diff --git a/.stats.yml b/.stats.yml index 6d19daf067a..26e86f583b2 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,2 +1,2 @@ configured_endpoints: 1436 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-da11321182930ad0deb0691d0e8e6c3bf9cced28dfb452d612590e86ec13a5a3.yml +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-2c78a7b2b9c6b823fa3394dedc7537f11ecc9c05b381df6dd2066c378d22b617.yml diff --git a/src/cloudflare/resources/origin_ca_certificates.py b/src/cloudflare/resources/origin_ca_certificates.py index 991b86445d8..e41ecdc77b7 100644 --- a/src/cloudflare/resources/origin_ca_certificates.py +++ b/src/cloudflare/resources/origin_ca_certificates.py @@ -68,8 +68,8 @@ def create( ) -> Optional[OriginCACertificate]: """Create an Origin CA certificate. - Use your Origin CA Key as your User Service Key - when calling this endpoint ([see above](#requests)). + You can use an Origin CA Key as your User + Service Key or an API token when calling this endpoint ([see above](#requests)). Args: csr: The Certificate Signing Request (CSR). Must be newline-encoded. @@ -124,8 +124,8 @@ def list( ) -> SyncSinglePage[OriginCACertificate]: """List all existing Origin CA certificates for a given zone. - Use your Origin CA - Key as your User Service Key when calling this endpoint + You can use an Origin + CA Key as your User Service Key or an API token when calling this endpoint ([see above](#requests)). Args: @@ -167,9 +167,9 @@ def delete( ) -> Optional[OriginCACertificateDeleteResponse]: """Revoke an existing Origin CA certificate by its serial number. - Use your Origin - CA Key as your User Service Key when calling this endpoint - ([see above](#requests)). + You can use an + Origin CA Key as your User Service Key or an API token when calling this + endpoint ([see above](#requests)). Args: certificate_id: Identifier @@ -211,9 +211,9 @@ def get( ) -> Optional[OriginCACertificate]: """Get an existing Origin CA certificate by its serial number. - Use your Origin CA - Key as your User Service Key when calling this endpoint - ([see above](#requests)). + You can use an + Origin CA Key as your User Service Key or an API token when calling this + endpoint ([see above](#requests)). Args: certificate_id: Identifier @@ -277,8 +277,8 @@ async def create( ) -> Optional[OriginCACertificate]: """Create an Origin CA certificate. - Use your Origin CA Key as your User Service Key - when calling this endpoint ([see above](#requests)). + You can use an Origin CA Key as your User + Service Key or an API token when calling this endpoint ([see above](#requests)). Args: csr: The Certificate Signing Request (CSR). Must be newline-encoded. @@ -333,8 +333,8 @@ def list( ) -> AsyncPaginator[OriginCACertificate, AsyncSinglePage[OriginCACertificate]]: """List all existing Origin CA certificates for a given zone. - Use your Origin CA - Key as your User Service Key when calling this endpoint + You can use an Origin + CA Key as your User Service Key or an API token when calling this endpoint ([see above](#requests)). Args: @@ -376,9 +376,9 @@ async def delete( ) -> Optional[OriginCACertificateDeleteResponse]: """Revoke an existing Origin CA certificate by its serial number. - Use your Origin - CA Key as your User Service Key when calling this endpoint - ([see above](#requests)). + You can use an + Origin CA Key as your User Service Key or an API token when calling this + endpoint ([see above](#requests)). Args: certificate_id: Identifier @@ -420,9 +420,9 @@ async def get( ) -> Optional[OriginCACertificate]: """Get an existing Origin CA certificate by its serial number. - Use your Origin CA - Key as your User Service Key when calling this endpoint - ([see above](#requests)). + You can use an + Origin CA Key as your User Service Key or an API token when calling this + endpoint ([see above](#requests)). Args: certificate_id: Identifier diff --git a/src/cloudflare/resources/ssl/certificate_packs/certificate_packs.py b/src/cloudflare/resources/ssl/certificate_packs/certificate_packs.py index 6861ccb024e..c69514bb182 100644 --- a/src/cloudflare/resources/ssl/certificate_packs/certificate_packs.py +++ b/src/cloudflare/resources/ssl/certificate_packs/certificate_packs.py @@ -100,8 +100,8 @@ def create( validity_days: Validity Days selected for the order. - cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add - sni.cloudflaressl.com as the Common Name if set true. + cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add a + subdomain of sni.cloudflaressl.com as the Common Name if set to true. extra_headers: Send extra headers @@ -230,7 +230,7 @@ def edit( certificate_pack_id: str, *, zone_id: str, - body: object, + cloudflare_branding: bool | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -238,17 +238,19 @@ def edit( extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, ) -> Optional[CertificatePackEditResponse]: - """For a given zone, restart validation for an advanced certificate pack. - - This is - only a validation operation for a Certificate Pack in a validation_timed_out - status. + """ + For a given zone, restart validation or add cloudflare branding for an advanced + certificate pack. The former is only a validation operation for a Certificate + Pack in a validation_timed_out status. Args: zone_id: Identifier certificate_pack_id: Identifier + cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add a + subdomain of sni.cloudflaressl.com as the Common Name if set to true. + extra_headers: Send extra headers extra_query: Add additional query parameters to the request @@ -265,7 +267,9 @@ def edit( ) return self._patch( f"/zones/{zone_id}/ssl/certificate_packs/{certificate_pack_id}", - body=maybe_transform(body, certificate_pack_edit_params.CertificatePackEditParams), + body=maybe_transform( + {"cloudflare_branding": cloudflare_branding}, certificate_pack_edit_params.CertificatePackEditParams + ), options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -383,8 +387,8 @@ async def create( validity_days: Validity Days selected for the order. - cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add - sni.cloudflaressl.com as the Common Name if set true. + cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add a + subdomain of sni.cloudflaressl.com as the Common Name if set to true. extra_headers: Send extra headers @@ -513,7 +517,7 @@ async def edit( certificate_pack_id: str, *, zone_id: str, - body: object, + cloudflare_branding: bool | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -521,17 +525,19 @@ async def edit( extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, ) -> Optional[CertificatePackEditResponse]: - """For a given zone, restart validation for an advanced certificate pack. - - This is - only a validation operation for a Certificate Pack in a validation_timed_out - status. + """ + For a given zone, restart validation or add cloudflare branding for an advanced + certificate pack. The former is only a validation operation for a Certificate + Pack in a validation_timed_out status. Args: zone_id: Identifier certificate_pack_id: Identifier + cloudflare_branding: Whether or not to add Cloudflare Branding for the order. This will add a + subdomain of sni.cloudflaressl.com as the Common Name if set to true. + extra_headers: Send extra headers extra_query: Add additional query parameters to the request @@ -548,7 +554,9 @@ async def edit( ) return await self._patch( f"/zones/{zone_id}/ssl/certificate_packs/{certificate_pack_id}", - body=await async_maybe_transform(body, certificate_pack_edit_params.CertificatePackEditParams), + body=await async_maybe_transform( + {"cloudflare_branding": cloudflare_branding}, certificate_pack_edit_params.CertificatePackEditParams + ), options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, diff --git a/src/cloudflare/types/custom_hostnames/custom_hostname_create_params.py b/src/cloudflare/types/custom_hostnames/custom_hostname_create_params.py index 397b77429df..8a1df196aa6 100644 --- a/src/cloudflare/types/custom_hostnames/custom_hostname_create_params.py +++ b/src/cloudflare/types/custom_hostnames/custom_hostname_create_params.py @@ -62,6 +62,13 @@ class SSL(TypedDict, total=False): certificate_authority: CertificateCA """The Certificate Authority that will issue the certificate""" + cloudflare_branding: bool + """Whether or not to add Cloudflare Branding for the order. + + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true + """ + custom_certificate: str """If a custom uploaded certificate is used.""" diff --git a/src/cloudflare/types/custom_hostnames/custom_hostname_edit_params.py b/src/cloudflare/types/custom_hostnames/custom_hostname_edit_params.py index 8d3a2f4787e..57e1ba1ba7c 100644 --- a/src/cloudflare/types/custom_hostnames/custom_hostname_edit_params.py +++ b/src/cloudflare/types/custom_hostnames/custom_hostname_edit_params.py @@ -74,6 +74,13 @@ class SSL(TypedDict, total=False): certificate_authority: CertificateCA """The Certificate Authority that will issue the certificate""" + cloudflare_branding: bool + """Whether or not to add Cloudflare Branding for the order. + + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true + """ + custom_certificate: str """If a custom uploaded certificate is used.""" diff --git a/src/cloudflare/types/ssl/certificate_pack_create_params.py b/src/cloudflare/types/ssl/certificate_pack_create_params.py index 133b66024a4..53fa68ca46e 100644 --- a/src/cloudflare/types/ssl/certificate_pack_create_params.py +++ b/src/cloudflare/types/ssl/certificate_pack_create_params.py @@ -40,5 +40,6 @@ class CertificatePackCreateParams(TypedDict, total=False): cloudflare_branding: bool """Whether or not to add Cloudflare Branding for the order. - This will add sni.cloudflaressl.com as the Common Name if set true. + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true. """ diff --git a/src/cloudflare/types/ssl/certificate_pack_create_response.py b/src/cloudflare/types/ssl/certificate_pack_create_response.py index b336b98dce9..f712569e9d4 100644 --- a/src/cloudflare/types/ssl/certificate_pack_create_response.py +++ b/src/cloudflare/types/ssl/certificate_pack_create_response.py @@ -24,7 +24,8 @@ class CertificatePackCreateResponse(BaseModel): cloudflare_branding: Optional[bool] = None """Whether or not to add Cloudflare Branding for the order. - This will add sni.cloudflaressl.com as the Common Name if set true. + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true. """ hosts: Optional[List[Host]] = None diff --git a/src/cloudflare/types/ssl/certificate_pack_edit_params.py b/src/cloudflare/types/ssl/certificate_pack_edit_params.py index 3ca3b845dda..c04757a891d 100644 --- a/src/cloudflare/types/ssl/certificate_pack_edit_params.py +++ b/src/cloudflare/types/ssl/certificate_pack_edit_params.py @@ -11,4 +11,9 @@ class CertificatePackEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - body: Required[object] + cloudflare_branding: bool + """Whether or not to add Cloudflare Branding for the order. + + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true. + """ diff --git a/src/cloudflare/types/ssl/certificate_pack_edit_response.py b/src/cloudflare/types/ssl/certificate_pack_edit_response.py index a977f5613dc..c1451872d1e 100644 --- a/src/cloudflare/types/ssl/certificate_pack_edit_response.py +++ b/src/cloudflare/types/ssl/certificate_pack_edit_response.py @@ -24,7 +24,8 @@ class CertificatePackEditResponse(BaseModel): cloudflare_branding: Optional[bool] = None """Whether or not to add Cloudflare Branding for the order. - This will add sni.cloudflaressl.com as the Common Name if set true. + This will add a subdomain of sni.cloudflaressl.com as the Common Name if set to + true. """ hosts: Optional[List[Host]] = None diff --git a/tests/api_resources/ssl/test_certificate_packs.py b/tests/api_resources/ssl/test_certificate_packs.py index 07a089faf50..fe5a13d1898 100644 --- a/tests/api_resources/ssl/test_certificate_packs.py +++ b/tests/api_resources/ssl/test_certificate_packs.py @@ -192,7 +192,15 @@ def test_method_edit(self, client: Cloudflare) -> None: certificate_pack = client.ssl.certificate_packs.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, + ) + assert_matches_type(Optional[CertificatePackEditResponse], certificate_pack, path=["response"]) + + @parametrize + def test_method_edit_with_all_params(self, client: Cloudflare) -> None: + certificate_pack = client.ssl.certificate_packs.edit( + certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", + zone_id="023e105f4ecef8ad9ca31a8372d0c353", + cloudflare_branding=False, ) assert_matches_type(Optional[CertificatePackEditResponse], certificate_pack, path=["response"]) @@ -201,7 +209,6 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: response = client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) assert response.is_closed is True @@ -214,7 +221,6 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: with client.ssl.certificate_packs.with_streaming_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) as response: assert not response.is_closed assert response.http_request.headers.get("X-Stainless-Lang") == "python" @@ -230,14 +236,12 @@ def test_path_params_edit(self, client: Cloudflare) -> None: client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="", - body={}, ) with pytest.raises(ValueError, match=r"Expected a non-empty value for `certificate_pack_id` but received ''"): client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) @parametrize @@ -462,7 +466,15 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: certificate_pack = await async_client.ssl.certificate_packs.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, + ) + assert_matches_type(Optional[CertificatePackEditResponse], certificate_pack, path=["response"]) + + @parametrize + async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) -> None: + certificate_pack = await async_client.ssl.certificate_packs.edit( + certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", + zone_id="023e105f4ecef8ad9ca31a8372d0c353", + cloudflare_branding=False, ) assert_matches_type(Optional[CertificatePackEditResponse], certificate_pack, path=["response"]) @@ -471,7 +483,6 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: response = await async_client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) assert response.is_closed is True @@ -484,7 +495,6 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N async with async_client.ssl.certificate_packs.with_streaming_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) as response: assert not response.is_closed assert response.http_request.headers.get("X-Stainless-Lang") == "python" @@ -500,14 +510,12 @@ async def test_path_params_edit(self, async_client: AsyncCloudflare) -> None: await async_client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="023e105f4ecef8ad9ca31a8372d0c353", zone_id="", - body={}, ) with pytest.raises(ValueError, match=r"Expected a non-empty value for `certificate_pack_id` but received ''"): await async_client.ssl.certificate_packs.with_raw_response.edit( certificate_pack_id="", zone_id="023e105f4ecef8ad9ca31a8372d0c353", - body={}, ) @parametrize diff --git a/tests/api_resources/test_custom_hostnames.py b/tests/api_resources/test_custom_hostnames.py index 743635412ac..8b5d3b7f2a4 100644 --- a/tests/api_resources/test_custom_hostnames.py +++ b/tests/api_resources/test_custom_hostnames.py @@ -41,6 +41,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: ssl={ "bundle_method": "ubiquitous", "certificate_authority": "digicert", + "cloudflare_branding": False, "custom_certificate": "-----BEGIN CERTIFICATE-----\\nMIIFJDCCBAygAwIBAgIQD0ifmj/Yi5NP/2gdUySbfzANBgkqhkiG9w0BAQsFADBN\\nMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E...SzSHfXp5lnu/3V08I72q1QNzOCgY1XeL4GKVcj4or6cT6tX6oJH7ePPmfrBfqI/O\\nOeH8gMJ+FuwtXYEPa4hBf38M5eU5xWG7\\n-----END CERTIFICATE-----\\n", "custom_key": "-----BEGIN RSA PRIVATE KEY-----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\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", "method": "http", @@ -216,6 +217,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: ssl={ "bundle_method": "ubiquitous", "certificate_authority": "digicert", + "cloudflare_branding": False, "custom_certificate": "-----BEGIN CERTIFICATE-----\\nMIIFJDCCBAygAwIBAgIQD0ifmj/Yi5NP/2gdUySbfzANBgkqhkiG9w0BAQsFADBN\\nMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E...SzSHfXp5lnu/3V08I72q1QNzOCgY1XeL4GKVcj4or6cT6tX6oJH7ePPmfrBfqI/O\\nOeH8gMJ+FuwtXYEPa4hBf38M5eU5xWG7\\n-----END CERTIFICATE-----\\n", "custom_key": "-----BEGIN RSA PRIVATE KEY-----\nMIIEowIBAAKCAQEAwQHoetcl9+5ikGzV6cMzWtWPJHqXT3wpbEkRU9Yz7lgvddmG\ndtcGbg/1CGZu0jJGkMoppoUo4c3dts3iwqRYmBikUP77wwY2QGmDZw2FvkJCJlKn\nabIRuGvBKwzESIXgKk2016aTP6/dAjEHyo6SeoK8lkIySUvK0fyOVlsiEsCmOpid\ntnKX/a+50GjB79CJH4ER2lLVZnhePFR/zUOyPxZQQ4naHf7yu/b5jhO0f8fwt+py\nFxIXjbEIdZliWRkRMtzrHOJIhrmJ2A1J7iOrirbbwillwjjNVUWPf3IJ3M12S9pE\newooaeO2izNTERcG9HzAacbVRn2Y2SWIyT/18QIDAQABAoIBACbhTYXBZYKmYPCb\nHBR1IBlCQA2nLGf0qRuJNJZg5iEzXows/6tc8YymZkQE7nolapWsQ+upk2y5Xdp/\naxiuprIs9JzkYK8Ox0r+dlwCG1kSW+UAbX0bQ/qUqlsTvU6muVuMP8vZYHxJ3wmb\n+ufRBKztPTQ/rYWaYQcgC0RWI20HTFBMxlTAyNxYNWzX7RKFkGVVyB9RsAtmcc8g\n+j4OdosbfNoJPS0HeIfNpAznDfHKdxDk2Yc1tV6RHBrC1ynyLE9+TaflIAdo2MVv\nKLMLq51GqYKtgJFIlBRPQqKoyXdz3fGvXrTkf/WY9QNq0J1Vk5ERePZ54mN8iZB7\n9lwy/AkCgYEA6FXzosxswaJ2wQLeoYc7ceaweX/SwTvxHgXzRyJIIT0eJWgx13Wo\n/WA3Iziimsjf6qE+SI/8laxPp2A86VMaIt3Z3mJN/CqSVGw8LK2AQst+OwdPyDMu\niacE8lj/IFGC8mwNUAb9CzGU3JpU4PxxGFjS/eMtGeRXCWkK4NE+G08CgYEA1Kp9\nN2JrVlqUz+gAX+LPmE9OEMAS9WQSQsfCHGogIFDGGcNf7+uwBM7GAaSJIP01zcoe\nVAgWdzXCv3FLhsaZoJ6RyLOLay5phbu1iaTr4UNYm5WtYTzMzqh8l1+MFFDl9xDB\nvULuCIIrglM5MeS/qnSg1uMoH2oVPj9TVst/ir8CgYEAxrI7Ws9Zc4Bt70N1As+U\nlySjaEVZCMkqvHJ6TCuVZFfQoE0r0whdLdRLU2PsLFP+q7qaeZQqgBaNSKeVcDYR\n9B+nY/jOmQoPewPVsp/vQTCnE/R81spu0mp0YI6cIheT1Z9zAy322svcc43JaWB7\nmEbeqyLOP4Z4qSOcmghZBSECgYACvR9Xs0DGn+wCsW4vze/2ei77MD4OQvepPIFX\ndFZtlBy5ADcgE9z0cuVB6CiL8DbdK5kwY9pGNr8HUCI03iHkW6Zs+0L0YmihfEVe\nPG19PSzK9CaDdhD9KFZSbLyVFmWfxOt50H7YRTTiPMgjyFpfi5j2q348yVT0tEQS\nfhRqaQKBgAcWPokmJ7EbYQGeMbS7HC8eWO/RyamlnSffdCdSc7ue3zdVJxpAkQ8W\nqu80pEIF6raIQfAf8MXiiZ7auFOSnHQTXUbhCpvDLKi0Mwq3G8Pl07l+2s6dQG6T\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", "method": "http", @@ -341,6 +343,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare ssl={ "bundle_method": "ubiquitous", "certificate_authority": "digicert", + "cloudflare_branding": False, "custom_certificate": "-----BEGIN CERTIFICATE-----\\nMIIFJDCCBAygAwIBAgIQD0ifmj/Yi5NP/2gdUySbfzANBgkqhkiG9w0BAQsFADBN\\nMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E...SzSHfXp5lnu/3V08I72q1QNzOCgY1XeL4GKVcj4or6cT6tX6oJH7ePPmfrBfqI/O\\nOeH8gMJ+FuwtXYEPa4hBf38M5eU5xWG7\\n-----END CERTIFICATE-----\\n", "custom_key": "-----BEGIN RSA PRIVATE KEY-----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\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", "method": "http", @@ -516,6 +519,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) ssl={ "bundle_method": "ubiquitous", "certificate_authority": "digicert", + "cloudflare_branding": False, "custom_certificate": "-----BEGIN CERTIFICATE-----\\nMIIFJDCCBAygAwIBAgIQD0ifmj/Yi5NP/2gdUySbfzANBgkqhkiG9w0BAQsFADBN\\nMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E...SzSHfXp5lnu/3V08I72q1QNzOCgY1XeL4GKVcj4or6cT6tX6oJH7ePPmfrBfqI/O\\nOeH8gMJ+FuwtXYEPa4hBf38M5eU5xWG7\\n-----END CERTIFICATE-----\\n", "custom_key": "-----BEGIN RSA PRIVATE KEY-----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\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", "method": "http",