Skip to content

Commit c02d710

Browse files
chore(api): update composite API spec
1 parent 3e1d5c7 commit c02d710

13 files changed

Lines changed: 426 additions & 9 deletions

.stats.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 2126
22
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-2762d64c98ba5dada95c90ee399129785ac56914eba638ecc0620b5db06ecb38.yml
3-
openapi_spec_hash: cc66dc78b702a9ed159ad78aefede524
3+
openapi_spec_hash: ebe782c4592c06e7e22eb0a725cc326e
44
config_hash: a4389a4b44ba94e63c724848f563a9ec

src/cloudflare/resources/zero_trust/organizations/organizations.py

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,7 @@ def create(
7777
login_design: LoginDesignParam | Omit = omit,
7878
mfa_config: organization_create_params.MfaConfig | Omit = omit,
7979
mfa_required_for_all_apps: bool | Omit = omit,
80+
mfa_ssh_piv_key_requirements: organization_create_params.MfaSSHPivKeyRequirements | Omit = omit,
8081
session_duration: str | Omit = omit,
8182
ui_read_only_toggle_reason: str | Omit = omit,
8283
user_seat_expiration_inactive_time: str | Omit = omit,
@@ -126,6 +127,8 @@ def create(
126127
organization must have MFA enabled with at least one authentication method and a
127128
session duration configured.
128129
130+
mfa_ssh_piv_key_requirements: Configures SSH PIV key requirements for MFA using hardware security keys.
131+
129132
session_duration: The amount of time that tokens issued for applications will be valid. Must be in
130133
the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs), ms, s, m,
131134
h.
@@ -175,6 +178,7 @@ def create(
175178
"login_design": login_design,
176179
"mfa_config": mfa_config,
177180
"mfa_required_for_all_apps": mfa_required_for_all_apps,
181+
"mfa_ssh_piv_key_requirements": mfa_ssh_piv_key_requirements,
178182
"session_duration": session_duration,
179183
"ui_read_only_toggle_reason": ui_read_only_toggle_reason,
180184
"user_seat_expiration_inactive_time": user_seat_expiration_inactive_time,
@@ -207,6 +211,7 @@ def update(
207211
login_design: LoginDesignParam | Omit = omit,
208212
mfa_config: organization_update_params.MfaConfig | Omit = omit,
209213
mfa_required_for_all_apps: bool | Omit = omit,
214+
mfa_ssh_piv_key_requirements: organization_update_params.MfaSSHPivKeyRequirements | Omit = omit,
210215
name: str | Omit = omit,
211216
session_duration: str | Omit = omit,
212217
ui_read_only_toggle_reason: str | Omit = omit,
@@ -255,6 +260,8 @@ def update(
255260
organization must have MFA enabled with at least one authentication method and a
256261
session duration configured.
257262
263+
mfa_ssh_piv_key_requirements: Configures SSH PIV key requirements for MFA using hardware security keys.
264+
258265
name: The name of your Zero Trust organization.
259266
260267
session_duration: The amount of time that tokens issued for applications will be valid. Must be in
@@ -306,6 +313,7 @@ def update(
306313
"login_design": login_design,
307314
"mfa_config": mfa_config,
308315
"mfa_required_for_all_apps": mfa_required_for_all_apps,
316+
"mfa_ssh_piv_key_requirements": mfa_ssh_piv_key_requirements,
309317
"name": name,
310318
"session_duration": session_duration,
311319
"ui_read_only_toggle_reason": ui_read_only_toggle_reason,
@@ -499,6 +507,7 @@ async def create(
499507
login_design: LoginDesignParam | Omit = omit,
500508
mfa_config: organization_create_params.MfaConfig | Omit = omit,
501509
mfa_required_for_all_apps: bool | Omit = omit,
510+
mfa_ssh_piv_key_requirements: organization_create_params.MfaSSHPivKeyRequirements | Omit = omit,
502511
session_duration: str | Omit = omit,
503512
ui_read_only_toggle_reason: str | Omit = omit,
504513
user_seat_expiration_inactive_time: str | Omit = omit,
@@ -548,6 +557,8 @@ async def create(
548557
organization must have MFA enabled with at least one authentication method and a
549558
session duration configured.
550559
560+
mfa_ssh_piv_key_requirements: Configures SSH PIV key requirements for MFA using hardware security keys.
561+
551562
session_duration: The amount of time that tokens issued for applications will be valid. Must be in
552563
the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs), ms, s, m,
553564
h.
@@ -597,6 +608,7 @@ async def create(
597608
"login_design": login_design,
598609
"mfa_config": mfa_config,
599610
"mfa_required_for_all_apps": mfa_required_for_all_apps,
611+
"mfa_ssh_piv_key_requirements": mfa_ssh_piv_key_requirements,
600612
"session_duration": session_duration,
601613
"ui_read_only_toggle_reason": ui_read_only_toggle_reason,
602614
"user_seat_expiration_inactive_time": user_seat_expiration_inactive_time,
@@ -629,6 +641,7 @@ async def update(
629641
login_design: LoginDesignParam | Omit = omit,
630642
mfa_config: organization_update_params.MfaConfig | Omit = omit,
631643
mfa_required_for_all_apps: bool | Omit = omit,
644+
mfa_ssh_piv_key_requirements: organization_update_params.MfaSSHPivKeyRequirements | Omit = omit,
632645
name: str | Omit = omit,
633646
session_duration: str | Omit = omit,
634647
ui_read_only_toggle_reason: str | Omit = omit,
@@ -677,6 +690,8 @@ async def update(
677690
organization must have MFA enabled with at least one authentication method and a
678691
session duration configured.
679692
693+
mfa_ssh_piv_key_requirements: Configures SSH PIV key requirements for MFA using hardware security keys.
694+
680695
name: The name of your Zero Trust organization.
681696
682697
session_duration: The amount of time that tokens issued for applications will be valid. Must be in
@@ -728,6 +743,7 @@ async def update(
728743
"login_design": login_design,
729744
"mfa_config": mfa_config,
730745
"mfa_required_for_all_apps": mfa_required_for_all_apps,
746+
"mfa_ssh_piv_key_requirements": mfa_ssh_piv_key_requirements,
731747
"name": name,
732748
"session_duration": session_duration,
733749
"ui_read_only_toggle_reason": ui_read_only_toggle_reason,

src/cloudflare/types/zero_trust/access/application_create_params.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@
137137
"InfrastructureApplicationPolicy",
138138
"InfrastructureApplicationPolicyConnectionRules",
139139
"InfrastructureApplicationPolicyConnectionRulesSSH",
140+
"InfrastructureApplicationPolicyMfaConfig",
140141
"BrowserRDPApplication",
141142
"BrowserRDPApplicationTargetCriterion",
142143
"BrowserRDPApplicationDestination",
@@ -3033,6 +3034,31 @@ class InfrastructureApplicationPolicyConnectionRules(TypedDict, total=False):
30333034
"""
30343035

30353036

3037+
class InfrastructureApplicationPolicyMfaConfig(TypedDict, total=False):
3038+
"""
3039+
Configures multi-factor authentication (MFA) settings for infrastructure applications.
3040+
"""
3041+
3042+
allowed_authenticators: List[Literal["ssh_piv_key"]]
3043+
"""Lists the MFA methods that users can authenticate with.
3044+
3045+
For infrastructure applications, only `ssh_piv_key` is supported.
3046+
"""
3047+
3048+
mfa_disabled: bool
3049+
"""Indicates whether to disable MFA for this resource.
3050+
3051+
This option is available at the application and policy level.
3052+
"""
3053+
3054+
session_duration: str
3055+
"""Defines the duration of an MFA session.
3056+
3057+
Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
3058+
Examples: `5m` or `24h`.
3059+
"""
3060+
3061+
30363062
class InfrastructureApplicationPolicy(TypedDict, total=False):
30373063
decision: Required[Decision]
30383064
"""The action Access will take if a user matches this policy.
@@ -3061,6 +3087,12 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
30613087
To match the policy, a user cannot meet any of the Exclude rules.
30623088
"""
30633089

3090+
mfa_config: InfrastructureApplicationPolicyMfaConfig
3091+
"""
3092+
Configures multi-factor authentication (MFA) settings for infrastructure
3093+
applications.
3094+
"""
3095+
30643096
require: Iterable[AccessRuleParam]
30653097
"""Rules evaluated with an AND logical operator.
30663098

src/cloudflare/types/zero_trust/access/application_create_response.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@
118118
"InfrastructureApplicationPolicy",
119119
"InfrastructureApplicationPolicyConnectionRules",
120120
"InfrastructureApplicationPolicyConnectionRulesSSH",
121+
"InfrastructureApplicationPolicyMfaConfig",
121122
"BrowserRDPApplication",
122123
"BrowserRDPApplicationTargetCriterion",
123124
"BrowserRDPApplicationDestination",
@@ -3062,6 +3063,31 @@ class InfrastructureApplicationPolicyConnectionRules(BaseModel):
30623063
"""
30633064

30643065

3066+
class InfrastructureApplicationPolicyMfaConfig(BaseModel):
3067+
"""
3068+
Configures multi-factor authentication (MFA) settings for infrastructure applications.
3069+
"""
3070+
3071+
allowed_authenticators: Optional[List[Literal["ssh_piv_key"]]] = None
3072+
"""Lists the MFA methods that users can authenticate with.
3073+
3074+
For infrastructure applications, only `ssh_piv_key` is supported.
3075+
"""
3076+
3077+
mfa_disabled: Optional[bool] = None
3078+
"""Indicates whether to disable MFA for this resource.
3079+
3080+
This option is available at the application and policy level.
3081+
"""
3082+
3083+
session_duration: Optional[str] = None
3084+
"""Defines the duration of an MFA session.
3085+
3086+
Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
3087+
Examples: `5m` or `24h`.
3088+
"""
3089+
3090+
30653091
class InfrastructureApplicationPolicy(BaseModel):
30663092
id: Optional[str] = None
30673093
"""The UUID of the policy"""
@@ -3092,6 +3118,12 @@ class InfrastructureApplicationPolicy(BaseModel):
30923118
A user needs to meet only one of the Include rules.
30933119
"""
30943120

3121+
mfa_config: Optional[InfrastructureApplicationPolicyMfaConfig] = None
3122+
"""
3123+
Configures multi-factor authentication (MFA) settings for infrastructure
3124+
applications.
3125+
"""
3126+
30953127
name: Optional[str] = None
30963128
"""The name of the Access policy."""
30973129

src/cloudflare/types/zero_trust/access/application_get_response.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@
118118
"InfrastructureApplicationPolicy",
119119
"InfrastructureApplicationPolicyConnectionRules",
120120
"InfrastructureApplicationPolicyConnectionRulesSSH",
121+
"InfrastructureApplicationPolicyMfaConfig",
121122
"BrowserRDPApplication",
122123
"BrowserRDPApplicationTargetCriterion",
123124
"BrowserRDPApplicationDestination",
@@ -3062,6 +3063,31 @@ class InfrastructureApplicationPolicyConnectionRules(BaseModel):
30623063
"""
30633064

30643065

3066+
class InfrastructureApplicationPolicyMfaConfig(BaseModel):
3067+
"""
3068+
Configures multi-factor authentication (MFA) settings for infrastructure applications.
3069+
"""
3070+
3071+
allowed_authenticators: Optional[List[Literal["ssh_piv_key"]]] = None
3072+
"""Lists the MFA methods that users can authenticate with.
3073+
3074+
For infrastructure applications, only `ssh_piv_key` is supported.
3075+
"""
3076+
3077+
mfa_disabled: Optional[bool] = None
3078+
"""Indicates whether to disable MFA for this resource.
3079+
3080+
This option is available at the application and policy level.
3081+
"""
3082+
3083+
session_duration: Optional[str] = None
3084+
"""Defines the duration of an MFA session.
3085+
3086+
Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
3087+
Examples: `5m` or `24h`.
3088+
"""
3089+
3090+
30653091
class InfrastructureApplicationPolicy(BaseModel):
30663092
id: Optional[str] = None
30673093
"""The UUID of the policy"""
@@ -3092,6 +3118,12 @@ class InfrastructureApplicationPolicy(BaseModel):
30923118
A user needs to meet only one of the Include rules.
30933119
"""
30943120

3121+
mfa_config: Optional[InfrastructureApplicationPolicyMfaConfig] = None
3122+
"""
3123+
Configures multi-factor authentication (MFA) settings for infrastructure
3124+
applications.
3125+
"""
3126+
30953127
name: Optional[str] = None
30963128
"""The name of the Access policy."""
30973129

src/cloudflare/types/zero_trust/access/application_list_response.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@
118118
"InfrastructureApplicationPolicy",
119119
"InfrastructureApplicationPolicyConnectionRules",
120120
"InfrastructureApplicationPolicyConnectionRulesSSH",
121+
"InfrastructureApplicationPolicyMfaConfig",
121122
"BrowserRDPApplication",
122123
"BrowserRDPApplicationTargetCriterion",
123124
"BrowserRDPApplicationDestination",
@@ -3062,6 +3063,31 @@ class InfrastructureApplicationPolicyConnectionRules(BaseModel):
30623063
"""
30633064

30643065

3066+
class InfrastructureApplicationPolicyMfaConfig(BaseModel):
3067+
"""
3068+
Configures multi-factor authentication (MFA) settings for infrastructure applications.
3069+
"""
3070+
3071+
allowed_authenticators: Optional[List[Literal["ssh_piv_key"]]] = None
3072+
"""Lists the MFA methods that users can authenticate with.
3073+
3074+
For infrastructure applications, only `ssh_piv_key` is supported.
3075+
"""
3076+
3077+
mfa_disabled: Optional[bool] = None
3078+
"""Indicates whether to disable MFA for this resource.
3079+
3080+
This option is available at the application and policy level.
3081+
"""
3082+
3083+
session_duration: Optional[str] = None
3084+
"""Defines the duration of an MFA session.
3085+
3086+
Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
3087+
Examples: `5m` or `24h`.
3088+
"""
3089+
3090+
30653091
class InfrastructureApplicationPolicy(BaseModel):
30663092
id: Optional[str] = None
30673093
"""The UUID of the policy"""
@@ -3092,6 +3118,12 @@ class InfrastructureApplicationPolicy(BaseModel):
30923118
A user needs to meet only one of the Include rules.
30933119
"""
30943120

3121+
mfa_config: Optional[InfrastructureApplicationPolicyMfaConfig] = None
3122+
"""
3123+
Configures multi-factor authentication (MFA) settings for infrastructure
3124+
applications.
3125+
"""
3126+
30953127
name: Optional[str] = None
30963128
"""The name of the Access policy."""
30973129

src/cloudflare/types/zero_trust/access/application_update_params.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@
137137
"InfrastructureApplicationPolicy",
138138
"InfrastructureApplicationPolicyConnectionRules",
139139
"InfrastructureApplicationPolicyConnectionRulesSSH",
140+
"InfrastructureApplicationPolicyMfaConfig",
140141
"BrowserRDPApplication",
141142
"BrowserRDPApplicationTargetCriterion",
142143
"BrowserRDPApplicationDestination",
@@ -3033,6 +3034,31 @@ class InfrastructureApplicationPolicyConnectionRules(TypedDict, total=False):
30333034
"""
30343035

30353036

3037+
class InfrastructureApplicationPolicyMfaConfig(TypedDict, total=False):
3038+
"""
3039+
Configures multi-factor authentication (MFA) settings for infrastructure applications.
3040+
"""
3041+
3042+
allowed_authenticators: List[Literal["ssh_piv_key"]]
3043+
"""Lists the MFA methods that users can authenticate with.
3044+
3045+
For infrastructure applications, only `ssh_piv_key` is supported.
3046+
"""
3047+
3048+
mfa_disabled: bool
3049+
"""Indicates whether to disable MFA for this resource.
3050+
3051+
This option is available at the application and policy level.
3052+
"""
3053+
3054+
session_duration: str
3055+
"""Defines the duration of an MFA session.
3056+
3057+
Must be in minutes (m) or hours (h). Minimum: 0m. Maximum: 720h (30 days).
3058+
Examples: `5m` or `24h`.
3059+
"""
3060+
3061+
30363062
class InfrastructureApplicationPolicy(TypedDict, total=False):
30373063
decision: Required[Decision]
30383064
"""The action Access will take if a user matches this policy.
@@ -3061,6 +3087,12 @@ class InfrastructureApplicationPolicy(TypedDict, total=False):
30613087
To match the policy, a user cannot meet any of the Exclude rules.
30623088
"""
30633089

3090+
mfa_config: InfrastructureApplicationPolicyMfaConfig
3091+
"""
3092+
Configures multi-factor authentication (MFA) settings for infrastructure
3093+
applications.
3094+
"""
3095+
30643096
require: Iterable[AccessRuleParam]
30653097
"""Rules evaluated with an AND logical operator.
30663098

0 commit comments

Comments
 (0)