waldur-api-client 0.2.0__py3-none-any.whl → 7.6.5__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of waldur-api-client might be problematic. Click here for more details.

Files changed (50) hide show
  1. waldur_api_client/api/autoprovisioning_rule_plans/__init__.py +1 -0
  2. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_create.py +148 -0
  3. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_destroy.py +89 -0
  4. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_list.py +169 -0
  5. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_partial_update.py +162 -0
  6. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_retrieve.py +140 -0
  7. waldur_api_client/api/autoprovisioning_rule_plans/autoprovisioning_rule_plans_update.py +162 -0
  8. waldur_api_client/api/autoprovisioning_rules/__init__.py +1 -0
  9. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_create.py +148 -0
  10. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_destroy.py +89 -0
  11. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_list.py +167 -0
  12. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_partial_update.py +162 -0
  13. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_retrieve.py +140 -0
  14. waldur_api_client/api/autoprovisioning_rules/autoprovisioning_rules_update.py +162 -0
  15. waldur_api_client/api/marketplace_provider_offerings/marketplace_provider_offerings_component_stats_list.py +15 -0
  16. waldur_api_client/api/marketplace_provider_offerings/marketplace_provider_offerings_costs_list.py +15 -0
  17. waldur_api_client/api/marketplace_provider_offerings/marketplace_provider_offerings_customers_list.py +15 -0
  18. waldur_api_client/api/marketplace_provider_offerings/marketplace_provider_offerings_groups_list.py +15 -0
  19. waldur_api_client/api/marketplace_provider_offerings/marketplace_provider_offerings_list.py +15 -0
  20. waldur_api_client/api/marketplace_public_offerings/marketplace_public_offerings_list.py +15 -0
  21. waldur_api_client/api/marketplace_service_providers/marketplace_service_providers_offerings_list.py +15 -0
  22. waldur_api_client/api/marketplace_service_providers/marketplace_service_providers_users_list.py +15 -0
  23. waldur_api_client/api/users/users_list.py +15 -0
  24. waldur_api_client/models/__init__.py +24 -0
  25. waldur_api_client/models/constance_settings.py +9 -0
  26. waldur_api_client/models/constance_settings_request.py +9 -0
  27. waldur_api_client/models/identity_provider.py +11 -11
  28. waldur_api_client/models/identity_provider_request.py +11 -11
  29. waldur_api_client/models/merged_plugin_options.py +27 -0
  30. waldur_api_client/models/merged_plugin_options_request.py +27 -0
  31. waldur_api_client/models/patched_identity_provider_request.py +11 -11
  32. waldur_api_client/models/patched_rule_plans_request.py +108 -0
  33. waldur_api_client/models/patched_rule_plans_request_attributes.py +44 -0
  34. waldur_api_client/models/patched_rule_plans_request_limits.py +44 -0
  35. waldur_api_client/models/patched_rule_request.py +101 -0
  36. waldur_api_client/models/rancher_cluster.py +11 -0
  37. waldur_api_client/models/rancher_clusters_list_field_item.py +1 -0
  38. waldur_api_client/models/rancher_clusters_retrieve_field_item.py +1 -0
  39. waldur_api_client/models/rule.py +128 -0
  40. waldur_api_client/models/rule_plans.py +126 -0
  41. waldur_api_client/models/rule_plans_attributes.py +44 -0
  42. waldur_api_client/models/rule_plans_limits.py +44 -0
  43. waldur_api_client/models/rule_plans_request.py +109 -0
  44. waldur_api_client/models/rule_plans_request_attributes.py +44 -0
  45. waldur_api_client/models/rule_plans_request_limits.py +44 -0
  46. waldur_api_client/models/rule_request.py +103 -0
  47. {waldur_api_client-0.2.0.dist-info → waldur_api_client-7.6.5.dist-info}/METADATA +1 -1
  48. {waldur_api_client-0.2.0.dist-info → waldur_api_client-7.6.5.dist-info}/RECORD +50 -24
  49. {waldur_api_client-0.2.0.dist-info → waldur_api_client-7.6.5.dist-info}/LICENSE +0 -0
  50. {waldur_api_client-0.2.0.dist-info → waldur_api_client-7.6.5.dist-info}/WHEEL +0 -0
@@ -41,6 +41,7 @@ def _get_kwargs(
41
41
  registration_method: Union[Unset, str] = UNSET,
42
42
  user_keyword: Union[Unset, str] = UNSET,
43
43
  username: Union[Unset, str] = UNSET,
44
+ username_list: Union[Unset, str] = UNSET,
44
45
  ) -> dict[str, Any]:
45
46
  params: dict[str, Any] = {}
46
47
 
@@ -125,6 +126,8 @@ def _get_kwargs(
125
126
 
126
127
  params["username"] = username
127
128
 
129
+ params["username_list"] = username_list
130
+
128
131
  params = {k: v for k, v in params.items() if v is not UNSET and v is not None}
129
132
 
130
133
  _kwargs: dict[str, Any] = {
@@ -187,6 +190,7 @@ def sync_detailed(
187
190
  registration_method: Union[Unset, str] = UNSET,
188
191
  user_keyword: Union[Unset, str] = UNSET,
189
192
  username: Union[Unset, str] = UNSET,
193
+ username_list: Union[Unset, str] = UNSET,
190
194
  ) -> Response[list["User"]]:
191
195
  """
192
196
  Args:
@@ -216,6 +220,7 @@ def sync_detailed(
216
220
  registration_method (Union[Unset, str]):
217
221
  user_keyword (Union[Unset, str]):
218
222
  username (Union[Unset, str]):
223
+ username_list (Union[Unset, str]):
219
224
 
220
225
  Raises:
221
226
  errors.UnexpectedStatus: If the server returns an undocumented status code.
@@ -252,6 +257,7 @@ def sync_detailed(
252
257
  registration_method=registration_method,
253
258
  user_keyword=user_keyword,
254
259
  username=username,
260
+ username_list=username_list,
255
261
  )
256
262
 
257
263
  response = client.get_httpx_client().request(
@@ -290,6 +296,7 @@ def sync(
290
296
  registration_method: Union[Unset, str] = UNSET,
291
297
  user_keyword: Union[Unset, str] = UNSET,
292
298
  username: Union[Unset, str] = UNSET,
299
+ username_list: Union[Unset, str] = UNSET,
293
300
  ) -> list["User"]:
294
301
  """
295
302
  Args:
@@ -319,6 +326,7 @@ def sync(
319
326
  registration_method (Union[Unset, str]):
320
327
  user_keyword (Union[Unset, str]):
321
328
  username (Union[Unset, str]):
329
+ username_list (Union[Unset, str]):
322
330
 
323
331
  Raises:
324
332
  errors.UnexpectedStatus: If the server returns an undocumented status code.
@@ -356,6 +364,7 @@ def sync(
356
364
  registration_method=registration_method,
357
365
  user_keyword=user_keyword,
358
366
  username=username,
367
+ username_list=username_list,
359
368
  ).parsed
360
369
 
361
370
 
@@ -388,6 +397,7 @@ async def asyncio_detailed(
388
397
  registration_method: Union[Unset, str] = UNSET,
389
398
  user_keyword: Union[Unset, str] = UNSET,
390
399
  username: Union[Unset, str] = UNSET,
400
+ username_list: Union[Unset, str] = UNSET,
391
401
  ) -> Response[list["User"]]:
392
402
  """
393
403
  Args:
@@ -417,6 +427,7 @@ async def asyncio_detailed(
417
427
  registration_method (Union[Unset, str]):
418
428
  user_keyword (Union[Unset, str]):
419
429
  username (Union[Unset, str]):
430
+ username_list (Union[Unset, str]):
420
431
 
421
432
  Raises:
422
433
  errors.UnexpectedStatus: If the server returns an undocumented status code.
@@ -453,6 +464,7 @@ async def asyncio_detailed(
453
464
  registration_method=registration_method,
454
465
  user_keyword=user_keyword,
455
466
  username=username,
467
+ username_list=username_list,
456
468
  )
457
469
 
458
470
  response = await client.get_async_httpx_client().request(**kwargs)
@@ -489,6 +501,7 @@ async def asyncio(
489
501
  registration_method: Union[Unset, str] = UNSET,
490
502
  user_keyword: Union[Unset, str] = UNSET,
491
503
  username: Union[Unset, str] = UNSET,
504
+ username_list: Union[Unset, str] = UNSET,
492
505
  ) -> list["User"]:
493
506
  """
494
507
  Args:
@@ -518,6 +531,7 @@ async def asyncio(
518
531
  registration_method (Union[Unset, str]):
519
532
  user_keyword (Union[Unset, str]):
520
533
  username (Union[Unset, str]):
534
+ username_list (Union[Unset, str]):
521
535
 
522
536
  Raises:
523
537
  errors.UnexpectedStatus: If the server returns an undocumented status code.
@@ -556,5 +570,6 @@ async def asyncio(
556
570
  registration_method=registration_method,
557
571
  user_keyword=user_keyword,
558
572
  username=username,
573
+ username_list=username_list,
559
574
  )
560
575
  ).parsed
@@ -838,6 +838,10 @@ from .patched_requested_resource_request import PatchedRequestedResourceRequest
838
838
  from .patched_resource_update_request import PatchedResourceUpdateRequest
839
839
  from .patched_robot_account_request import PatchedRobotAccountRequest
840
840
  from .patched_role_details_request import PatchedRoleDetailsRequest
841
+ from .patched_rule_plans_request import PatchedRulePlansRequest
842
+ from .patched_rule_plans_request_attributes import PatchedRulePlansRequestAttributes
843
+ from .patched_rule_plans_request_limits import PatchedRulePlansRequestLimits
844
+ from .patched_rule_request import PatchedRuleRequest
841
845
  from .patched_screenshot_request import PatchedScreenshotRequest
842
846
  from .patched_section_request import PatchedSectionRequest
843
847
  from .patched_service_provider_request import PatchedServiceProviderRequest
@@ -1130,6 +1134,14 @@ from .role_type import RoleType
1130
1134
  from .roles_list_field_item import RolesListFieldItem
1131
1135
  from .roles_retrieve_field_item import RolesRetrieveFieldItem
1132
1136
  from .round_reviewer import RoundReviewer
1137
+ from .rule import Rule
1138
+ from .rule_plans import RulePlans
1139
+ from .rule_plans_attributes import RulePlansAttributes
1140
+ from .rule_plans_limits import RulePlansLimits
1141
+ from .rule_plans_request import RulePlansRequest
1142
+ from .rule_plans_request_attributes import RulePlansRequestAttributes
1143
+ from .rule_plans_request_limits import RulePlansRequestLimits
1144
+ from .rule_request import RuleRequest
1133
1145
  from .runtime_states import RuntimeStates
1134
1146
  from .saml_2_login import Saml2Login
1135
1147
  from .saml_2_login_complete import Saml2LoginComplete
@@ -2042,6 +2054,10 @@ __all__ = (
2042
2054
  "PatchedResourceUpdateRequest",
2043
2055
  "PatchedRobotAccountRequest",
2044
2056
  "PatchedRoleDetailsRequest",
2057
+ "PatchedRulePlansRequest",
2058
+ "PatchedRulePlansRequestAttributes",
2059
+ "PatchedRulePlansRequestLimits",
2060
+ "PatchedRuleRequest",
2045
2061
  "PatchedScreenshotRequest",
2046
2062
  "PatchedSectionRequest",
2047
2063
  "PatchedServiceProviderRequest",
@@ -2318,6 +2334,14 @@ __all__ = (
2318
2334
  "RoleTemplate",
2319
2335
  "RoleType",
2320
2336
  "RoundReviewer",
2337
+ "Rule",
2338
+ "RulePlans",
2339
+ "RulePlansAttributes",
2340
+ "RulePlansLimits",
2341
+ "RulePlansRequest",
2342
+ "RulePlansRequestAttributes",
2343
+ "RulePlansRequestLimits",
2344
+ "RuleRequest",
2321
2345
  "RuntimeStates",
2322
2346
  "Saml2Login",
2323
2347
  "Saml2LoginComplete",
@@ -136,6 +136,7 @@ class ConstanceSettings:
136
136
  freeipa_group_synchronization_enabled (Union[Unset, bool]):
137
137
  keycloak_icon (Union[None, Unset, str]):
138
138
  countries (Union[Unset, list[str]]):
139
+ oidc_auth_url (Union[Unset, str]):
139
140
  oidc_introspection_url (Union[Unset, str]):
140
141
  oidc_client_id (Union[Unset, str]):
141
142
  oidc_client_secret (Union[Unset, str]):
@@ -266,6 +267,7 @@ class ConstanceSettings:
266
267
  freeipa_group_synchronization_enabled: Union[Unset, bool] = UNSET
267
268
  keycloak_icon: Union[None, Unset, str] = UNSET
268
269
  countries: Union[Unset, list[str]] = UNSET
270
+ oidc_auth_url: Union[Unset, str] = UNSET
269
271
  oidc_introspection_url: Union[Unset, str] = UNSET
270
272
  oidc_client_id: Union[Unset, str] = UNSET
271
273
  oidc_client_secret: Union[Unset, str] = UNSET
@@ -572,6 +574,8 @@ class ConstanceSettings:
572
574
  if not isinstance(self.countries, Unset):
573
575
  countries = self.countries
574
576
 
577
+ oidc_auth_url = self.oidc_auth_url
578
+
575
579
  oidc_introspection_url = self.oidc_introspection_url
576
580
 
577
581
  oidc_client_id = self.oidc_client_id
@@ -835,6 +839,8 @@ class ConstanceSettings:
835
839
  field_dict["KEYCLOAK_ICON"] = keycloak_icon
836
840
  if countries is not UNSET:
837
841
  field_dict["COUNTRIES"] = countries
842
+ if oidc_auth_url is not UNSET:
843
+ field_dict["OIDC_AUTH_URL"] = oidc_auth_url
838
844
  if oidc_introspection_url is not UNSET:
839
845
  field_dict["OIDC_INTROSPECTION_URL"] = oidc_introspection_url
840
846
  if oidc_client_id is not UNSET:
@@ -1185,6 +1191,8 @@ class ConstanceSettings:
1185
1191
 
1186
1192
  countries = cast(list[str], d.pop("COUNTRIES", UNSET))
1187
1193
 
1194
+ oidc_auth_url = d.pop("OIDC_AUTH_URL", UNSET)
1195
+
1188
1196
  oidc_introspection_url = d.pop("OIDC_INTROSPECTION_URL", UNSET)
1189
1197
 
1190
1198
  oidc_client_id = d.pop("OIDC_CLIENT_ID", UNSET)
@@ -1319,6 +1327,7 @@ class ConstanceSettings:
1319
1327
  freeipa_group_synchronization_enabled=freeipa_group_synchronization_enabled,
1320
1328
  keycloak_icon=keycloak_icon,
1321
1329
  countries=countries,
1330
+ oidc_auth_url=oidc_auth_url,
1322
1331
  oidc_introspection_url=oidc_introspection_url,
1323
1332
  oidc_client_id=oidc_client_id,
1324
1333
  oidc_client_secret=oidc_client_secret,
@@ -138,6 +138,7 @@ class ConstanceSettingsRequest:
138
138
  freeipa_group_synchronization_enabled (Union[Unset, bool]):
139
139
  keycloak_icon (Union[File, None, Unset]):
140
140
  countries (Union[Unset, list[str]]):
141
+ oidc_auth_url (Union[Unset, str]):
141
142
  oidc_introspection_url (Union[Unset, str]):
142
143
  oidc_client_id (Union[Unset, str]):
143
144
  oidc_client_secret (Union[Unset, str]):
@@ -268,6 +269,7 @@ class ConstanceSettingsRequest:
268
269
  freeipa_group_synchronization_enabled: Union[Unset, bool] = UNSET
269
270
  keycloak_icon: Union[File, None, Unset] = UNSET
270
271
  countries: Union[Unset, list[str]] = UNSET
272
+ oidc_auth_url: Union[Unset, str] = UNSET
271
273
  oidc_introspection_url: Union[Unset, str] = UNSET
272
274
  oidc_client_id: Union[Unset, str] = UNSET
273
275
  oidc_client_secret: Union[Unset, str] = UNSET
@@ -610,6 +612,8 @@ class ConstanceSettingsRequest:
610
612
  if not isinstance(self.countries, Unset):
611
613
  countries = self.countries
612
614
 
615
+ oidc_auth_url = self.oidc_auth_url
616
+
613
617
  oidc_introspection_url = self.oidc_introspection_url
614
618
 
615
619
  oidc_client_id = self.oidc_client_id
@@ -873,6 +877,8 @@ class ConstanceSettingsRequest:
873
877
  field_dict["KEYCLOAK_ICON"] = keycloak_icon
874
878
  if countries is not UNSET:
875
879
  field_dict["COUNTRIES"] = countries
880
+ if oidc_auth_url is not UNSET:
881
+ field_dict["OIDC_AUTH_URL"] = oidc_auth_url
876
882
  if oidc_introspection_url is not UNSET:
877
883
  field_dict["OIDC_INTROSPECTION_URL"] = oidc_introspection_url
878
884
  if oidc_client_id is not UNSET:
@@ -1319,6 +1325,8 @@ class ConstanceSettingsRequest:
1319
1325
 
1320
1326
  countries = cast(list[str], d.pop("COUNTRIES", UNSET))
1321
1327
 
1328
+ oidc_auth_url = d.pop("OIDC_AUTH_URL", UNSET)
1329
+
1322
1330
  oidc_introspection_url = d.pop("OIDC_INTROSPECTION_URL", UNSET)
1323
1331
 
1324
1332
  oidc_client_id = d.pop("OIDC_CLIENT_ID", UNSET)
@@ -1453,6 +1461,7 @@ class ConstanceSettingsRequest:
1453
1461
  freeipa_group_synchronization_enabled=freeipa_group_synchronization_enabled,
1454
1462
  keycloak_icon=keycloak_icon,
1455
1463
  countries=countries,
1464
+ oidc_auth_url=oidc_auth_url,
1456
1465
  oidc_introspection_url=oidc_introspection_url,
1457
1466
  oidc_client_id=oidc_client_id,
1458
1467
  oidc_client_secret=oidc_client_secret,
@@ -27,7 +27,7 @@ class IdentityProvider:
27
27
  enable_pkce (Union[Unset, bool]):
28
28
  management_url (Union[Unset, str]): The endpoint for user details management.
29
29
  protected_fields (Union[Unset, Any]):
30
- scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
30
+ extra_scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
31
31
  """
32
32
 
33
33
  provider: str
@@ -44,7 +44,7 @@ class IdentityProvider:
44
44
  enable_pkce: Union[Unset, bool] = UNSET
45
45
  management_url: Union[Unset, str] = UNSET
46
46
  protected_fields: Union[Unset, Any] = UNSET
47
- scope: Union[None, Unset, str] = UNSET
47
+ extra_scope: Union[None, Unset, str] = UNSET
48
48
  additional_properties: dict[str, Any] = _attrs_field(init=False, factory=dict)
49
49
 
50
50
  def to_dict(self) -> dict[str, Any]:
@@ -76,11 +76,11 @@ class IdentityProvider:
76
76
 
77
77
  protected_fields = self.protected_fields
78
78
 
79
- scope: Union[None, Unset, str]
80
- if isinstance(self.scope, Unset):
81
- scope = UNSET
79
+ extra_scope: Union[None, Unset, str]
80
+ if isinstance(self.extra_scope, Unset):
81
+ extra_scope = UNSET
82
82
  else:
83
- scope = self.scope
83
+ extra_scope = self.extra_scope
84
84
 
85
85
  field_dict: dict[str, Any] = {}
86
86
  field_dict.update(self.additional_properties)
@@ -108,8 +108,8 @@ class IdentityProvider:
108
108
  field_dict["management_url"] = management_url
109
109
  if protected_fields is not UNSET:
110
110
  field_dict["protected_fields"] = protected_fields
111
- if scope is not UNSET:
112
- field_dict["scope"] = scope
111
+ if extra_scope is not UNSET:
112
+ field_dict["extra_scope"] = extra_scope
113
113
 
114
114
  return field_dict
115
115
 
@@ -144,14 +144,14 @@ class IdentityProvider:
144
144
 
145
145
  protected_fields = d.pop("protected_fields", UNSET)
146
146
 
147
- def _parse_scope(data: object) -> Union[None, Unset, str]:
147
+ def _parse_extra_scope(data: object) -> Union[None, Unset, str]:
148
148
  if data is None:
149
149
  return data
150
150
  if isinstance(data, Unset):
151
151
  return data
152
152
  return cast(Union[None, Unset, str], data)
153
153
 
154
- scope = _parse_scope(d.pop("scope", UNSET))
154
+ extra_scope = _parse_extra_scope(d.pop("extra_scope", UNSET))
155
155
 
156
156
  identity_provider = cls(
157
157
  provider=provider,
@@ -168,7 +168,7 @@ class IdentityProvider:
168
168
  enable_pkce=enable_pkce,
169
169
  management_url=management_url,
170
170
  protected_fields=protected_fields,
171
- scope=scope,
171
+ extra_scope=extra_scope,
172
172
  )
173
173
 
174
174
  identity_provider.additional_properties = d
@@ -23,7 +23,7 @@ class IdentityProviderRequest:
23
23
  enable_pkce (Union[Unset, bool]):
24
24
  management_url (Union[Unset, str]): The endpoint for user details management.
25
25
  protected_fields (Union[Unset, Any]):
26
- scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
26
+ extra_scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
27
27
  """
28
28
 
29
29
  provider: str
@@ -36,7 +36,7 @@ class IdentityProviderRequest:
36
36
  enable_pkce: Union[Unset, bool] = UNSET
37
37
  management_url: Union[Unset, str] = UNSET
38
38
  protected_fields: Union[Unset, Any] = UNSET
39
- scope: Union[None, Unset, str] = UNSET
39
+ extra_scope: Union[None, Unset, str] = UNSET
40
40
  additional_properties: dict[str, Any] = _attrs_field(init=False, factory=dict)
41
41
 
42
42
  def to_dict(self) -> dict[str, Any]:
@@ -60,11 +60,11 @@ class IdentityProviderRequest:
60
60
 
61
61
  protected_fields = self.protected_fields
62
62
 
63
- scope: Union[None, Unset, str]
64
- if isinstance(self.scope, Unset):
65
- scope = UNSET
63
+ extra_scope: Union[None, Unset, str]
64
+ if isinstance(self.extra_scope, Unset):
65
+ extra_scope = UNSET
66
66
  else:
67
- scope = self.scope
67
+ extra_scope = self.extra_scope
68
68
 
69
69
  field_dict: dict[str, Any] = {}
70
70
  field_dict.update(self.additional_properties)
@@ -88,8 +88,8 @@ class IdentityProviderRequest:
88
88
  field_dict["management_url"] = management_url
89
89
  if protected_fields is not UNSET:
90
90
  field_dict["protected_fields"] = protected_fields
91
- if scope is not UNSET:
92
- field_dict["scope"] = scope
91
+ if extra_scope is not UNSET:
92
+ field_dict["extra_scope"] = extra_scope
93
93
 
94
94
  return field_dict
95
95
 
@@ -116,14 +116,14 @@ class IdentityProviderRequest:
116
116
 
117
117
  protected_fields = d.pop("protected_fields", UNSET)
118
118
 
119
- def _parse_scope(data: object) -> Union[None, Unset, str]:
119
+ def _parse_extra_scope(data: object) -> Union[None, Unset, str]:
120
120
  if data is None:
121
121
  return data
122
122
  if isinstance(data, Unset):
123
123
  return data
124
124
  return cast(Union[None, Unset, str], data)
125
125
 
126
- scope = _parse_scope(d.pop("scope", UNSET))
126
+ extra_scope = _parse_extra_scope(d.pop("extra_scope", UNSET))
127
127
 
128
128
  identity_provider_request = cls(
129
129
  provider=provider,
@@ -136,7 +136,7 @@ class IdentityProviderRequest:
136
136
  enable_pkce=enable_pkce,
137
137
  management_url=management_url,
138
138
  protected_fields=protected_fields,
139
- scope=scope,
139
+ extra_scope=extra_scope,
140
140
  )
141
141
 
142
142
  identity_provider_request.additional_properties = d
@@ -64,6 +64,9 @@ class MergedPluginOptions:
64
64
  managed_rancher_load_balancer_system_volume_type_name (Union[Unset, str]):
65
65
  managed_rancher_load_balancer_data_volume_size_gb (Union[Unset, int]):
66
66
  managed_rancher_load_balancer_data_volume_type_name (Union[Unset, str]):
67
+ managed_rancher_tenant_max_cpu (Union[Unset, int]): Max number of vCPUs for tenants
68
+ managed_rancher_tenant_max_ram (Union[Unset, int]): Max number of RAM for tenants
69
+ managed_rancher_tenant_max_disk (Union[Unset, int]): Max size of disk space for tenants (GB)
67
70
  account_name_generation_policy (Union[AccountNameGenerationPolicyEnum, None, Unset]): Slurm account name
68
71
  generation policy
69
72
  """
@@ -109,6 +112,9 @@ class MergedPluginOptions:
109
112
  managed_rancher_load_balancer_system_volume_type_name: Union[Unset, str] = UNSET
110
113
  managed_rancher_load_balancer_data_volume_size_gb: Union[Unset, int] = UNSET
111
114
  managed_rancher_load_balancer_data_volume_type_name: Union[Unset, str] = UNSET
115
+ managed_rancher_tenant_max_cpu: Union[Unset, int] = UNSET
116
+ managed_rancher_tenant_max_ram: Union[Unset, int] = UNSET
117
+ managed_rancher_tenant_max_disk: Union[Unset, int] = UNSET
112
118
  account_name_generation_policy: Union[AccountNameGenerationPolicyEnum, None, Unset] = UNSET
113
119
  additional_properties: dict[str, Any] = _attrs_field(init=False, factory=dict)
114
120
 
@@ -201,6 +207,12 @@ class MergedPluginOptions:
201
207
 
202
208
  managed_rancher_load_balancer_data_volume_type_name = self.managed_rancher_load_balancer_data_volume_type_name
203
209
 
210
+ managed_rancher_tenant_max_cpu = self.managed_rancher_tenant_max_cpu
211
+
212
+ managed_rancher_tenant_max_ram = self.managed_rancher_tenant_max_ram
213
+
214
+ managed_rancher_tenant_max_disk = self.managed_rancher_tenant_max_disk
215
+
204
216
  account_name_generation_policy: Union[None, Unset, str]
205
217
  if isinstance(self.account_name_generation_policy, Unset):
206
218
  account_name_generation_policy = UNSET
@@ -302,6 +314,12 @@ class MergedPluginOptions:
302
314
  field_dict["managed_rancher_load_balancer_data_volume_type_name"] = (
303
315
  managed_rancher_load_balancer_data_volume_type_name
304
316
  )
317
+ if managed_rancher_tenant_max_cpu is not UNSET:
318
+ field_dict["managed_rancher_tenant_max_cpu"] = managed_rancher_tenant_max_cpu
319
+ if managed_rancher_tenant_max_ram is not UNSET:
320
+ field_dict["managed_rancher_tenant_max_ram"] = managed_rancher_tenant_max_ram
321
+ if managed_rancher_tenant_max_disk is not UNSET:
322
+ field_dict["managed_rancher_tenant_max_disk"] = managed_rancher_tenant_max_disk
305
323
  if account_name_generation_policy is not UNSET:
306
324
  field_dict["account_name_generation_policy"] = account_name_generation_policy
307
325
 
@@ -411,6 +429,12 @@ class MergedPluginOptions:
411
429
  "managed_rancher_load_balancer_data_volume_type_name", UNSET
412
430
  )
413
431
 
432
+ managed_rancher_tenant_max_cpu = d.pop("managed_rancher_tenant_max_cpu", UNSET)
433
+
434
+ managed_rancher_tenant_max_ram = d.pop("managed_rancher_tenant_max_ram", UNSET)
435
+
436
+ managed_rancher_tenant_max_disk = d.pop("managed_rancher_tenant_max_disk", UNSET)
437
+
414
438
  def _parse_account_name_generation_policy(data: object) -> Union[AccountNameGenerationPolicyEnum, None, Unset]:
415
439
  if data is None:
416
440
  return data
@@ -470,6 +494,9 @@ class MergedPluginOptions:
470
494
  managed_rancher_load_balancer_system_volume_type_name=managed_rancher_load_balancer_system_volume_type_name,
471
495
  managed_rancher_load_balancer_data_volume_size_gb=managed_rancher_load_balancer_data_volume_size_gb,
472
496
  managed_rancher_load_balancer_data_volume_type_name=managed_rancher_load_balancer_data_volume_type_name,
497
+ managed_rancher_tenant_max_cpu=managed_rancher_tenant_max_cpu,
498
+ managed_rancher_tenant_max_ram=managed_rancher_tenant_max_ram,
499
+ managed_rancher_tenant_max_disk=managed_rancher_tenant_max_disk,
473
500
  account_name_generation_policy=account_name_generation_policy,
474
501
  )
475
502
 
@@ -64,6 +64,9 @@ class MergedPluginOptionsRequest:
64
64
  managed_rancher_load_balancer_system_volume_type_name (Union[Unset, str]):
65
65
  managed_rancher_load_balancer_data_volume_size_gb (Union[Unset, int]):
66
66
  managed_rancher_load_balancer_data_volume_type_name (Union[Unset, str]):
67
+ managed_rancher_tenant_max_cpu (Union[Unset, int]): Max number of vCPUs for tenants
68
+ managed_rancher_tenant_max_ram (Union[Unset, int]): Max number of RAM for tenants
69
+ managed_rancher_tenant_max_disk (Union[Unset, int]): Max size of disk space for tenants (GB)
67
70
  account_name_generation_policy (Union[AccountNameGenerationPolicyEnum, None, Unset]): Slurm account name
68
71
  generation policy
69
72
  """
@@ -109,6 +112,9 @@ class MergedPluginOptionsRequest:
109
112
  managed_rancher_load_balancer_system_volume_type_name: Union[Unset, str] = UNSET
110
113
  managed_rancher_load_balancer_data_volume_size_gb: Union[Unset, int] = UNSET
111
114
  managed_rancher_load_balancer_data_volume_type_name: Union[Unset, str] = UNSET
115
+ managed_rancher_tenant_max_cpu: Union[Unset, int] = UNSET
116
+ managed_rancher_tenant_max_ram: Union[Unset, int] = UNSET
117
+ managed_rancher_tenant_max_disk: Union[Unset, int] = UNSET
112
118
  account_name_generation_policy: Union[AccountNameGenerationPolicyEnum, None, Unset] = UNSET
113
119
  additional_properties: dict[str, Any] = _attrs_field(init=False, factory=dict)
114
120
 
@@ -201,6 +207,12 @@ class MergedPluginOptionsRequest:
201
207
 
202
208
  managed_rancher_load_balancer_data_volume_type_name = self.managed_rancher_load_balancer_data_volume_type_name
203
209
 
210
+ managed_rancher_tenant_max_cpu = self.managed_rancher_tenant_max_cpu
211
+
212
+ managed_rancher_tenant_max_ram = self.managed_rancher_tenant_max_ram
213
+
214
+ managed_rancher_tenant_max_disk = self.managed_rancher_tenant_max_disk
215
+
204
216
  account_name_generation_policy: Union[None, Unset, str]
205
217
  if isinstance(self.account_name_generation_policy, Unset):
206
218
  account_name_generation_policy = UNSET
@@ -302,6 +314,12 @@ class MergedPluginOptionsRequest:
302
314
  field_dict["managed_rancher_load_balancer_data_volume_type_name"] = (
303
315
  managed_rancher_load_balancer_data_volume_type_name
304
316
  )
317
+ if managed_rancher_tenant_max_cpu is not UNSET:
318
+ field_dict["managed_rancher_tenant_max_cpu"] = managed_rancher_tenant_max_cpu
319
+ if managed_rancher_tenant_max_ram is not UNSET:
320
+ field_dict["managed_rancher_tenant_max_ram"] = managed_rancher_tenant_max_ram
321
+ if managed_rancher_tenant_max_disk is not UNSET:
322
+ field_dict["managed_rancher_tenant_max_disk"] = managed_rancher_tenant_max_disk
305
323
  if account_name_generation_policy is not UNSET:
306
324
  field_dict["account_name_generation_policy"] = account_name_generation_policy
307
325
 
@@ -411,6 +429,12 @@ class MergedPluginOptionsRequest:
411
429
  "managed_rancher_load_balancer_data_volume_type_name", UNSET
412
430
  )
413
431
 
432
+ managed_rancher_tenant_max_cpu = d.pop("managed_rancher_tenant_max_cpu", UNSET)
433
+
434
+ managed_rancher_tenant_max_ram = d.pop("managed_rancher_tenant_max_ram", UNSET)
435
+
436
+ managed_rancher_tenant_max_disk = d.pop("managed_rancher_tenant_max_disk", UNSET)
437
+
414
438
  def _parse_account_name_generation_policy(data: object) -> Union[AccountNameGenerationPolicyEnum, None, Unset]:
415
439
  if data is None:
416
440
  return data
@@ -470,6 +494,9 @@ class MergedPluginOptionsRequest:
470
494
  managed_rancher_load_balancer_system_volume_type_name=managed_rancher_load_balancer_system_volume_type_name,
471
495
  managed_rancher_load_balancer_data_volume_size_gb=managed_rancher_load_balancer_data_volume_size_gb,
472
496
  managed_rancher_load_balancer_data_volume_type_name=managed_rancher_load_balancer_data_volume_type_name,
497
+ managed_rancher_tenant_max_cpu=managed_rancher_tenant_max_cpu,
498
+ managed_rancher_tenant_max_ram=managed_rancher_tenant_max_ram,
499
+ managed_rancher_tenant_max_disk=managed_rancher_tenant_max_disk,
473
500
  account_name_generation_policy=account_name_generation_policy,
474
501
  )
475
502
 
@@ -23,7 +23,7 @@ class PatchedIdentityProviderRequest:
23
23
  label (Union[Unset, str]): Human-readable identity provider is label.
24
24
  management_url (Union[Unset, str]): The endpoint for user details management.
25
25
  protected_fields (Union[Unset, Any]):
26
- scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
26
+ extra_scope (Union[None, Unset, str]): Space-separated list of scopes to request during authentication.
27
27
  """
28
28
 
29
29
  provider: Union[Unset, str] = UNSET
@@ -36,7 +36,7 @@ class PatchedIdentityProviderRequest:
36
36
  label: Union[Unset, str] = UNSET
37
37
  management_url: Union[Unset, str] = UNSET
38
38
  protected_fields: Union[Unset, Any] = UNSET
39
- scope: Union[None, Unset, str] = UNSET
39
+ extra_scope: Union[None, Unset, str] = UNSET
40
40
  additional_properties: dict[str, Any] = _attrs_field(init=False, factory=dict)
41
41
 
42
42
  def to_dict(self) -> dict[str, Any]:
@@ -60,11 +60,11 @@ class PatchedIdentityProviderRequest:
60
60
 
61
61
  protected_fields = self.protected_fields
62
62
 
63
- scope: Union[None, Unset, str]
64
- if isinstance(self.scope, Unset):
65
- scope = UNSET
63
+ extra_scope: Union[None, Unset, str]
64
+ if isinstance(self.extra_scope, Unset):
65
+ extra_scope = UNSET
66
66
  else:
67
- scope = self.scope
67
+ extra_scope = self.extra_scope
68
68
 
69
69
  field_dict: dict[str, Any] = {}
70
70
  field_dict.update(self.additional_properties)
@@ -89,8 +89,8 @@ class PatchedIdentityProviderRequest:
89
89
  field_dict["management_url"] = management_url
90
90
  if protected_fields is not UNSET:
91
91
  field_dict["protected_fields"] = protected_fields
92
- if scope is not UNSET:
93
- field_dict["scope"] = scope
92
+ if extra_scope is not UNSET:
93
+ field_dict["extra_scope"] = extra_scope
94
94
 
95
95
  return field_dict
96
96
 
@@ -117,14 +117,14 @@ class PatchedIdentityProviderRequest:
117
117
 
118
118
  protected_fields = d.pop("protected_fields", UNSET)
119
119
 
120
- def _parse_scope(data: object) -> Union[None, Unset, str]:
120
+ def _parse_extra_scope(data: object) -> Union[None, Unset, str]:
121
121
  if data is None:
122
122
  return data
123
123
  if isinstance(data, Unset):
124
124
  return data
125
125
  return cast(Union[None, Unset, str], data)
126
126
 
127
- scope = _parse_scope(d.pop("scope", UNSET))
127
+ extra_scope = _parse_extra_scope(d.pop("extra_scope", UNSET))
128
128
 
129
129
  patched_identity_provider_request = cls(
130
130
  provider=provider,
@@ -137,7 +137,7 @@ class PatchedIdentityProviderRequest:
137
137
  label=label,
138
138
  management_url=management_url,
139
139
  protected_fields=protected_fields,
140
- scope=scope,
140
+ extra_scope=extra_scope,
141
141
  )
142
142
 
143
143
  patched_identity_provider_request.additional_properties = d