@@ -21,7 +21,7 @@ class TestPolicies:
2121 @parametrize
2222 def test_method_create (self , client : Asktable ) -> None :
2323 policy = client .policies .create (
24- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
24+ dataset_config = {"datasource_ids" : ["string" ]},
2525 name = "name" ,
2626 permission = "allow" ,
2727 )
@@ -31,7 +31,7 @@ def test_method_create(self, client: Asktable) -> None:
3131 def test_method_create_with_all_params (self , client : Asktable ) -> None :
3232 policy = client .policies .create (
3333 dataset_config = {
34- "datasource_ids" : ["string" , "string" , "string" ],
34+ "datasource_ids" : ["string" ],
3535 "regex_patterns" : {
3636 "fields_regex_pattern" : ".*password.* | .*pwd.*" ,
3737 "schemas_regex_pattern" : "^public.*$" ,
@@ -55,7 +55,7 @@ def test_method_create_with_all_params(self, client: Asktable) -> None:
5555 @parametrize
5656 def test_raw_response_create (self , client : Asktable ) -> None :
5757 response = client .policies .with_raw_response .create (
58- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
58+ dataset_config = {"datasource_ids" : ["string" ]},
5959 name = "name" ,
6060 permission = "allow" ,
6161 )
@@ -68,7 +68,7 @@ def test_raw_response_create(self, client: Asktable) -> None:
6868 @parametrize
6969 def test_streaming_response_create (self , client : Asktable ) -> None :
7070 with client .policies .with_streaming_response .create (
71- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
71+ dataset_config = {"datasource_ids" : ["string" ]},
7272 name = "name" ,
7373 permission = "allow" ,
7474 ) as response :
@@ -130,7 +130,7 @@ def test_method_update_with_all_params(self, client: Asktable) -> None:
130130 policy = client .policies .update (
131131 policy_id = "policy_id" ,
132132 dataset_config = {
133- "datasource_ids" : ["string" , "string" , "string" ],
133+ "datasource_ids" : ["string" ],
134134 "regex_patterns" : {
135135 "fields_regex_pattern" : ".*password.* | .*pwd.*" ,
136136 "schemas_regex_pattern" : "^public.*$" ,
@@ -144,7 +144,7 @@ def test_method_update_with_all_params(self, client: Asktable) -> None:
144144 "field_regex" : "field_regex" ,
145145 "operator_expression" : "operator_expression" ,
146146 "table_regex" : "table_regex" ,
147- "variables" : ["string" , "string" , "string" ],
147+ "variables" : ["string" ],
148148 }
149149 ],
150150 "ds_sJAbnNOUzu3R4DdCCOwe" : [
@@ -154,31 +154,31 @@ def test_method_update_with_all_params(self, client: Asktable) -> None:
154154 "field_regex" : "field_regex" ,
155155 "operator_expression" : "operator_expression" ,
156156 "table_regex" : "table_regex" ,
157- "variables" : ["string" , "string" , "string" ],
157+ "variables" : ["string" ],
158158 },
159159 {
160160 "condition" : "condition" ,
161161 "db_regex" : "db_regex" ,
162162 "field_regex" : "field_regex" ,
163163 "operator_expression" : "operator_expression" ,
164164 "table_regex" : "table_regex" ,
165- "variables" : ["string" , "string" , "string" ],
165+ "variables" : ["string" ],
166166 },
167167 {
168168 "condition" : "condition" ,
169169 "db_regex" : "db_regex" ,
170170 "field_regex" : "field_regex" ,
171171 "operator_expression" : "operator_expression" ,
172172 "table_regex" : "table_regex" ,
173- "variables" : ["string" , "string" , "string" ],
173+ "variables" : ["string" ],
174174 },
175175 {
176176 "condition" : "condition" ,
177177 "db_regex" : "db_regex" ,
178178 "field_regex" : "field_regex" ,
179179 "operator_expression" : "operator_expression" ,
180180 "table_regex" : "table_regex" ,
181- "variables" : ["string" , "string" , "string" ],
181+ "variables" : ["string" ],
182182 },
183183 ],
184184 },
@@ -229,7 +229,7 @@ def test_method_list_with_all_params(self, client: Asktable) -> None:
229229 policy = client .policies .list (
230230 name = "name" ,
231231 page = 1 ,
232- policy_ids = ["string" , "string" , "string" ],
232+ policy_ids = ["string" ],
233233 size = 1 ,
234234 )
235235 assert_matches_type (PolicyListResponse , policy , path = ["response" ])
@@ -299,7 +299,7 @@ class TestAsyncPolicies:
299299 @parametrize
300300 async def test_method_create (self , async_client : AsyncAsktable ) -> None :
301301 policy = await async_client .policies .create (
302- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
302+ dataset_config = {"datasource_ids" : ["string" ]},
303303 name = "name" ,
304304 permission = "allow" ,
305305 )
@@ -309,7 +309,7 @@ async def test_method_create(self, async_client: AsyncAsktable) -> None:
309309 async def test_method_create_with_all_params (self , async_client : AsyncAsktable ) -> None :
310310 policy = await async_client .policies .create (
311311 dataset_config = {
312- "datasource_ids" : ["string" , "string" , "string" ],
312+ "datasource_ids" : ["string" ],
313313 "regex_patterns" : {
314314 "fields_regex_pattern" : ".*password.* | .*pwd.*" ,
315315 "schemas_regex_pattern" : "^public.*$" ,
@@ -333,7 +333,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncAsktable)
333333 @parametrize
334334 async def test_raw_response_create (self , async_client : AsyncAsktable ) -> None :
335335 response = await async_client .policies .with_raw_response .create (
336- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
336+ dataset_config = {"datasource_ids" : ["string" ]},
337337 name = "name" ,
338338 permission = "allow" ,
339339 )
@@ -346,7 +346,7 @@ async def test_raw_response_create(self, async_client: AsyncAsktable) -> None:
346346 @parametrize
347347 async def test_streaming_response_create (self , async_client : AsyncAsktable ) -> None :
348348 async with async_client .policies .with_streaming_response .create (
349- dataset_config = {"datasource_ids" : ["string" , "string" , "string" ]},
349+ dataset_config = {"datasource_ids" : ["string" ]},
350350 name = "name" ,
351351 permission = "allow" ,
352352 ) as response :
@@ -408,7 +408,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncAsktable)
408408 policy = await async_client .policies .update (
409409 policy_id = "policy_id" ,
410410 dataset_config = {
411- "datasource_ids" : ["string" , "string" , "string" ],
411+ "datasource_ids" : ["string" ],
412412 "regex_patterns" : {
413413 "fields_regex_pattern" : ".*password.* | .*pwd.*" ,
414414 "schemas_regex_pattern" : "^public.*$" ,
@@ -422,7 +422,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncAsktable)
422422 "field_regex" : "field_regex" ,
423423 "operator_expression" : "operator_expression" ,
424424 "table_regex" : "table_regex" ,
425- "variables" : ["string" , "string" , "string" ],
425+ "variables" : ["string" ],
426426 }
427427 ],
428428 "ds_sJAbnNOUzu3R4DdCCOwe" : [
@@ -432,31 +432,31 @@ async def test_method_update_with_all_params(self, async_client: AsyncAsktable)
432432 "field_regex" : "field_regex" ,
433433 "operator_expression" : "operator_expression" ,
434434 "table_regex" : "table_regex" ,
435- "variables" : ["string" , "string" , "string" ],
435+ "variables" : ["string" ],
436436 },
437437 {
438438 "condition" : "condition" ,
439439 "db_regex" : "db_regex" ,
440440 "field_regex" : "field_regex" ,
441441 "operator_expression" : "operator_expression" ,
442442 "table_regex" : "table_regex" ,
443- "variables" : ["string" , "string" , "string" ],
443+ "variables" : ["string" ],
444444 },
445445 {
446446 "condition" : "condition" ,
447447 "db_regex" : "db_regex" ,
448448 "field_regex" : "field_regex" ,
449449 "operator_expression" : "operator_expression" ,
450450 "table_regex" : "table_regex" ,
451- "variables" : ["string" , "string" , "string" ],
451+ "variables" : ["string" ],
452452 },
453453 {
454454 "condition" : "condition" ,
455455 "db_regex" : "db_regex" ,
456456 "field_regex" : "field_regex" ,
457457 "operator_expression" : "operator_expression" ,
458458 "table_regex" : "table_regex" ,
459- "variables" : ["string" , "string" , "string" ],
459+ "variables" : ["string" ],
460460 },
461461 ],
462462 },
@@ -507,7 +507,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncAsktable) ->
507507 policy = await async_client .policies .list (
508508 name = "name" ,
509509 page = 1 ,
510- policy_ids = ["string" , "string" , "string" ],
510+ policy_ids = ["string" ],
511511 size = 1 ,
512512 )
513513 assert_matches_type (PolicyListResponse , policy , path = ["response" ])
0 commit comments