Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 0a45fe8

Browse files
committedMar 13, 2025·
feat(threat_events): fix create endpoint (#2532)
1 parent e1a2d25 commit 0a45fe8

File tree

19 files changed

+274
-3532
lines changed

19 files changed

+274
-3532
lines changed
 

‎.stats.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
configured_endpoints: 1610
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-30da43ea5d0d999bce706d59618514c0c59d657ea27ad2e228663d731023449f.yml
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-0f0082a0942d9f9edb37ef99423f7cdf16d0bfeb57c6ee5728e830b2a9ebff87.yml

‎api.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8506,7 +8506,7 @@ from cloudflare.types.cloudforce_one import (
85068506

85078507
Methods:
85088508

8509-
- <code title="post /accounts/{account_id}/cloudforce-one/events">client.cloudforce_one.threat_events.<a href="./src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py">create</a>(\*, account_id, \*\*<a href="src/cloudflare/types/cloudforce_one/threat_event_create_params.py">params</a>) -> <a href="./src/cloudflare/types/cloudforce_one/threat_event_create_response.py">ThreatEventCreateResponse</a></code>
8509+
- <code title="post /accounts/{account_id}/cloudforce-one/events/create">client.cloudforce_one.threat_events.<a href="./src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py">create</a>(\*, path_account_id, \*\*<a href="src/cloudflare/types/cloudforce_one/threat_event_create_params.py">params</a>) -> <a href="./src/cloudflare/types/cloudforce_one/threat_event_create_response.py">ThreatEventCreateResponse</a></code>
85108510
- <code title="delete /accounts/{account_id}/cloudforce-one/events/{event_id}">client.cloudforce_one.threat_events.<a href="./src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py">delete</a>(event_id, \*, account_id) -> <a href="./src/cloudflare/types/cloudforce_one/threat_event_delete_response.py">ThreatEventDeleteResponse</a></code>
85118511
- <code title="post /accounts/{account_id}/cloudforce-one/events/create/bulk">client.cloudforce_one.threat_events.<a href="./src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py">bulk_create</a>(\*, account_id, \*\*<a href="src/cloudflare/types/cloudforce_one/threat_event_bulk_create_params.py">params</a>) -> <a href="./src/cloudflare/types/cloudforce_one/threat_event_bulk_create_response.py">ThreatEventBulkCreateResponse</a></code>
85128512
- <code title="patch /accounts/{account_id}/cloudforce-one/events/{event_id}">client.cloudforce_one.threat_events.<a href="./src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py">edit</a>(event_id, \*, account_id, \*\*<a href="src/cloudflare/types/cloudforce_one/threat_event_edit_params.py">params</a>) -> <a href="./src/cloudflare/types/cloudforce_one/threat_event_edit_response.py">ThreatEventEditResponse</a></code>

‎src/cloudflare/resources/cloudforce_one/threat_events/threat_events.py

+62-31
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44

55
from typing import List, Union, Iterable
66
from datetime import datetime
7-
from typing_extensions import Literal
87

98
import httpx
109

@@ -203,13 +202,21 @@ def with_streaming_response(self) -> ThreatEventsResourceWithStreamingResponse:
203202
def create(
204203
self,
205204
*,
206-
account_id: float,
207-
dataset_id: List[str] | NotGiven = NOT_GIVEN,
208-
order: Literal["asc", "desc"] | NotGiven = NOT_GIVEN,
209-
order_by: str | NotGiven = NOT_GIVEN,
210-
page: float | NotGiven = NOT_GIVEN,
211-
page_size: float | NotGiven = NOT_GIVEN,
212-
search: Iterable[threat_event_create_params.Search] | NotGiven = NOT_GIVEN,
205+
path_account_id: float,
206+
attacker: str,
207+
attacker_country: str,
208+
category: str,
209+
date: Union[str, datetime],
210+
event: str,
211+
indicator_type: str,
212+
raw: threat_event_create_params.Raw,
213+
tlp: str,
214+
body_account_id: float | NotGiven = NOT_GIVEN,
215+
dataset_id: str | NotGiven = NOT_GIVEN,
216+
indicator: str | NotGiven = NOT_GIVEN,
217+
tags: List[str] | NotGiven = NOT_GIVEN,
218+
target_country: str | NotGiven = NOT_GIVEN,
219+
target_industry: str | NotGiven = NOT_GIVEN,
213220
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
214221
# The extra values given here take precedence over values defined on the client or passed to this method.
215222
extra_headers: Headers | None = None,
@@ -218,10 +225,10 @@ def create(
218225
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
219226
) -> ThreatEventCreateResponse:
220227
"""
221-
Filter and list events
228+
Creates a new event
222229
223230
Args:
224-
account_id: Account ID
231+
path_account_id: Account ID
225232
226233
extra_headers: Send extra headers
227234
@@ -232,15 +239,23 @@ def create(
232239
timeout: Override the client-level default timeout for this request, in seconds
233240
"""
234241
return self._post(
235-
f"/accounts/{account_id}/cloudforce-one/events",
242+
f"/accounts/{path_account_id}/cloudforce-one/events/create",
236243
body=maybe_transform(
237244
{
245+
"attacker": attacker,
246+
"attacker_country": attacker_country,
247+
"category": category,
248+
"date": date,
249+
"event": event,
250+
"indicator_type": indicator_type,
251+
"raw": raw,
252+
"tlp": tlp,
253+
"body_account_id": body_account_id,
238254
"dataset_id": dataset_id,
239-
"order": order,
240-
"order_by": order_by,
241-
"page": page,
242-
"page_size": page_size,
243-
"search": search,
255+
"indicator": indicator,
256+
"tags": tags,
257+
"target_country": target_country,
258+
"target_industry": target_industry,
244259
},
245260
threat_event_create_params.ThreatEventCreateParams,
246261
),
@@ -503,13 +518,21 @@ def with_streaming_response(self) -> AsyncThreatEventsResourceWithStreamingRespo
503518
async def create(
504519
self,
505520
*,
506-
account_id: float,
507-
dataset_id: List[str] | NotGiven = NOT_GIVEN,
508-
order: Literal["asc", "desc"] | NotGiven = NOT_GIVEN,
509-
order_by: str | NotGiven = NOT_GIVEN,
510-
page: float | NotGiven = NOT_GIVEN,
511-
page_size: float | NotGiven = NOT_GIVEN,
512-
search: Iterable[threat_event_create_params.Search] | NotGiven = NOT_GIVEN,
521+
path_account_id: float,
522+
attacker: str,
523+
attacker_country: str,
524+
category: str,
525+
date: Union[str, datetime],
526+
event: str,
527+
indicator_type: str,
528+
raw: threat_event_create_params.Raw,
529+
tlp: str,
530+
body_account_id: float | NotGiven = NOT_GIVEN,
531+
dataset_id: str | NotGiven = NOT_GIVEN,
532+
indicator: str | NotGiven = NOT_GIVEN,
533+
tags: List[str] | NotGiven = NOT_GIVEN,
534+
target_country: str | NotGiven = NOT_GIVEN,
535+
target_industry: str | NotGiven = NOT_GIVEN,
513536
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
514537
# The extra values given here take precedence over values defined on the client or passed to this method.
515538
extra_headers: Headers | None = None,
@@ -518,10 +541,10 @@ async def create(
518541
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
519542
) -> ThreatEventCreateResponse:
520543
"""
521-
Filter and list events
544+
Creates a new event
522545
523546
Args:
524-
account_id: Account ID
547+
path_account_id: Account ID
525548
526549
extra_headers: Send extra headers
527550
@@ -532,15 +555,23 @@ async def create(
532555
timeout: Override the client-level default timeout for this request, in seconds
533556
"""
534557
return await self._post(
535-
f"/accounts/{account_id}/cloudforce-one/events",
558+
f"/accounts/{path_account_id}/cloudforce-one/events/create",
536559
body=await async_maybe_transform(
537560
{
561+
"attacker": attacker,
562+
"attacker_country": attacker_country,
563+
"category": category,
564+
"date": date,
565+
"event": event,
566+
"indicator_type": indicator_type,
567+
"raw": raw,
568+
"tlp": tlp,
569+
"body_account_id": body_account_id,
538570
"dataset_id": dataset_id,
539-
"order": order,
540-
"order_by": order_by,
541-
"page": page,
542-
"page_size": page_size,
543-
"search": search,
571+
"indicator": indicator,
572+
"tags": tags,
573+
"target_country": target_country,
574+
"target_industry": target_industry,
544575
},
545576
threat_event_create_params.ThreatEventCreateParams,
546577
),

‎src/cloudflare/resources/email_security/investigate/investigate.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ def list(
141141
detections_only: bool | NotGiven = NOT_GIVEN,
142142
domain: str | NotGiven = NOT_GIVEN,
143143
end: Union[str, datetime] | NotGiven = NOT_GIVEN,
144-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"] | NotGiven = NOT_GIVEN,
144+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"] | NotGiven = NOT_GIVEN,
145145
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"] | NotGiven = NOT_GIVEN,
146146
message_id: str | NotGiven = NOT_GIVEN,
147147
metric: str | NotGiven = NOT_GIVEN,
@@ -351,7 +351,7 @@ def list(
351351
detections_only: bool | NotGiven = NOT_GIVEN,
352352
domain: str | NotGiven = NOT_GIVEN,
353353
end: Union[str, datetime] | NotGiven = NOT_GIVEN,
354-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"] | NotGiven = NOT_GIVEN,
354+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"] | NotGiven = NOT_GIVEN,
355355
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"] | NotGiven = NOT_GIVEN,
356356
message_id: str | NotGiven = NOT_GIVEN,
357357
metric: str | NotGiven = NOT_GIVEN,

‎src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/secrets.py

+6-8
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ def update(
6868
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
6969
) -> Optional[SecretUpdateResponse]:
7070
"""
71-
Add a secret to a script uploaded to a Workers for Platforms namespace.
71+
Put secrets to a script uploaded to a Workers for Platforms namespace.
7272
7373
Args:
7474
account_id: Identifier
@@ -132,7 +132,7 @@ def list(
132132
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
133133
) -> SyncSinglePage[SecretListResponse]:
134134
"""
135-
List secrets bound to a script uploaded to a Workers for Platforms namespace.
135+
List secrets from a script uploaded to a Workers for Platforms namespace.
136136
137137
Args:
138138
account_id: Identifier
@@ -179,8 +179,7 @@ def get(
179179
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
180180
) -> Optional[SecretGetResponse]:
181181
"""
182-
Get a given secret binding (value omitted) on a script uploaded to a Workers for
183-
Platforms namespace.
182+
Get secret from a script uploaded to a Workers for Platforms namespace.
184183
185184
Args:
186185
account_id: Identifier
@@ -257,7 +256,7 @@ async def update(
257256
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
258257
) -> Optional[SecretUpdateResponse]:
259258
"""
260-
Add a secret to a script uploaded to a Workers for Platforms namespace.
259+
Put secrets to a script uploaded to a Workers for Platforms namespace.
261260
262261
Args:
263262
account_id: Identifier
@@ -321,7 +320,7 @@ def list(
321320
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
322321
) -> AsyncPaginator[SecretListResponse, AsyncSinglePage[SecretListResponse]]:
323322
"""
324-
List secrets bound to a script uploaded to a Workers for Platforms namespace.
323+
List secrets from a script uploaded to a Workers for Platforms namespace.
325324
326325
Args:
327326
account_id: Identifier
@@ -368,8 +367,7 @@ async def get(
368367
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
369368
) -> Optional[SecretGetResponse]:
370369
"""
371-
Get a given secret binding (value omitted) on a script uploaded to a Workers for
372-
Platforms namespace.
370+
Get secret from a script uploaded to a Workers for Platforms namespace.
373371
374372
Args:
375373
account_id: Identifier

‎src/cloudflare/resources/zero_trust/access/applications/applications.py

+27-561
Large diffs are not rendered by default.

‎src/cloudflare/types/cloudforce_one/threat_event_create_params.py

+31-14
Original file line numberDiff line numberDiff line change
@@ -2,34 +2,51 @@
22

33
from __future__ import annotations
44

5-
from typing import List, Union, Iterable
6-
from typing_extensions import Literal, Required, Annotated, TypedDict
5+
from typing import List, Union
6+
from datetime import datetime
7+
from typing_extensions import Required, Annotated, TypedDict
78

89
from ..._utils import PropertyInfo
910

10-
__all__ = ["ThreatEventCreateParams", "Search"]
11+
__all__ = ["ThreatEventCreateParams", "Raw"]
1112

1213

1314
class ThreatEventCreateParams(TypedDict, total=False):
14-
account_id: Required[float]
15+
path_account_id: Required[Annotated[float, PropertyInfo(alias="account_id")]]
1516
"""Account ID"""
1617

17-
dataset_id: Annotated[List[str], PropertyInfo(alias="datasetId")]
18+
attacker: Required[str]
1819

19-
order: Literal["asc", "desc"]
20+
attacker_country: Required[Annotated[str, PropertyInfo(alias="attackerCountry")]]
2021

21-
order_by: Annotated[str, PropertyInfo(alias="orderBy")]
22+
category: Required[str]
2223

23-
page: float
24+
date: Required[Annotated[Union[str, datetime], PropertyInfo(format="iso8601")]]
2425

25-
page_size: Annotated[float, PropertyInfo(alias="pageSize")]
26+
event: Required[str]
2627

27-
search: Iterable[Search]
28+
indicator_type: Required[Annotated[str, PropertyInfo(alias="indicatorType")]]
2829

30+
raw: Required[Raw]
2931

30-
class Search(TypedDict, total=False):
31-
field: str
32+
tlp: Required[str]
3233

33-
op: str
34+
body_account_id: Annotated[float, PropertyInfo(alias="accountId")]
3435

35-
value: Union[str, float, List[Union[str, float]]]
36+
dataset_id: Annotated[str, PropertyInfo(alias="datasetId")]
37+
38+
indicator: str
39+
40+
tags: List[str]
41+
42+
target_country: Annotated[str, PropertyInfo(alias="targetCountry")]
43+
44+
target_industry: Annotated[str, PropertyInfo(alias="targetIndustry")]
45+
46+
47+
class Raw(TypedDict, total=False):
48+
data: object
49+
50+
source: str
51+
52+
tlp: str

‎src/cloudflare/types/cloudforce_one/threat_event_create_response.py

+2-6
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,15 @@
11
# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
22

33
from typing import List, Optional
4-
from typing_extensions import TypeAlias
54

65
from pydantic import Field as FieldInfo
76

87
from ..._models import BaseModel
98

10-
__all__ = ["ThreatEventCreateResponse", "ThreatEventCreateResponseItem"]
9+
__all__ = ["ThreatEventCreateResponse"]
1110

1211

13-
class ThreatEventCreateResponseItem(BaseModel):
12+
class ThreatEventCreateResponse(BaseModel):
1413
id: float
1514

1615
account_id: float = FieldInfo(alias="accountId")
@@ -64,6 +63,3 @@ class ThreatEventCreateResponseItem(BaseModel):
6463
insight: Optional[str] = None
6564

6665
releasability_id: Optional[str] = FieldInfo(alias="releasabilityId", default=None)
67-
68-
69-
ThreatEventCreateResponse: TypeAlias = List[ThreatEventCreateResponseItem]

‎src/cloudflare/types/email_security/investigate_list_params.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ class InvestigateListParams(TypedDict, total=False):
2929
end: Annotated[Union[str, datetime], PropertyInfo(format="iso8601")]
3030
"""The end of the search date range. Defaults to `now`."""
3131

32-
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK", "NONE"]
32+
final_disposition: Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", "SPAM", "BULK"]
3333
"""The dispositions the search filters by."""
3434

3535
message_action: Literal["PREVIEW", "QUARANTINE_RELEASED", "MOVED"]

‎src/cloudflare/types/email_security/submission_list_response.py

-2
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@ class SubmissionListResponse(BaseModel):
2929
]
3030
] = None
3131

32-
original_edf_hash: Optional[str] = None
33-
3432
outcome: Optional[str] = None
3533

3634
outcome_disposition: Optional[

‎src/cloudflare/types/zero_trust/access/application_create_params.py

-363
Original file line numberDiff line numberDiff line change
@@ -111,19 +111,6 @@
111111
"InfrastructureApplicationPolicy",
112112
"InfrastructureApplicationPolicyConnectionRules",
113113
"InfrastructureApplicationPolicyConnectionRulesSSH",
114-
"BrowserRdpApplication",
115-
"BrowserRdpApplicationTargetCriterion",
116-
"BrowserRdpApplicationDestination",
117-
"BrowserRdpApplicationDestinationPublicDestination",
118-
"BrowserRdpApplicationDestinationPrivateDestination",
119-
"BrowserRdpApplicationPolicy",
120-
"BrowserRdpApplicationPolicyAccessAppPolicyLink",
121-
"BrowserRdpApplicationPolicyUnionMember2",
122-
"BrowserRdpApplicationSCIMConfig",
123-
"BrowserRdpApplicationSCIMConfigAuthentication",
124-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
125-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
126-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
127114
]
128115

129116

@@ -2230,355 +2217,6 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22302217
"""
22312218

22322219

2233-
class BrowserRdpApplication(TypedDict, total=False):
2234-
domain: Required[str]
2235-
"""The primary hostname and path secured by Access.
2236-
2237-
This domain will be displayed if the app is visible in the App Launcher.
2238-
"""
2239-
2240-
target_criteria: Required[Iterable[BrowserRdpApplicationTargetCriterion]]
2241-
2242-
type: Required[str]
2243-
"""The application type."""
2244-
2245-
account_id: str
2246-
"""The Account ID to use for this endpoint. Mutually exclusive with the Zone ID."""
2247-
2248-
zone_id: str
2249-
"""The Zone ID to use for this endpoint. Mutually exclusive with the Account ID."""
2250-
2251-
allow_authenticate_via_warp: bool
2252-
"""
2253-
When set to true, users can authenticate to this application using their WARP
2254-
session. When set to false this application will always require direct IdP
2255-
authentication. This setting always overrides the organization setting for WARP
2256-
authentication.
2257-
"""
2258-
2259-
allowed_idps: List[AllowedIdPs]
2260-
"""The identity providers your users can select when connecting to this
2261-
application.
2262-
2263-
Defaults to all IdPs configured in your account.
2264-
"""
2265-
2266-
app_launcher_visible: bool
2267-
"""Displays the application in the App Launcher."""
2268-
2269-
auto_redirect_to_identity: bool
2270-
"""When set to `true`, users skip the identity provider selection step during
2271-
login.
2272-
2273-
You must specify only one identity provider in allowed_idps.
2274-
"""
2275-
2276-
cors_headers: CORSHeadersParam
2277-
2278-
custom_deny_message: str
2279-
"""
2280-
The custom error message shown to a user when they are denied access to the
2281-
application.
2282-
"""
2283-
2284-
custom_deny_url: str
2285-
"""
2286-
The custom URL a user is redirected to when they are denied access to the
2287-
application when failing identity-based rules.
2288-
"""
2289-
2290-
custom_non_identity_deny_url: str
2291-
"""
2292-
The custom URL a user is redirected to when they are denied access to the
2293-
application when failing non-identity rules.
2294-
"""
2295-
2296-
custom_pages: List[str]
2297-
"""The custom pages that will be displayed when applicable for this application"""
2298-
2299-
destinations: Iterable[BrowserRdpApplicationDestination]
2300-
"""List of destinations secured by Access.
2301-
2302-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2303-
different types of domains. If `destinations` are provided, then
2304-
`self_hosted_domains` will be ignored.
2305-
"""
2306-
2307-
enable_binding_cookie: bool
2308-
"""
2309-
Enables the binding cookie, which increases security against compromised
2310-
authorization tokens and CSRF attacks.
2311-
"""
2312-
2313-
http_only_cookie_attribute: bool
2314-
"""
2315-
Enables the HttpOnly cookie attribute, which increases security against XSS
2316-
attacks.
2317-
"""
2318-
2319-
logo_url: str
2320-
"""The image URL for the logo shown in the App Launcher dashboard."""
2321-
2322-
name: str
2323-
"""The name of the application."""
2324-
2325-
options_preflight_bypass: bool
2326-
"""
2327-
Allows options preflight requests to bypass Access authentication and go
2328-
directly to the origin. Cannot turn on if cors_headers is set.
2329-
"""
2330-
2331-
path_cookie_attribute: bool
2332-
"""Enables cookie paths to scope an application's JWT to the application path.
2333-
2334-
If disabled, the JWT will scope to the hostname by default
2335-
"""
2336-
2337-
policies: List[BrowserRdpApplicationPolicy]
2338-
"""
2339-
The policies that Access applies to the application, in ascending order of
2340-
precedence. Items can reference existing policies or create new policies
2341-
exclusive to the application.
2342-
"""
2343-
2344-
same_site_cookie_attribute: str
2345-
"""
2346-
Sets the SameSite cookie setting, which provides increased security against CSRF
2347-
attacks.
2348-
"""
2349-
2350-
scim_config: BrowserRdpApplicationSCIMConfig
2351-
"""Configuration for provisioning to this application via SCIM.
2352-
2353-
This is currently in closed beta.
2354-
"""
2355-
2356-
self_hosted_domains: List[SelfHostedDomains]
2357-
"""List of public domains that Access will secure.
2358-
2359-
This field is deprecated in favor of `destinations` and will be supported until
2360-
**November 21, 2025.** If `destinations` are provided, then
2361-
`self_hosted_domains` will be ignored.
2362-
"""
2363-
2364-
service_auth_401_redirect: bool
2365-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2366-
2367-
session_duration: str
2368-
"""The amount of time that tokens issued for this application will be valid.
2369-
2370-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2371-
ms, s, m, h.
2372-
"""
2373-
2374-
skip_interstitial: bool
2375-
"""Enables automatic authentication through cloudflared."""
2376-
2377-
tags: List[str]
2378-
"""The tags you want assigned to an application.
2379-
2380-
Tags are used to filter applications in the App Launcher dashboard.
2381-
"""
2382-
2383-
2384-
class BrowserRdpApplicationTargetCriterion(TypedDict, total=False):
2385-
port: Required[int]
2386-
"""The port that the targets use for the chosen communication protocol.
2387-
2388-
A port cannot be assigned to multiple protocols.
2389-
"""
2390-
2391-
protocol: Required[Literal["ssh"]]
2392-
"""The communication protocol your application secures."""
2393-
2394-
target_attributes: Required[Dict[str, List[str]]]
2395-
"""Contains a map of target attribute keys to target attribute values."""
2396-
2397-
2398-
class BrowserRdpApplicationDestinationPublicDestination(TypedDict, total=False):
2399-
type: Literal["public"]
2400-
2401-
uri: str
2402-
"""The URI of the destination.
2403-
2404-
Public destinations' URIs can include a domain and path with
2405-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2406-
"""
2407-
2408-
2409-
class BrowserRdpApplicationDestinationPrivateDestination(TypedDict, total=False):
2410-
cidr: str
2411-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2412-
2413-
hostname: str
2414-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2415-
2416-
l4_protocol: Literal["tcp", "udp"]
2417-
"""The L4 protocol of the destination.
2418-
2419-
When omitted, both UDP and TCP traffic will match.
2420-
"""
2421-
2422-
port_range: str
2423-
"""The port range of the destination.
2424-
2425-
Can be a single port or a range of ports. When omitted, all ports will match.
2426-
"""
2427-
2428-
type: Literal["private"]
2429-
2430-
vnet_id: str
2431-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2432-
2433-
2434-
BrowserRdpApplicationDestination: TypeAlias = Union[
2435-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2436-
]
2437-
2438-
2439-
class BrowserRdpApplicationPolicyAccessAppPolicyLink(TypedDict, total=False):
2440-
id: str
2441-
"""The UUID of the policy"""
2442-
2443-
precedence: int
2444-
"""The order of execution for this policy.
2445-
2446-
Must be unique for each policy within an app.
2447-
"""
2448-
2449-
2450-
class BrowserRdpApplicationPolicyUnionMember2(TypedDict, total=False):
2451-
id: str
2452-
"""The UUID of the policy"""
2453-
2454-
approval_groups: Iterable[ApprovalGroupParam]
2455-
"""Administrators who can approve a temporary authentication request."""
2456-
2457-
approval_required: bool
2458-
"""
2459-
Requires the user to request access from an administrator at the start of each
2460-
session.
2461-
"""
2462-
2463-
isolation_required: bool
2464-
"""
2465-
Require this application to be served in an isolated browser for users matching
2466-
this policy. 'Client Web Isolation' must be on for the account in order to use
2467-
this feature.
2468-
"""
2469-
2470-
precedence: int
2471-
"""The order of execution for this policy.
2472-
2473-
Must be unique for each policy within an app.
2474-
"""
2475-
2476-
purpose_justification_prompt: str
2477-
"""A custom message that will appear on the purpose justification screen."""
2478-
2479-
purpose_justification_required: bool
2480-
"""Require users to enter a justification when they log in to the application."""
2481-
2482-
session_duration: str
2483-
"""The amount of time that tokens issued for the application will be valid.
2484-
2485-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2486-
ms, s, m, h.
2487-
"""
2488-
2489-
2490-
BrowserRdpApplicationPolicy: TypeAlias = Union[
2491-
BrowserRdpApplicationPolicyAccessAppPolicyLink, str, BrowserRdpApplicationPolicyUnionMember2
2492-
]
2493-
2494-
2495-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2496-
TypedDict, total=False
2497-
):
2498-
client_id: Required[str]
2499-
"""
2500-
Client ID of the Access service token used to authenticate with the remote
2501-
service.
2502-
"""
2503-
2504-
client_secret: Required[str]
2505-
"""
2506-
Client secret of the Access service token used to authenticate with the remote
2507-
service.
2508-
"""
2509-
2510-
scheme: Required[Literal["access_service_token"]]
2511-
"""The authentication scheme to use when making SCIM requests to this application."""
2512-
2513-
2514-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2515-
TypedDict, total=False
2516-
):
2517-
client_id: Required[str]
2518-
"""
2519-
Client ID of the Access service token used to authenticate with the remote
2520-
service.
2521-
"""
2522-
2523-
client_secret: Required[str]
2524-
"""
2525-
Client secret of the Access service token used to authenticate with the remote
2526-
service.
2527-
"""
2528-
2529-
scheme: Required[Literal["access_service_token"]]
2530-
"""The authentication scheme to use when making SCIM requests to this application."""
2531-
2532-
2533-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2534-
SCIMConfigAuthenticationHTTPBasicParam,
2535-
SCIMConfigAuthenticationOAuthBearerTokenParam,
2536-
SCIMConfigAuthenticationOauth2Param,
2537-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2538-
]
2539-
2540-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2541-
SCIMConfigAuthenticationHTTPBasicParam,
2542-
SCIMConfigAuthenticationOAuthBearerTokenParam,
2543-
SCIMConfigAuthenticationOauth2Param,
2544-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2545-
Iterable[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2546-
]
2547-
2548-
2549-
class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
2550-
idp_uid: Required[str]
2551-
"""
2552-
The UID of the IdP to use as the source for SCIM resources to provision to this
2553-
application.
2554-
"""
2555-
2556-
remote_uri: Required[str]
2557-
"""The base URI for the application's SCIM-compatible API."""
2558-
2559-
authentication: BrowserRdpApplicationSCIMConfigAuthentication
2560-
"""
2561-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2562-
provisioning to an application.
2563-
"""
2564-
2565-
deactivate_on_delete: bool
2566-
"""
2567-
If false, propagates DELETE requests to the target application for SCIM
2568-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2569-
targets do not support DELETE operations.
2570-
"""
2571-
2572-
enabled: bool
2573-
"""Whether SCIM provisioning is turned on for this application."""
2574-
2575-
mappings: Iterable[SCIMConfigMappingParam]
2576-
"""
2577-
A list of mappings to apply to SCIM resources before provisioning them in this
2578-
application. These can transform or filter the resources to be provisioned.
2579-
"""
2580-
2581-
25822220
ApplicationCreateParams: TypeAlias = Union[
25832221
SelfHostedApplication,
25842222
SaaSApplication,
@@ -2589,5 +2227,4 @@ class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
25892227
BrowserIsolationPermissionsApplication,
25902228
BookmarkApplication,
25912229
InfrastructureApplication,
2592-
BrowserRdpApplication,
25932230
]

‎src/cloudflare/types/zero_trust/access/application_create_response.py

-310
Original file line numberDiff line numberDiff line change
@@ -102,17 +102,6 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105-
"BrowserRdpApplication",
106-
"BrowserRdpApplicationTargetCriterion",
107-
"BrowserRdpApplicationDestination",
108-
"BrowserRdpApplicationDestinationPublicDestination",
109-
"BrowserRdpApplicationDestinationPrivateDestination",
110-
"BrowserRdpApplicationPolicy",
111-
"BrowserRdpApplicationSCIMConfig",
112-
"BrowserRdpApplicationSCIMConfigAuthentication",
113-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
116105
]
117106

118107

@@ -1995,304 +1984,6 @@ class InfrastructureApplication(BaseModel):
19951984
updated_at: Optional[datetime] = None
19961985

19971986

1998-
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999-
port: int
2000-
"""The port that the targets use for the chosen communication protocol.
2001-
2002-
A port cannot be assigned to multiple protocols.
2003-
"""
2004-
2005-
protocol: Literal["ssh"]
2006-
"""The communication protocol your application secures."""
2007-
2008-
target_attributes: Dict[str, List[str]]
2009-
"""Contains a map of target attribute keys to target attribute values."""
2010-
2011-
2012-
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013-
type: Optional[Literal["public"]] = None
2014-
2015-
uri: Optional[str] = None
2016-
"""The URI of the destination.
2017-
2018-
Public destinations' URIs can include a domain and path with
2019-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020-
"""
2021-
2022-
2023-
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024-
cidr: Optional[str] = None
2025-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026-
2027-
hostname: Optional[str] = None
2028-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029-
2030-
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031-
"""The L4 protocol of the destination.
2032-
2033-
When omitted, both UDP and TCP traffic will match.
2034-
"""
2035-
2036-
port_range: Optional[str] = None
2037-
"""The port range of the destination.
2038-
2039-
Can be a single port or a range of ports. When omitted, all ports will match.
2040-
"""
2041-
2042-
type: Optional[Literal["private"]] = None
2043-
2044-
vnet_id: Optional[str] = None
2045-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046-
2047-
2048-
BrowserRdpApplicationDestination: TypeAlias = Union[
2049-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050-
]
2051-
2052-
2053-
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054-
precedence: Optional[int] = None
2055-
"""The order of execution for this policy.
2056-
2057-
Must be unique for each policy within an app.
2058-
"""
2059-
2060-
2061-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062-
client_id: str
2063-
"""
2064-
Client ID of the Access service token used to authenticate with the remote
2065-
service.
2066-
"""
2067-
2068-
client_secret: str
2069-
"""
2070-
Client secret of the Access service token used to authenticate with the remote
2071-
service.
2072-
"""
2073-
2074-
scheme: Literal["access_service_token"]
2075-
"""The authentication scheme to use when making SCIM requests to this application."""
2076-
2077-
2078-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079-
BaseModel
2080-
):
2081-
client_id: str
2082-
"""
2083-
Client ID of the Access service token used to authenticate with the remote
2084-
service.
2085-
"""
2086-
2087-
client_secret: str
2088-
"""
2089-
Client secret of the Access service token used to authenticate with the remote
2090-
service.
2091-
"""
2092-
2093-
scheme: Literal["access_service_token"]
2094-
"""The authentication scheme to use when making SCIM requests to this application."""
2095-
2096-
2097-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098-
SCIMConfigAuthenticationHTTPBasic,
2099-
SCIMConfigAuthenticationOAuthBearerToken,
2100-
SCIMConfigAuthenticationOauth2,
2101-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102-
]
2103-
2104-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105-
SCIMConfigAuthenticationHTTPBasic,
2106-
SCIMConfigAuthenticationOAuthBearerToken,
2107-
SCIMConfigAuthenticationOauth2,
2108-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109-
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110-
]
2111-
2112-
2113-
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114-
idp_uid: str
2115-
"""
2116-
The UID of the IdP to use as the source for SCIM resources to provision to this
2117-
application.
2118-
"""
2119-
2120-
remote_uri: str
2121-
"""The base URI for the application's SCIM-compatible API."""
2122-
2123-
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124-
"""
2125-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126-
provisioning to an application.
2127-
"""
2128-
2129-
deactivate_on_delete: Optional[bool] = None
2130-
"""
2131-
If false, propagates DELETE requests to the target application for SCIM
2132-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133-
targets do not support DELETE operations.
2134-
"""
2135-
2136-
enabled: Optional[bool] = None
2137-
"""Whether SCIM provisioning is turned on for this application."""
2138-
2139-
mappings: Optional[List[SCIMConfigMapping]] = None
2140-
"""
2141-
A list of mappings to apply to SCIM resources before provisioning them in this
2142-
application. These can transform or filter the resources to be provisioned.
2143-
"""
2144-
2145-
2146-
class BrowserRdpApplication(BaseModel):
2147-
domain: str
2148-
"""The primary hostname and path secured by Access.
2149-
2150-
This domain will be displayed if the app is visible in the App Launcher.
2151-
"""
2152-
2153-
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154-
2155-
type: str
2156-
"""The application type."""
2157-
2158-
id: Optional[str] = None
2159-
"""UUID"""
2160-
2161-
allow_authenticate_via_warp: Optional[bool] = None
2162-
"""
2163-
When set to true, users can authenticate to this application using their WARP
2164-
session. When set to false this application will always require direct IdP
2165-
authentication. This setting always overrides the organization setting for WARP
2166-
authentication.
2167-
"""
2168-
2169-
allowed_idps: Optional[List[AllowedIdPs]] = None
2170-
"""The identity providers your users can select when connecting to this
2171-
application.
2172-
2173-
Defaults to all IdPs configured in your account.
2174-
"""
2175-
2176-
app_launcher_visible: Optional[bool] = None
2177-
"""Displays the application in the App Launcher."""
2178-
2179-
aud: Optional[str] = None
2180-
"""Audience tag."""
2181-
2182-
auto_redirect_to_identity: Optional[bool] = None
2183-
"""When set to `true`, users skip the identity provider selection step during
2184-
login.
2185-
2186-
You must specify only one identity provider in allowed_idps.
2187-
"""
2188-
2189-
cors_headers: Optional[CORSHeaders] = None
2190-
2191-
created_at: Optional[datetime] = None
2192-
2193-
custom_deny_message: Optional[str] = None
2194-
"""
2195-
The custom error message shown to a user when they are denied access to the
2196-
application.
2197-
"""
2198-
2199-
custom_deny_url: Optional[str] = None
2200-
"""
2201-
The custom URL a user is redirected to when they are denied access to the
2202-
application when failing identity-based rules.
2203-
"""
2204-
2205-
custom_non_identity_deny_url: Optional[str] = None
2206-
"""
2207-
The custom URL a user is redirected to when they are denied access to the
2208-
application when failing non-identity rules.
2209-
"""
2210-
2211-
custom_pages: Optional[List[str]] = None
2212-
"""The custom pages that will be displayed when applicable for this application"""
2213-
2214-
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215-
"""List of destinations secured by Access.
2216-
2217-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218-
different types of domains. If `destinations` are provided, then
2219-
`self_hosted_domains` will be ignored.
2220-
"""
2221-
2222-
enable_binding_cookie: Optional[bool] = None
2223-
"""
2224-
Enables the binding cookie, which increases security against compromised
2225-
authorization tokens and CSRF attacks.
2226-
"""
2227-
2228-
http_only_cookie_attribute: Optional[bool] = None
2229-
"""
2230-
Enables the HttpOnly cookie attribute, which increases security against XSS
2231-
attacks.
2232-
"""
2233-
2234-
logo_url: Optional[str] = None
2235-
"""The image URL for the logo shown in the App Launcher dashboard."""
2236-
2237-
name: Optional[str] = None
2238-
"""The name of the application."""
2239-
2240-
options_preflight_bypass: Optional[bool] = None
2241-
"""
2242-
Allows options preflight requests to bypass Access authentication and go
2243-
directly to the origin. Cannot turn on if cors_headers is set.
2244-
"""
2245-
2246-
path_cookie_attribute: Optional[bool] = None
2247-
"""Enables cookie paths to scope an application's JWT to the application path.
2248-
2249-
If disabled, the JWT will scope to the hostname by default
2250-
"""
2251-
2252-
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253-
2254-
same_site_cookie_attribute: Optional[str] = None
2255-
"""
2256-
Sets the SameSite cookie setting, which provides increased security against CSRF
2257-
attacks.
2258-
"""
2259-
2260-
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261-
"""Configuration for provisioning to this application via SCIM.
2262-
2263-
This is currently in closed beta.
2264-
"""
2265-
2266-
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267-
"""List of public domains that Access will secure.
2268-
2269-
This field is deprecated in favor of `destinations` and will be supported until
2270-
**November 21, 2025.** If `destinations` are provided, then
2271-
`self_hosted_domains` will be ignored.
2272-
"""
2273-
2274-
service_auth_401_redirect: Optional[bool] = None
2275-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276-
2277-
session_duration: Optional[str] = None
2278-
"""The amount of time that tokens issued for this application will be valid.
2279-
2280-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281-
ms, s, m, h.
2282-
"""
2283-
2284-
skip_interstitial: Optional[bool] = None
2285-
"""Enables automatic authentication through cloudflared."""
2286-
2287-
tags: Optional[List[str]] = None
2288-
"""The tags you want assigned to an application.
2289-
2290-
Tags are used to filter applications in the App Launcher dashboard.
2291-
"""
2292-
2293-
updated_at: Optional[datetime] = None
2294-
2295-
22961987
ApplicationCreateResponse: TypeAlias = Union[
22971988
SelfHostedApplication,
22981989
SaaSApplication,
@@ -2303,5 +1994,4 @@ class BrowserRdpApplication(BaseModel):
23031994
BrowserIsolationPermissionsApplication,
23041995
BookmarkApplication,
23051996
InfrastructureApplication,
2306-
BrowserRdpApplication,
23071997
]

‎src/cloudflare/types/zero_trust/access/application_get_response.py

-310
Original file line numberDiff line numberDiff line change
@@ -102,17 +102,6 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105-
"BrowserRdpApplication",
106-
"BrowserRdpApplicationTargetCriterion",
107-
"BrowserRdpApplicationDestination",
108-
"BrowserRdpApplicationDestinationPublicDestination",
109-
"BrowserRdpApplicationDestinationPrivateDestination",
110-
"BrowserRdpApplicationPolicy",
111-
"BrowserRdpApplicationSCIMConfig",
112-
"BrowserRdpApplicationSCIMConfigAuthentication",
113-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
116105
]
117106

118107

@@ -1995,304 +1984,6 @@ class InfrastructureApplication(BaseModel):
19951984
updated_at: Optional[datetime] = None
19961985

19971986

1998-
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999-
port: int
2000-
"""The port that the targets use for the chosen communication protocol.
2001-
2002-
A port cannot be assigned to multiple protocols.
2003-
"""
2004-
2005-
protocol: Literal["ssh"]
2006-
"""The communication protocol your application secures."""
2007-
2008-
target_attributes: Dict[str, List[str]]
2009-
"""Contains a map of target attribute keys to target attribute values."""
2010-
2011-
2012-
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013-
type: Optional[Literal["public"]] = None
2014-
2015-
uri: Optional[str] = None
2016-
"""The URI of the destination.
2017-
2018-
Public destinations' URIs can include a domain and path with
2019-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020-
"""
2021-
2022-
2023-
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024-
cidr: Optional[str] = None
2025-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026-
2027-
hostname: Optional[str] = None
2028-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029-
2030-
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031-
"""The L4 protocol of the destination.
2032-
2033-
When omitted, both UDP and TCP traffic will match.
2034-
"""
2035-
2036-
port_range: Optional[str] = None
2037-
"""The port range of the destination.
2038-
2039-
Can be a single port or a range of ports. When omitted, all ports will match.
2040-
"""
2041-
2042-
type: Optional[Literal["private"]] = None
2043-
2044-
vnet_id: Optional[str] = None
2045-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046-
2047-
2048-
BrowserRdpApplicationDestination: TypeAlias = Union[
2049-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050-
]
2051-
2052-
2053-
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054-
precedence: Optional[int] = None
2055-
"""The order of execution for this policy.
2056-
2057-
Must be unique for each policy within an app.
2058-
"""
2059-
2060-
2061-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062-
client_id: str
2063-
"""
2064-
Client ID of the Access service token used to authenticate with the remote
2065-
service.
2066-
"""
2067-
2068-
client_secret: str
2069-
"""
2070-
Client secret of the Access service token used to authenticate with the remote
2071-
service.
2072-
"""
2073-
2074-
scheme: Literal["access_service_token"]
2075-
"""The authentication scheme to use when making SCIM requests to this application."""
2076-
2077-
2078-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079-
BaseModel
2080-
):
2081-
client_id: str
2082-
"""
2083-
Client ID of the Access service token used to authenticate with the remote
2084-
service.
2085-
"""
2086-
2087-
client_secret: str
2088-
"""
2089-
Client secret of the Access service token used to authenticate with the remote
2090-
service.
2091-
"""
2092-
2093-
scheme: Literal["access_service_token"]
2094-
"""The authentication scheme to use when making SCIM requests to this application."""
2095-
2096-
2097-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098-
SCIMConfigAuthenticationHTTPBasic,
2099-
SCIMConfigAuthenticationOAuthBearerToken,
2100-
SCIMConfigAuthenticationOauth2,
2101-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102-
]
2103-
2104-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105-
SCIMConfigAuthenticationHTTPBasic,
2106-
SCIMConfigAuthenticationOAuthBearerToken,
2107-
SCIMConfigAuthenticationOauth2,
2108-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109-
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110-
]
2111-
2112-
2113-
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114-
idp_uid: str
2115-
"""
2116-
The UID of the IdP to use as the source for SCIM resources to provision to this
2117-
application.
2118-
"""
2119-
2120-
remote_uri: str
2121-
"""The base URI for the application's SCIM-compatible API."""
2122-
2123-
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124-
"""
2125-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126-
provisioning to an application.
2127-
"""
2128-
2129-
deactivate_on_delete: Optional[bool] = None
2130-
"""
2131-
If false, propagates DELETE requests to the target application for SCIM
2132-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133-
targets do not support DELETE operations.
2134-
"""
2135-
2136-
enabled: Optional[bool] = None
2137-
"""Whether SCIM provisioning is turned on for this application."""
2138-
2139-
mappings: Optional[List[SCIMConfigMapping]] = None
2140-
"""
2141-
A list of mappings to apply to SCIM resources before provisioning them in this
2142-
application. These can transform or filter the resources to be provisioned.
2143-
"""
2144-
2145-
2146-
class BrowserRdpApplication(BaseModel):
2147-
domain: str
2148-
"""The primary hostname and path secured by Access.
2149-
2150-
This domain will be displayed if the app is visible in the App Launcher.
2151-
"""
2152-
2153-
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154-
2155-
type: str
2156-
"""The application type."""
2157-
2158-
id: Optional[str] = None
2159-
"""UUID"""
2160-
2161-
allow_authenticate_via_warp: Optional[bool] = None
2162-
"""
2163-
When set to true, users can authenticate to this application using their WARP
2164-
session. When set to false this application will always require direct IdP
2165-
authentication. This setting always overrides the organization setting for WARP
2166-
authentication.
2167-
"""
2168-
2169-
allowed_idps: Optional[List[AllowedIdPs]] = None
2170-
"""The identity providers your users can select when connecting to this
2171-
application.
2172-
2173-
Defaults to all IdPs configured in your account.
2174-
"""
2175-
2176-
app_launcher_visible: Optional[bool] = None
2177-
"""Displays the application in the App Launcher."""
2178-
2179-
aud: Optional[str] = None
2180-
"""Audience tag."""
2181-
2182-
auto_redirect_to_identity: Optional[bool] = None
2183-
"""When set to `true`, users skip the identity provider selection step during
2184-
login.
2185-
2186-
You must specify only one identity provider in allowed_idps.
2187-
"""
2188-
2189-
cors_headers: Optional[CORSHeaders] = None
2190-
2191-
created_at: Optional[datetime] = None
2192-
2193-
custom_deny_message: Optional[str] = None
2194-
"""
2195-
The custom error message shown to a user when they are denied access to the
2196-
application.
2197-
"""
2198-
2199-
custom_deny_url: Optional[str] = None
2200-
"""
2201-
The custom URL a user is redirected to when they are denied access to the
2202-
application when failing identity-based rules.
2203-
"""
2204-
2205-
custom_non_identity_deny_url: Optional[str] = None
2206-
"""
2207-
The custom URL a user is redirected to when they are denied access to the
2208-
application when failing non-identity rules.
2209-
"""
2210-
2211-
custom_pages: Optional[List[str]] = None
2212-
"""The custom pages that will be displayed when applicable for this application"""
2213-
2214-
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215-
"""List of destinations secured by Access.
2216-
2217-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218-
different types of domains. If `destinations` are provided, then
2219-
`self_hosted_domains` will be ignored.
2220-
"""
2221-
2222-
enable_binding_cookie: Optional[bool] = None
2223-
"""
2224-
Enables the binding cookie, which increases security against compromised
2225-
authorization tokens and CSRF attacks.
2226-
"""
2227-
2228-
http_only_cookie_attribute: Optional[bool] = None
2229-
"""
2230-
Enables the HttpOnly cookie attribute, which increases security against XSS
2231-
attacks.
2232-
"""
2233-
2234-
logo_url: Optional[str] = None
2235-
"""The image URL for the logo shown in the App Launcher dashboard."""
2236-
2237-
name: Optional[str] = None
2238-
"""The name of the application."""
2239-
2240-
options_preflight_bypass: Optional[bool] = None
2241-
"""
2242-
Allows options preflight requests to bypass Access authentication and go
2243-
directly to the origin. Cannot turn on if cors_headers is set.
2244-
"""
2245-
2246-
path_cookie_attribute: Optional[bool] = None
2247-
"""Enables cookie paths to scope an application's JWT to the application path.
2248-
2249-
If disabled, the JWT will scope to the hostname by default
2250-
"""
2251-
2252-
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253-
2254-
same_site_cookie_attribute: Optional[str] = None
2255-
"""
2256-
Sets the SameSite cookie setting, which provides increased security against CSRF
2257-
attacks.
2258-
"""
2259-
2260-
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261-
"""Configuration for provisioning to this application via SCIM.
2262-
2263-
This is currently in closed beta.
2264-
"""
2265-
2266-
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267-
"""List of public domains that Access will secure.
2268-
2269-
This field is deprecated in favor of `destinations` and will be supported until
2270-
**November 21, 2025.** If `destinations` are provided, then
2271-
`self_hosted_domains` will be ignored.
2272-
"""
2273-
2274-
service_auth_401_redirect: Optional[bool] = None
2275-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276-
2277-
session_duration: Optional[str] = None
2278-
"""The amount of time that tokens issued for this application will be valid.
2279-
2280-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281-
ms, s, m, h.
2282-
"""
2283-
2284-
skip_interstitial: Optional[bool] = None
2285-
"""Enables automatic authentication through cloudflared."""
2286-
2287-
tags: Optional[List[str]] = None
2288-
"""The tags you want assigned to an application.
2289-
2290-
Tags are used to filter applications in the App Launcher dashboard.
2291-
"""
2292-
2293-
updated_at: Optional[datetime] = None
2294-
2295-
22961987
ApplicationGetResponse: TypeAlias = Union[
22971988
SelfHostedApplication,
22981989
SaaSApplication,
@@ -2303,5 +1994,4 @@ class BrowserRdpApplication(BaseModel):
23031994
BrowserIsolationPermissionsApplication,
23041995
BookmarkApplication,
23051996
InfrastructureApplication,
2306-
BrowserRdpApplication,
23071997
]

‎src/cloudflare/types/zero_trust/access/application_list_response.py

-310
Original file line numberDiff line numberDiff line change
@@ -102,17 +102,6 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105-
"BrowserRdpApplication",
106-
"BrowserRdpApplicationTargetCriterion",
107-
"BrowserRdpApplicationDestination",
108-
"BrowserRdpApplicationDestinationPublicDestination",
109-
"BrowserRdpApplicationDestinationPrivateDestination",
110-
"BrowserRdpApplicationPolicy",
111-
"BrowserRdpApplicationSCIMConfig",
112-
"BrowserRdpApplicationSCIMConfigAuthentication",
113-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
116105
]
117106

118107

@@ -1995,304 +1984,6 @@ class InfrastructureApplication(BaseModel):
19951984
updated_at: Optional[datetime] = None
19961985

19971986

1998-
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999-
port: int
2000-
"""The port that the targets use for the chosen communication protocol.
2001-
2002-
A port cannot be assigned to multiple protocols.
2003-
"""
2004-
2005-
protocol: Literal["ssh"]
2006-
"""The communication protocol your application secures."""
2007-
2008-
target_attributes: Dict[str, List[str]]
2009-
"""Contains a map of target attribute keys to target attribute values."""
2010-
2011-
2012-
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013-
type: Optional[Literal["public"]] = None
2014-
2015-
uri: Optional[str] = None
2016-
"""The URI of the destination.
2017-
2018-
Public destinations' URIs can include a domain and path with
2019-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020-
"""
2021-
2022-
2023-
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024-
cidr: Optional[str] = None
2025-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026-
2027-
hostname: Optional[str] = None
2028-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029-
2030-
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031-
"""The L4 protocol of the destination.
2032-
2033-
When omitted, both UDP and TCP traffic will match.
2034-
"""
2035-
2036-
port_range: Optional[str] = None
2037-
"""The port range of the destination.
2038-
2039-
Can be a single port or a range of ports. When omitted, all ports will match.
2040-
"""
2041-
2042-
type: Optional[Literal["private"]] = None
2043-
2044-
vnet_id: Optional[str] = None
2045-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046-
2047-
2048-
BrowserRdpApplicationDestination: TypeAlias = Union[
2049-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050-
]
2051-
2052-
2053-
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054-
precedence: Optional[int] = None
2055-
"""The order of execution for this policy.
2056-
2057-
Must be unique for each policy within an app.
2058-
"""
2059-
2060-
2061-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062-
client_id: str
2063-
"""
2064-
Client ID of the Access service token used to authenticate with the remote
2065-
service.
2066-
"""
2067-
2068-
client_secret: str
2069-
"""
2070-
Client secret of the Access service token used to authenticate with the remote
2071-
service.
2072-
"""
2073-
2074-
scheme: Literal["access_service_token"]
2075-
"""The authentication scheme to use when making SCIM requests to this application."""
2076-
2077-
2078-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079-
BaseModel
2080-
):
2081-
client_id: str
2082-
"""
2083-
Client ID of the Access service token used to authenticate with the remote
2084-
service.
2085-
"""
2086-
2087-
client_secret: str
2088-
"""
2089-
Client secret of the Access service token used to authenticate with the remote
2090-
service.
2091-
"""
2092-
2093-
scheme: Literal["access_service_token"]
2094-
"""The authentication scheme to use when making SCIM requests to this application."""
2095-
2096-
2097-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098-
SCIMConfigAuthenticationHTTPBasic,
2099-
SCIMConfigAuthenticationOAuthBearerToken,
2100-
SCIMConfigAuthenticationOauth2,
2101-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102-
]
2103-
2104-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105-
SCIMConfigAuthenticationHTTPBasic,
2106-
SCIMConfigAuthenticationOAuthBearerToken,
2107-
SCIMConfigAuthenticationOauth2,
2108-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109-
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110-
]
2111-
2112-
2113-
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114-
idp_uid: str
2115-
"""
2116-
The UID of the IdP to use as the source for SCIM resources to provision to this
2117-
application.
2118-
"""
2119-
2120-
remote_uri: str
2121-
"""The base URI for the application's SCIM-compatible API."""
2122-
2123-
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124-
"""
2125-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126-
provisioning to an application.
2127-
"""
2128-
2129-
deactivate_on_delete: Optional[bool] = None
2130-
"""
2131-
If false, propagates DELETE requests to the target application for SCIM
2132-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133-
targets do not support DELETE operations.
2134-
"""
2135-
2136-
enabled: Optional[bool] = None
2137-
"""Whether SCIM provisioning is turned on for this application."""
2138-
2139-
mappings: Optional[List[SCIMConfigMapping]] = None
2140-
"""
2141-
A list of mappings to apply to SCIM resources before provisioning them in this
2142-
application. These can transform or filter the resources to be provisioned.
2143-
"""
2144-
2145-
2146-
class BrowserRdpApplication(BaseModel):
2147-
domain: str
2148-
"""The primary hostname and path secured by Access.
2149-
2150-
This domain will be displayed if the app is visible in the App Launcher.
2151-
"""
2152-
2153-
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154-
2155-
type: str
2156-
"""The application type."""
2157-
2158-
id: Optional[str] = None
2159-
"""UUID"""
2160-
2161-
allow_authenticate_via_warp: Optional[bool] = None
2162-
"""
2163-
When set to true, users can authenticate to this application using their WARP
2164-
session. When set to false this application will always require direct IdP
2165-
authentication. This setting always overrides the organization setting for WARP
2166-
authentication.
2167-
"""
2168-
2169-
allowed_idps: Optional[List[AllowedIdPs]] = None
2170-
"""The identity providers your users can select when connecting to this
2171-
application.
2172-
2173-
Defaults to all IdPs configured in your account.
2174-
"""
2175-
2176-
app_launcher_visible: Optional[bool] = None
2177-
"""Displays the application in the App Launcher."""
2178-
2179-
aud: Optional[str] = None
2180-
"""Audience tag."""
2181-
2182-
auto_redirect_to_identity: Optional[bool] = None
2183-
"""When set to `true`, users skip the identity provider selection step during
2184-
login.
2185-
2186-
You must specify only one identity provider in allowed_idps.
2187-
"""
2188-
2189-
cors_headers: Optional[CORSHeaders] = None
2190-
2191-
created_at: Optional[datetime] = None
2192-
2193-
custom_deny_message: Optional[str] = None
2194-
"""
2195-
The custom error message shown to a user when they are denied access to the
2196-
application.
2197-
"""
2198-
2199-
custom_deny_url: Optional[str] = None
2200-
"""
2201-
The custom URL a user is redirected to when they are denied access to the
2202-
application when failing identity-based rules.
2203-
"""
2204-
2205-
custom_non_identity_deny_url: Optional[str] = None
2206-
"""
2207-
The custom URL a user is redirected to when they are denied access to the
2208-
application when failing non-identity rules.
2209-
"""
2210-
2211-
custom_pages: Optional[List[str]] = None
2212-
"""The custom pages that will be displayed when applicable for this application"""
2213-
2214-
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215-
"""List of destinations secured by Access.
2216-
2217-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218-
different types of domains. If `destinations` are provided, then
2219-
`self_hosted_domains` will be ignored.
2220-
"""
2221-
2222-
enable_binding_cookie: Optional[bool] = None
2223-
"""
2224-
Enables the binding cookie, which increases security against compromised
2225-
authorization tokens and CSRF attacks.
2226-
"""
2227-
2228-
http_only_cookie_attribute: Optional[bool] = None
2229-
"""
2230-
Enables the HttpOnly cookie attribute, which increases security against XSS
2231-
attacks.
2232-
"""
2233-
2234-
logo_url: Optional[str] = None
2235-
"""The image URL for the logo shown in the App Launcher dashboard."""
2236-
2237-
name: Optional[str] = None
2238-
"""The name of the application."""
2239-
2240-
options_preflight_bypass: Optional[bool] = None
2241-
"""
2242-
Allows options preflight requests to bypass Access authentication and go
2243-
directly to the origin. Cannot turn on if cors_headers is set.
2244-
"""
2245-
2246-
path_cookie_attribute: Optional[bool] = None
2247-
"""Enables cookie paths to scope an application's JWT to the application path.
2248-
2249-
If disabled, the JWT will scope to the hostname by default
2250-
"""
2251-
2252-
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253-
2254-
same_site_cookie_attribute: Optional[str] = None
2255-
"""
2256-
Sets the SameSite cookie setting, which provides increased security against CSRF
2257-
attacks.
2258-
"""
2259-
2260-
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261-
"""Configuration for provisioning to this application via SCIM.
2262-
2263-
This is currently in closed beta.
2264-
"""
2265-
2266-
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267-
"""List of public domains that Access will secure.
2268-
2269-
This field is deprecated in favor of `destinations` and will be supported until
2270-
**November 21, 2025.** If `destinations` are provided, then
2271-
`self_hosted_domains` will be ignored.
2272-
"""
2273-
2274-
service_auth_401_redirect: Optional[bool] = None
2275-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276-
2277-
session_duration: Optional[str] = None
2278-
"""The amount of time that tokens issued for this application will be valid.
2279-
2280-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281-
ms, s, m, h.
2282-
"""
2283-
2284-
skip_interstitial: Optional[bool] = None
2285-
"""Enables automatic authentication through cloudflared."""
2286-
2287-
tags: Optional[List[str]] = None
2288-
"""The tags you want assigned to an application.
2289-
2290-
Tags are used to filter applications in the App Launcher dashboard.
2291-
"""
2292-
2293-
updated_at: Optional[datetime] = None
2294-
2295-
22961987
ApplicationListResponse: TypeAlias = Union[
22971988
SelfHostedApplication,
22981989
SaaSApplication,
@@ -2303,5 +1994,4 @@ class BrowserRdpApplication(BaseModel):
23031994
BrowserIsolationPermissionsApplication,
23041995
BookmarkApplication,
23051996
InfrastructureApplication,
2306-
BrowserRdpApplication,
23071997
]

‎src/cloudflare/types/zero_trust/access/application_type.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,5 @@
55
__all__ = ["ApplicationType"]
66

77
ApplicationType: TypeAlias = Literal[
8-
"self_hosted", "saas", "ssh", "vnc", "app_launcher", "warp", "biso", "bookmark", "dash_sso", "infrastructure", "rdp"
8+
"self_hosted", "saas", "ssh", "vnc", "app_launcher", "warp", "biso", "bookmark", "dash_sso", "infrastructure"
99
]

‎src/cloudflare/types/zero_trust/access/application_update_params.py

-363
Original file line numberDiff line numberDiff line change
@@ -111,19 +111,6 @@
111111
"InfrastructureApplicationPolicy",
112112
"InfrastructureApplicationPolicyConnectionRules",
113113
"InfrastructureApplicationPolicyConnectionRulesSSH",
114-
"BrowserRdpApplication",
115-
"BrowserRdpApplicationTargetCriterion",
116-
"BrowserRdpApplicationDestination",
117-
"BrowserRdpApplicationDestinationPublicDestination",
118-
"BrowserRdpApplicationDestinationPrivateDestination",
119-
"BrowserRdpApplicationPolicy",
120-
"BrowserRdpApplicationPolicyAccessAppPolicyLink",
121-
"BrowserRdpApplicationPolicyUnionMember2",
122-
"BrowserRdpApplicationSCIMConfig",
123-
"BrowserRdpApplicationSCIMConfigAuthentication",
124-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
125-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
126-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
127114
]
128115

129116

@@ -2230,355 +2217,6 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
22302217
"""
22312218

22322219

2233-
class BrowserRdpApplication(TypedDict, total=False):
2234-
domain: Required[str]
2235-
"""The primary hostname and path secured by Access.
2236-
2237-
This domain will be displayed if the app is visible in the App Launcher.
2238-
"""
2239-
2240-
target_criteria: Required[Iterable[BrowserRdpApplicationTargetCriterion]]
2241-
2242-
type: Required[str]
2243-
"""The application type."""
2244-
2245-
account_id: str
2246-
"""The Account ID to use for this endpoint. Mutually exclusive with the Zone ID."""
2247-
2248-
zone_id: str
2249-
"""The Zone ID to use for this endpoint. Mutually exclusive with the Account ID."""
2250-
2251-
allow_authenticate_via_warp: bool
2252-
"""
2253-
When set to true, users can authenticate to this application using their WARP
2254-
session. When set to false this application will always require direct IdP
2255-
authentication. This setting always overrides the organization setting for WARP
2256-
authentication.
2257-
"""
2258-
2259-
allowed_idps: List[AllowedIdPs]
2260-
"""The identity providers your users can select when connecting to this
2261-
application.
2262-
2263-
Defaults to all IdPs configured in your account.
2264-
"""
2265-
2266-
app_launcher_visible: bool
2267-
"""Displays the application in the App Launcher."""
2268-
2269-
auto_redirect_to_identity: bool
2270-
"""When set to `true`, users skip the identity provider selection step during
2271-
login.
2272-
2273-
You must specify only one identity provider in allowed_idps.
2274-
"""
2275-
2276-
cors_headers: CORSHeadersParam
2277-
2278-
custom_deny_message: str
2279-
"""
2280-
The custom error message shown to a user when they are denied access to the
2281-
application.
2282-
"""
2283-
2284-
custom_deny_url: str
2285-
"""
2286-
The custom URL a user is redirected to when they are denied access to the
2287-
application when failing identity-based rules.
2288-
"""
2289-
2290-
custom_non_identity_deny_url: str
2291-
"""
2292-
The custom URL a user is redirected to when they are denied access to the
2293-
application when failing non-identity rules.
2294-
"""
2295-
2296-
custom_pages: List[str]
2297-
"""The custom pages that will be displayed when applicable for this application"""
2298-
2299-
destinations: Iterable[BrowserRdpApplicationDestination]
2300-
"""List of destinations secured by Access.
2301-
2302-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2303-
different types of domains. If `destinations` are provided, then
2304-
`self_hosted_domains` will be ignored.
2305-
"""
2306-
2307-
enable_binding_cookie: bool
2308-
"""
2309-
Enables the binding cookie, which increases security against compromised
2310-
authorization tokens and CSRF attacks.
2311-
"""
2312-
2313-
http_only_cookie_attribute: bool
2314-
"""
2315-
Enables the HttpOnly cookie attribute, which increases security against XSS
2316-
attacks.
2317-
"""
2318-
2319-
logo_url: str
2320-
"""The image URL for the logo shown in the App Launcher dashboard."""
2321-
2322-
name: str
2323-
"""The name of the application."""
2324-
2325-
options_preflight_bypass: bool
2326-
"""
2327-
Allows options preflight requests to bypass Access authentication and go
2328-
directly to the origin. Cannot turn on if cors_headers is set.
2329-
"""
2330-
2331-
path_cookie_attribute: bool
2332-
"""Enables cookie paths to scope an application's JWT to the application path.
2333-
2334-
If disabled, the JWT will scope to the hostname by default
2335-
"""
2336-
2337-
policies: List[BrowserRdpApplicationPolicy]
2338-
"""
2339-
The policies that Access applies to the application, in ascending order of
2340-
precedence. Items can reference existing policies or create new policies
2341-
exclusive to the application.
2342-
"""
2343-
2344-
same_site_cookie_attribute: str
2345-
"""
2346-
Sets the SameSite cookie setting, which provides increased security against CSRF
2347-
attacks.
2348-
"""
2349-
2350-
scim_config: BrowserRdpApplicationSCIMConfig
2351-
"""Configuration for provisioning to this application via SCIM.
2352-
2353-
This is currently in closed beta.
2354-
"""
2355-
2356-
self_hosted_domains: List[SelfHostedDomains]
2357-
"""List of public domains that Access will secure.
2358-
2359-
This field is deprecated in favor of `destinations` and will be supported until
2360-
**November 21, 2025.** If `destinations` are provided, then
2361-
`self_hosted_domains` will be ignored.
2362-
"""
2363-
2364-
service_auth_401_redirect: bool
2365-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2366-
2367-
session_duration: str
2368-
"""The amount of time that tokens issued for this application will be valid.
2369-
2370-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2371-
ms, s, m, h.
2372-
"""
2373-
2374-
skip_interstitial: bool
2375-
"""Enables automatic authentication through cloudflared."""
2376-
2377-
tags: List[str]
2378-
"""The tags you want assigned to an application.
2379-
2380-
Tags are used to filter applications in the App Launcher dashboard.
2381-
"""
2382-
2383-
2384-
class BrowserRdpApplicationTargetCriterion(TypedDict, total=False):
2385-
port: Required[int]
2386-
"""The port that the targets use for the chosen communication protocol.
2387-
2388-
A port cannot be assigned to multiple protocols.
2389-
"""
2390-
2391-
protocol: Required[Literal["ssh"]]
2392-
"""The communication protocol your application secures."""
2393-
2394-
target_attributes: Required[Dict[str, List[str]]]
2395-
"""Contains a map of target attribute keys to target attribute values."""
2396-
2397-
2398-
class BrowserRdpApplicationDestinationPublicDestination(TypedDict, total=False):
2399-
type: Literal["public"]
2400-
2401-
uri: str
2402-
"""The URI of the destination.
2403-
2404-
Public destinations' URIs can include a domain and path with
2405-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2406-
"""
2407-
2408-
2409-
class BrowserRdpApplicationDestinationPrivateDestination(TypedDict, total=False):
2410-
cidr: str
2411-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2412-
2413-
hostname: str
2414-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2415-
2416-
l4_protocol: Literal["tcp", "udp"]
2417-
"""The L4 protocol of the destination.
2418-
2419-
When omitted, both UDP and TCP traffic will match.
2420-
"""
2421-
2422-
port_range: str
2423-
"""The port range of the destination.
2424-
2425-
Can be a single port or a range of ports. When omitted, all ports will match.
2426-
"""
2427-
2428-
type: Literal["private"]
2429-
2430-
vnet_id: str
2431-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2432-
2433-
2434-
BrowserRdpApplicationDestination: TypeAlias = Union[
2435-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2436-
]
2437-
2438-
2439-
class BrowserRdpApplicationPolicyAccessAppPolicyLink(TypedDict, total=False):
2440-
id: str
2441-
"""The UUID of the policy"""
2442-
2443-
precedence: int
2444-
"""The order of execution for this policy.
2445-
2446-
Must be unique for each policy within an app.
2447-
"""
2448-
2449-
2450-
class BrowserRdpApplicationPolicyUnionMember2(TypedDict, total=False):
2451-
id: str
2452-
"""The UUID of the policy"""
2453-
2454-
approval_groups: Iterable[ApprovalGroupParam]
2455-
"""Administrators who can approve a temporary authentication request."""
2456-
2457-
approval_required: bool
2458-
"""
2459-
Requires the user to request access from an administrator at the start of each
2460-
session.
2461-
"""
2462-
2463-
isolation_required: bool
2464-
"""
2465-
Require this application to be served in an isolated browser for users matching
2466-
this policy. 'Client Web Isolation' must be on for the account in order to use
2467-
this feature.
2468-
"""
2469-
2470-
precedence: int
2471-
"""The order of execution for this policy.
2472-
2473-
Must be unique for each policy within an app.
2474-
"""
2475-
2476-
purpose_justification_prompt: str
2477-
"""A custom message that will appear on the purpose justification screen."""
2478-
2479-
purpose_justification_required: bool
2480-
"""Require users to enter a justification when they log in to the application."""
2481-
2482-
session_duration: str
2483-
"""The amount of time that tokens issued for the application will be valid.
2484-
2485-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2486-
ms, s, m, h.
2487-
"""
2488-
2489-
2490-
BrowserRdpApplicationPolicy: TypeAlias = Union[
2491-
BrowserRdpApplicationPolicyAccessAppPolicyLink, str, BrowserRdpApplicationPolicyUnionMember2
2492-
]
2493-
2494-
2495-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2496-
TypedDict, total=False
2497-
):
2498-
client_id: Required[str]
2499-
"""
2500-
Client ID of the Access service token used to authenticate with the remote
2501-
service.
2502-
"""
2503-
2504-
client_secret: Required[str]
2505-
"""
2506-
Client secret of the Access service token used to authenticate with the remote
2507-
service.
2508-
"""
2509-
2510-
scheme: Required[Literal["access_service_token"]]
2511-
"""The authentication scheme to use when making SCIM requests to this application."""
2512-
2513-
2514-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2515-
TypedDict, total=False
2516-
):
2517-
client_id: Required[str]
2518-
"""
2519-
Client ID of the Access service token used to authenticate with the remote
2520-
service.
2521-
"""
2522-
2523-
client_secret: Required[str]
2524-
"""
2525-
Client secret of the Access service token used to authenticate with the remote
2526-
service.
2527-
"""
2528-
2529-
scheme: Required[Literal["access_service_token"]]
2530-
"""The authentication scheme to use when making SCIM requests to this application."""
2531-
2532-
2533-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2534-
SCIMConfigAuthenticationHTTPBasicParam,
2535-
SCIMConfigAuthenticationOAuthBearerTokenParam,
2536-
SCIMConfigAuthenticationOauth2Param,
2537-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2538-
]
2539-
2540-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2541-
SCIMConfigAuthenticationHTTPBasicParam,
2542-
SCIMConfigAuthenticationOAuthBearerTokenParam,
2543-
SCIMConfigAuthenticationOauth2Param,
2544-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2545-
Iterable[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2546-
]
2547-
2548-
2549-
class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
2550-
idp_uid: Required[str]
2551-
"""
2552-
The UID of the IdP to use as the source for SCIM resources to provision to this
2553-
application.
2554-
"""
2555-
2556-
remote_uri: Required[str]
2557-
"""The base URI for the application's SCIM-compatible API."""
2558-
2559-
authentication: BrowserRdpApplicationSCIMConfigAuthentication
2560-
"""
2561-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2562-
provisioning to an application.
2563-
"""
2564-
2565-
deactivate_on_delete: bool
2566-
"""
2567-
If false, propagates DELETE requests to the target application for SCIM
2568-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2569-
targets do not support DELETE operations.
2570-
"""
2571-
2572-
enabled: bool
2573-
"""Whether SCIM provisioning is turned on for this application."""
2574-
2575-
mappings: Iterable[SCIMConfigMappingParam]
2576-
"""
2577-
A list of mappings to apply to SCIM resources before provisioning them in this
2578-
application. These can transform or filter the resources to be provisioned.
2579-
"""
2580-
2581-
25822220
ApplicationUpdateParams: TypeAlias = Union[
25832221
SelfHostedApplication,
25842222
SaaSApplication,
@@ -2589,5 +2227,4 @@ class BrowserRdpApplicationSCIMConfig(TypedDict, total=False):
25892227
BrowserIsolationPermissionsApplication,
25902228
BookmarkApplication,
25912229
InfrastructureApplication,
2592-
BrowserRdpApplication,
25932230
]

‎src/cloudflare/types/zero_trust/access/application_update_response.py

-310
Original file line numberDiff line numberDiff line change
@@ -102,17 +102,6 @@
102102
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
103103
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
104104
"InfrastructureApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
105-
"BrowserRdpApplication",
106-
"BrowserRdpApplicationTargetCriterion",
107-
"BrowserRdpApplicationDestination",
108-
"BrowserRdpApplicationDestinationPublicDestination",
109-
"BrowserRdpApplicationDestinationPrivateDestination",
110-
"BrowserRdpApplicationPolicy",
111-
"BrowserRdpApplicationSCIMConfig",
112-
"BrowserRdpApplicationSCIMConfigAuthentication",
113-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
114-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication",
115-
"BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken",
116105
]
117106

118107

@@ -1995,304 +1984,6 @@ class InfrastructureApplication(BaseModel):
19951984
updated_at: Optional[datetime] = None
19961985

19971986

1998-
class BrowserRdpApplicationTargetCriterion(BaseModel):
1999-
port: int
2000-
"""The port that the targets use for the chosen communication protocol.
2001-
2002-
A port cannot be assigned to multiple protocols.
2003-
"""
2004-
2005-
protocol: Literal["ssh"]
2006-
"""The communication protocol your application secures."""
2007-
2008-
target_attributes: Dict[str, List[str]]
2009-
"""Contains a map of target attribute keys to target attribute values."""
2010-
2011-
2012-
class BrowserRdpApplicationDestinationPublicDestination(BaseModel):
2013-
type: Optional[Literal["public"]] = None
2014-
2015-
uri: Optional[str] = None
2016-
"""The URI of the destination.
2017-
2018-
Public destinations' URIs can include a domain and path with
2019-
[wildcards](https://developers.cloudflare.com/cloudflare-one/policies/access/app-paths/).
2020-
"""
2021-
2022-
2023-
class BrowserRdpApplicationDestinationPrivateDestination(BaseModel):
2024-
cidr: Optional[str] = None
2025-
"""The CIDR range of the destination. Single IPs will be computed as /32."""
2026-
2027-
hostname: Optional[str] = None
2028-
"""The hostname of the destination. Matches a valid SNI served by an HTTPS origin."""
2029-
2030-
l4_protocol: Optional[Literal["tcp", "udp"]] = None
2031-
"""The L4 protocol of the destination.
2032-
2033-
When omitted, both UDP and TCP traffic will match.
2034-
"""
2035-
2036-
port_range: Optional[str] = None
2037-
"""The port range of the destination.
2038-
2039-
Can be a single port or a range of ports. When omitted, all ports will match.
2040-
"""
2041-
2042-
type: Optional[Literal["private"]] = None
2043-
2044-
vnet_id: Optional[str] = None
2045-
"""The VNET ID to match the destination. When omitted, all VNETs will match."""
2046-
2047-
2048-
BrowserRdpApplicationDestination: TypeAlias = Union[
2049-
BrowserRdpApplicationDestinationPublicDestination, BrowserRdpApplicationDestinationPrivateDestination
2050-
]
2051-
2052-
2053-
class BrowserRdpApplicationPolicy(ApplicationPolicy):
2054-
precedence: Optional[int] = None
2055-
"""The order of execution for this policy.
2056-
2057-
Must be unique for each policy within an app.
2058-
"""
2059-
2060-
2061-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(BaseModel):
2062-
client_id: str
2063-
"""
2064-
Client ID of the Access service token used to authenticate with the remote
2065-
service.
2066-
"""
2067-
2068-
client_secret: str
2069-
"""
2070-
Client secret of the Access service token used to authenticate with the remote
2071-
service.
2072-
"""
2073-
2074-
scheme: Literal["access_service_token"]
2075-
"""The authentication scheme to use when making SCIM requests to this application."""
2076-
2077-
2078-
class BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken(
2079-
BaseModel
2080-
):
2081-
client_id: str
2082-
"""
2083-
Client ID of the Access service token used to authenticate with the remote
2084-
service.
2085-
"""
2086-
2087-
client_secret: str
2088-
"""
2089-
Client secret of the Access service token used to authenticate with the remote
2090-
service.
2091-
"""
2092-
2093-
scheme: Literal["access_service_token"]
2094-
"""The authentication scheme to use when making SCIM requests to this application."""
2095-
2096-
2097-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication: TypeAlias = Union[
2098-
SCIMConfigAuthenticationHTTPBasic,
2099-
SCIMConfigAuthenticationOAuthBearerToken,
2100-
SCIMConfigAuthenticationOauth2,
2101-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2102-
]
2103-
2104-
BrowserRdpApplicationSCIMConfigAuthentication: TypeAlias = Union[
2105-
SCIMConfigAuthenticationHTTPBasic,
2106-
SCIMConfigAuthenticationOAuthBearerToken,
2107-
SCIMConfigAuthenticationOauth2,
2108-
BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigAuthenticationAccessServiceToken,
2109-
List[BrowserRdpApplicationSCIMConfigAuthenticationAccessSCIMConfigMultiAuthentication],
2110-
]
2111-
2112-
2113-
class BrowserRdpApplicationSCIMConfig(BaseModel):
2114-
idp_uid: str
2115-
"""
2116-
The UID of the IdP to use as the source for SCIM resources to provision to this
2117-
application.
2118-
"""
2119-
2120-
remote_uri: str
2121-
"""The base URI for the application's SCIM-compatible API."""
2122-
2123-
authentication: Optional[BrowserRdpApplicationSCIMConfigAuthentication] = None
2124-
"""
2125-
Attributes for configuring HTTP Basic authentication scheme for SCIM
2126-
provisioning to an application.
2127-
"""
2128-
2129-
deactivate_on_delete: Optional[bool] = None
2130-
"""
2131-
If false, propagates DELETE requests to the target application for SCIM
2132-
resources. If true, sets 'active' to false on the SCIM resource. Note: Some
2133-
targets do not support DELETE operations.
2134-
"""
2135-
2136-
enabled: Optional[bool] = None
2137-
"""Whether SCIM provisioning is turned on for this application."""
2138-
2139-
mappings: Optional[List[SCIMConfigMapping]] = None
2140-
"""
2141-
A list of mappings to apply to SCIM resources before provisioning them in this
2142-
application. These can transform or filter the resources to be provisioned.
2143-
"""
2144-
2145-
2146-
class BrowserRdpApplication(BaseModel):
2147-
domain: str
2148-
"""The primary hostname and path secured by Access.
2149-
2150-
This domain will be displayed if the app is visible in the App Launcher.
2151-
"""
2152-
2153-
target_criteria: List[BrowserRdpApplicationTargetCriterion]
2154-
2155-
type: str
2156-
"""The application type."""
2157-
2158-
id: Optional[str] = None
2159-
"""UUID"""
2160-
2161-
allow_authenticate_via_warp: Optional[bool] = None
2162-
"""
2163-
When set to true, users can authenticate to this application using their WARP
2164-
session. When set to false this application will always require direct IdP
2165-
authentication. This setting always overrides the organization setting for WARP
2166-
authentication.
2167-
"""
2168-
2169-
allowed_idps: Optional[List[AllowedIdPs]] = None
2170-
"""The identity providers your users can select when connecting to this
2171-
application.
2172-
2173-
Defaults to all IdPs configured in your account.
2174-
"""
2175-
2176-
app_launcher_visible: Optional[bool] = None
2177-
"""Displays the application in the App Launcher."""
2178-
2179-
aud: Optional[str] = None
2180-
"""Audience tag."""
2181-
2182-
auto_redirect_to_identity: Optional[bool] = None
2183-
"""When set to `true`, users skip the identity provider selection step during
2184-
login.
2185-
2186-
You must specify only one identity provider in allowed_idps.
2187-
"""
2188-
2189-
cors_headers: Optional[CORSHeaders] = None
2190-
2191-
created_at: Optional[datetime] = None
2192-
2193-
custom_deny_message: Optional[str] = None
2194-
"""
2195-
The custom error message shown to a user when they are denied access to the
2196-
application.
2197-
"""
2198-
2199-
custom_deny_url: Optional[str] = None
2200-
"""
2201-
The custom URL a user is redirected to when they are denied access to the
2202-
application when failing identity-based rules.
2203-
"""
2204-
2205-
custom_non_identity_deny_url: Optional[str] = None
2206-
"""
2207-
The custom URL a user is redirected to when they are denied access to the
2208-
application when failing non-identity rules.
2209-
"""
2210-
2211-
custom_pages: Optional[List[str]] = None
2212-
"""The custom pages that will be displayed when applicable for this application"""
2213-
2214-
destinations: Optional[List[BrowserRdpApplicationDestination]] = None
2215-
"""List of destinations secured by Access.
2216-
2217-
This supersedes `self_hosted_domains` to allow for more flexibility in defining
2218-
different types of domains. If `destinations` are provided, then
2219-
`self_hosted_domains` will be ignored.
2220-
"""
2221-
2222-
enable_binding_cookie: Optional[bool] = None
2223-
"""
2224-
Enables the binding cookie, which increases security against compromised
2225-
authorization tokens and CSRF attacks.
2226-
"""
2227-
2228-
http_only_cookie_attribute: Optional[bool] = None
2229-
"""
2230-
Enables the HttpOnly cookie attribute, which increases security against XSS
2231-
attacks.
2232-
"""
2233-
2234-
logo_url: Optional[str] = None
2235-
"""The image URL for the logo shown in the App Launcher dashboard."""
2236-
2237-
name: Optional[str] = None
2238-
"""The name of the application."""
2239-
2240-
options_preflight_bypass: Optional[bool] = None
2241-
"""
2242-
Allows options preflight requests to bypass Access authentication and go
2243-
directly to the origin. Cannot turn on if cors_headers is set.
2244-
"""
2245-
2246-
path_cookie_attribute: Optional[bool] = None
2247-
"""Enables cookie paths to scope an application's JWT to the application path.
2248-
2249-
If disabled, the JWT will scope to the hostname by default
2250-
"""
2251-
2252-
policies: Optional[List[BrowserRdpApplicationPolicy]] = None
2253-
2254-
same_site_cookie_attribute: Optional[str] = None
2255-
"""
2256-
Sets the SameSite cookie setting, which provides increased security against CSRF
2257-
attacks.
2258-
"""
2259-
2260-
scim_config: Optional[BrowserRdpApplicationSCIMConfig] = None
2261-
"""Configuration for provisioning to this application via SCIM.
2262-
2263-
This is currently in closed beta.
2264-
"""
2265-
2266-
self_hosted_domains: Optional[List[SelfHostedDomains]] = None
2267-
"""List of public domains that Access will secure.
2268-
2269-
This field is deprecated in favor of `destinations` and will be supported until
2270-
**November 21, 2025.** If `destinations` are provided, then
2271-
`self_hosted_domains` will be ignored.
2272-
"""
2273-
2274-
service_auth_401_redirect: Optional[bool] = None
2275-
"""Returns a 401 status code when the request is blocked by a Service Auth policy."""
2276-
2277-
session_duration: Optional[str] = None
2278-
"""The amount of time that tokens issued for this application will be valid.
2279-
2280-
Must be in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs),
2281-
ms, s, m, h.
2282-
"""
2283-
2284-
skip_interstitial: Optional[bool] = None
2285-
"""Enables automatic authentication through cloudflared."""
2286-
2287-
tags: Optional[List[str]] = None
2288-
"""The tags you want assigned to an application.
2289-
2290-
Tags are used to filter applications in the App Launcher dashboard.
2291-
"""
2292-
2293-
updated_at: Optional[datetime] = None
2294-
2295-
22961987
ApplicationUpdateResponse: TypeAlias = Union[
22971988
SelfHostedApplication,
22981989
SaaSApplication,
@@ -2303,5 +1994,4 @@ class BrowserRdpApplication(BaseModel):
23031994
BrowserIsolationPermissionsApplication,
23041995
BookmarkApplication,
23051996
InfrastructureApplication,
2306-
BrowserRdpApplication,
23071997
]

‎tests/api_resources/cloudforce_one/test_threat_events.py

+92-32
Original file line numberDiff line numberDiff line change
@@ -27,33 +27,55 @@ class TestThreatEvents:
2727
@parametrize
2828
def test_method_create(self, client: Cloudflare) -> None:
2929
threat_event = client.cloudforce_one.threat_events.create(
30-
account_id=0,
30+
path_account_id=0,
31+
attacker="Flying Yeti",
32+
attacker_country="CN",
33+
category="Domain Resolution",
34+
date=parse_datetime("2022-04-01T00:00:00Z"),
35+
event="An attacker registered the domain domain.com",
36+
indicator_type="domain",
37+
raw={},
38+
tlp="amber",
3139
)
3240
assert_matches_type(ThreatEventCreateResponse, threat_event, path=["response"])
3341

3442
@parametrize
3543
def test_method_create_with_all_params(self, client: Cloudflare) -> None:
3644
threat_event = client.cloudforce_one.threat_events.create(
37-
account_id=0,
38-
dataset_id=["7632a037-fdef-4899-9b12-148470aae772"],
39-
order="asc",
40-
order_by="created",
41-
page=1,
42-
page_size=100,
43-
search=[
44-
{
45-
"field": "attackerCountry",
46-
"op": "equals",
47-
"value": "usa",
48-
}
49-
],
45+
path_account_id=0,
46+
attacker="Flying Yeti",
47+
attacker_country="CN",
48+
category="Domain Resolution",
49+
date=parse_datetime("2022-04-01T00:00:00Z"),
50+
event="An attacker registered the domain domain.com",
51+
indicator_type="domain",
52+
raw={
53+
"data": {},
54+
"source": "example.com",
55+
"tlp": "amber",
56+
},
57+
tlp="amber",
58+
body_account_id=123456,
59+
dataset_id="durableObjectName",
60+
indicator="domain.com",
61+
tags=["malware"],
62+
target_country="US",
63+
target_industry="Agriculture",
5064
)
5165
assert_matches_type(ThreatEventCreateResponse, threat_event, path=["response"])
5266

5367
@parametrize
5468
def test_raw_response_create(self, client: Cloudflare) -> None:
5569
response = client.cloudforce_one.threat_events.with_raw_response.create(
56-
account_id=0,
70+
path_account_id=0,
71+
attacker="Flying Yeti",
72+
attacker_country="CN",
73+
category="Domain Resolution",
74+
date=parse_datetime("2022-04-01T00:00:00Z"),
75+
event="An attacker registered the domain domain.com",
76+
indicator_type="domain",
77+
raw={},
78+
tlp="amber",
5779
)
5880

5981
assert response.is_closed is True
@@ -64,7 +86,15 @@ def test_raw_response_create(self, client: Cloudflare) -> None:
6486
@parametrize
6587
def test_streaming_response_create(self, client: Cloudflare) -> None:
6688
with client.cloudforce_one.threat_events.with_streaming_response.create(
67-
account_id=0,
89+
path_account_id=0,
90+
attacker="Flying Yeti",
91+
attacker_country="CN",
92+
category="Domain Resolution",
93+
date=parse_datetime("2022-04-01T00:00:00Z"),
94+
event="An attacker registered the domain domain.com",
95+
indicator_type="domain",
96+
raw={},
97+
tlp="amber",
6898
) as response:
6999
assert not response.is_closed
70100
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
@@ -295,33 +325,55 @@ class TestAsyncThreatEvents:
295325
@parametrize
296326
async def test_method_create(self, async_client: AsyncCloudflare) -> None:
297327
threat_event = await async_client.cloudforce_one.threat_events.create(
298-
account_id=0,
328+
path_account_id=0,
329+
attacker="Flying Yeti",
330+
attacker_country="CN",
331+
category="Domain Resolution",
332+
date=parse_datetime("2022-04-01T00:00:00Z"),
333+
event="An attacker registered the domain domain.com",
334+
indicator_type="domain",
335+
raw={},
336+
tlp="amber",
299337
)
300338
assert_matches_type(ThreatEventCreateResponse, threat_event, path=["response"])
301339

302340
@parametrize
303341
async def test_method_create_with_all_params(self, async_client: AsyncCloudflare) -> None:
304342
threat_event = await async_client.cloudforce_one.threat_events.create(
305-
account_id=0,
306-
dataset_id=["7632a037-fdef-4899-9b12-148470aae772"],
307-
order="asc",
308-
order_by="created",
309-
page=1,
310-
page_size=100,
311-
search=[
312-
{
313-
"field": "attackerCountry",
314-
"op": "equals",
315-
"value": "usa",
316-
}
317-
],
343+
path_account_id=0,
344+
attacker="Flying Yeti",
345+
attacker_country="CN",
346+
category="Domain Resolution",
347+
date=parse_datetime("2022-04-01T00:00:00Z"),
348+
event="An attacker registered the domain domain.com",
349+
indicator_type="domain",
350+
raw={
351+
"data": {},
352+
"source": "example.com",
353+
"tlp": "amber",
354+
},
355+
tlp="amber",
356+
body_account_id=123456,
357+
dataset_id="durableObjectName",
358+
indicator="domain.com",
359+
tags=["malware"],
360+
target_country="US",
361+
target_industry="Agriculture",
318362
)
319363
assert_matches_type(ThreatEventCreateResponse, threat_event, path=["response"])
320364

321365
@parametrize
322366
async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None:
323367
response = await async_client.cloudforce_one.threat_events.with_raw_response.create(
324-
account_id=0,
368+
path_account_id=0,
369+
attacker="Flying Yeti",
370+
attacker_country="CN",
371+
category="Domain Resolution",
372+
date=parse_datetime("2022-04-01T00:00:00Z"),
373+
event="An attacker registered the domain domain.com",
374+
indicator_type="domain",
375+
raw={},
376+
tlp="amber",
325377
)
326378

327379
assert response.is_closed is True
@@ -332,7 +384,15 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None:
332384
@parametrize
333385
async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> None:
334386
async with async_client.cloudforce_one.threat_events.with_streaming_response.create(
335-
account_id=0,
387+
path_account_id=0,
388+
attacker="Flying Yeti",
389+
attacker_country="CN",
390+
category="Domain Resolution",
391+
date=parse_datetime("2022-04-01T00:00:00Z"),
392+
event="An attacker registered the domain domain.com",
393+
indicator_type="domain",
394+
raw={},
395+
tlp="amber",
336396
) as response:
337397
assert not response.is_closed
338398
assert response.http_request.headers.get("X-Stainless-Lang") == "python"

‎tests/api_resources/zero_trust/access/test_applications.py

+48-906
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)
Please sign in to comment.