as datetime object".format(string))) from err + raise rest.ApiException(status=0, reason=("Failed to parse `{0}` as datetime object".format(string))) from err @no_type_check @staticmethod diff --git a/zitadel_client/auth/open_id.py b/zitadel_client/auth/open_id.py index 79c23131..8be90837 100644 --- a/zitadel_client/auth/open_id.py +++ b/zitadel_client/auth/open_id.py @@ -27,7 +27,7 @@ def __init__(self, hostname: str): if not well_known_url.lower().startswith(("http://", "https://")): raise ValueError("Invalid URL scheme. Only 'http' and 'https' are allowed.") - with urllib.request.urlopen(well_known_url) as response: # noqa S310 + with urllib.request.urlopen(well_known_url) as response: # noqa S310 if response.status != 200: raise Exception(f"Failed to fetch OpenID configuration: HTTP {response.status}") config = json.loads(response.read().decode("utf-8")) diff --git a/zitadel_client/configuration.py b/zitadel_client/configuration.py index 203b1894..bb6c0c5a 100644 --- a/zitadel_client/configuration.py +++ b/zitadel_client/configuration.py @@ -16,15 +16,21 @@ class Configuration: """This class contains various settings of the API client.""" - USER_AGENT = " ".join([ - f"zitadel-client/{Version.VERSION}", - f"({'; '.join([ - 'lang=python', - f'lang_version={platform.python_version()}', - f'os={platform.system()}', - f'arch={platform.machine()}' - ])})" - ]).lower() + USER_AGENT = " ".join( + [ + f"zitadel-client/{Version.VERSION}", + f"({ + '; '.join( + [ + 'lang=python', + f'lang_version={platform.python_version()}', + f'os={platform.system()}', + f'arch={platform.machine()}', + ] + ) + })", + ] + ).lower() def __init__( self, diff --git a/zitadel_client/exceptions.py b/zitadel_client/exceptions.py index 6002b42b..fc6cacf5 100644 --- a/zitadel_client/exceptions.py +++ b/zitadel_client/exceptions.py @@ -97,7 +97,7 @@ def __init__(self, msg: str, path_to_item: Optional[List[str]] = None) -> None: super(ApiKeyError, self).__init__(full_msg) -class ApiException(OpenApiError): # noqa N818 should be named with an Error suffix later +class ApiException(OpenApiError): # noqa N818 should be named with an Error suffix later def __init__( self, status: Optional[int] = None, diff --git a/zitadel_client/rest.py b/zitadel_client/rest.py index 3e48b53b..e3da94b2 100644 --- a/zitadel_client/rest.py +++ b/zitadel_client/rest.py @@ -52,7 +52,7 @@ def __init__(self, configuration) -> None: # type: ignore self.pool_manager: urllib3.PoolManager self.pool_manager = urllib3.PoolManager(**pool_args) - def request( # noqa C901 too complex + def request( # noqa C901 too complex self, method: str, url: str,