From 4d90d5016b8572533baa502cb5dff17bb356cfda Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Fri, 6 Dec 2024 16:58:38 +0000 Subject: [PATCH] feat(api): api update --- .stats.yml | 2 +- src/cloudflare/resources/zero_trust/gateway/rules.py | 4 ---- .../zero_trust/gateway/certificate_activate_response.py | 5 +++-- .../types/zero_trust/gateway/certificate_create_response.py | 5 +++-- .../zero_trust/gateway/certificate_deactivate_response.py | 5 +++-- .../types/zero_trust/gateway/certificate_delete_response.py | 5 +++-- .../types/zero_trust/gateway/certificate_get_response.py | 5 +++-- .../types/zero_trust/gateway/certificate_list_response.py | 5 +++-- .../zero_trust/gateway/gateway_configuration_settings.py | 4 ++-- .../gateway/gateway_configuration_settings_param.py | 4 ++-- src/cloudflare/types/zero_trust/gateway/gateway_rule.py | 4 +++- .../types/zero_trust/gateway/rule_create_params.py | 4 +++- .../types/zero_trust/gateway/rule_update_params.py | 4 +++- tests/api_resources/zero_trust/gateway/test_rules.py | 4 ++++ 14 files changed, 36 insertions(+), 24 deletions(-) diff --git a/.stats.yml b/.stats.yml index ee82d7a6ae8..3f333a1521b 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,2 +1,2 @@ configured_endpoints: 1450 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-0530d6510c5b139af850d24a4f932d5139c8d321a955ffa101b0debafbd75465.yml +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-4dc0e42c684fd5bb1470f8d6251d3d4a5194297e87606215b60d9a6ba5a5f7eb.yml diff --git a/src/cloudflare/resources/zero_trust/gateway/rules.py b/src/cloudflare/resources/zero_trust/gateway/rules.py index 5baebf5f3ec..49c84543bea 100644 --- a/src/cloudflare/resources/zero_trust/gateway/rules.py +++ b/src/cloudflare/resources/zero_trust/gateway/rules.py @@ -70,7 +70,6 @@ def create( "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ], @@ -186,7 +185,6 @@ def update( "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ], @@ -490,7 +488,6 @@ async def create( "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ], @@ -606,7 +603,6 @@ async def update( "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ], diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_activate_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_activate_response.py index 42f2ba87a76..e7b87f8181b 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_activate_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_activate_response.py @@ -13,10 +13,11 @@ class CertificateActivateResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_create_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_create_response.py index 6637e1a399f..aaa8a5d3566 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_create_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_create_response.py @@ -13,10 +13,11 @@ class CertificateCreateResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_deactivate_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_deactivate_response.py index 6b568ba631c..56f94f52aef 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_deactivate_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_deactivate_response.py @@ -13,10 +13,11 @@ class CertificateDeactivateResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_delete_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_delete_response.py index 7a54f766e45..9ad9d1f241e 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_delete_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_delete_response.py @@ -13,10 +13,11 @@ class CertificateDeleteResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_get_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_get_response.py index 009c5112c48..d0e98007d86 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_get_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_get_response.py @@ -13,10 +13,11 @@ class CertificateGetResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/certificate_list_response.py b/src/cloudflare/types/zero_trust/gateway/certificate_list_response.py index f3364339ece..a0996905731 100644 --- a/src/cloudflare/types/zero_trust/gateway/certificate_list_response.py +++ b/src/cloudflare/types/zero_trust/gateway/certificate_list_response.py @@ -13,10 +13,11 @@ class CertificateListResponse(BaseModel): id: Optional[str] = None """Certificate UUID tag.""" - binding_status: Optional[Literal["pending_deployment", "active", "pending_deletion", "inactive"]] = None + binding_status: Optional[Literal["pending_deployment", "available", "pending_deletion", "inactive"]] = None """The deployment status of the certificate on Cloudflare's edge. - Certificates in the 'active' state may be used for Gateway TLS interception. + Certificates in the 'available' (previously called 'active') state may be used + for Gateway TLS interception. """ certificate: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings.py b/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings.py index 4272d91a8d1..2b040e89014 100644 --- a/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings.py +++ b/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings.py @@ -22,8 +22,8 @@ class Certificate(BaseModel): id: str """UUID of certificate to be used for interception. - Certificate must be active on the edge. A nil UUID will indicate the Cloudflare - Root CA should be used. + Certificate must be available (previously called 'active') on the edge. A nil + UUID will indicate the Cloudflare Root CA should be used. """ diff --git a/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings_param.py b/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings_param.py index e282bd2b4a6..c5bfcfb237d 100644 --- a/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings_param.py +++ b/src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings_param.py @@ -22,8 +22,8 @@ class Certificate(TypedDict, total=False): id: Required[str] """UUID of certificate to be used for interception. - Certificate must be active on the edge. A nil UUID will indicate the Cloudflare - Root CA should be used. + Certificate must be available (previously called 'active') on the edge. A nil + UUID will indicate the Cloudflare Root CA should be used. """ diff --git a/src/cloudflare/types/zero_trust/gateway/gateway_rule.py b/src/cloudflare/types/zero_trust/gateway/gateway_rule.py index 5376a52fedb..0f312358eea 100644 --- a/src/cloudflare/types/zero_trust/gateway/gateway_rule.py +++ b/src/cloudflare/types/zero_trust/gateway/gateway_rule.py @@ -31,6 +31,9 @@ class Expiration(BaseModel): Must be set in order to use the `reset_expiration` endpoint on this rule. """ + expired: Optional[bool] = None + """Whether the policy has expired.""" + class GatewayRule(BaseModel): id: Optional[str] = None @@ -51,7 +54,6 @@ class GatewayRule(BaseModel): "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ] diff --git a/src/cloudflare/types/zero_trust/gateway/rule_create_params.py b/src/cloudflare/types/zero_trust/gateway/rule_create_params.py index 3a641a51f61..8d898ad2c1a 100644 --- a/src/cloudflare/types/zero_trust/gateway/rule_create_params.py +++ b/src/cloudflare/types/zero_trust/gateway/rule_create_params.py @@ -32,7 +32,6 @@ class RuleCreateParams(TypedDict, total=False): "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ] @@ -109,3 +108,6 @@ class Expiration(TypedDict, total=False): Must be set in order to use the `reset_expiration` endpoint on this rule. """ + + expired: bool + """Whether the policy has expired.""" diff --git a/src/cloudflare/types/zero_trust/gateway/rule_update_params.py b/src/cloudflare/types/zero_trust/gateway/rule_update_params.py index 8490f27488a..ffb753ef599 100644 --- a/src/cloudflare/types/zero_trust/gateway/rule_update_params.py +++ b/src/cloudflare/types/zero_trust/gateway/rule_update_params.py @@ -32,7 +32,6 @@ class RuleUpdateParams(TypedDict, total=False): "override", "l4_override", "egress", - "audit_ssh", "resolve", "quarantine", ] @@ -109,3 +108,6 @@ class Expiration(TypedDict, total=False): Must be set in order to use the `reset_expiration` endpoint on this rule. """ + + expired: bool + """Whether the policy has expired.""" diff --git a/tests/api_resources/zero_trust/gateway/test_rules.py b/tests/api_resources/zero_trust/gateway/test_rules.py index 06a9b700d29..8852212a8b5 100644 --- a/tests/api_resources/zero_trust/gateway/test_rules.py +++ b/tests/api_resources/zero_trust/gateway/test_rules.py @@ -42,6 +42,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: expiration={ "expires_at": parse_datetime("2014-01-01T05:20:20Z"), "duration": 10, + "expired": False, }, filters=["http"], identity='any(identity.groups.name[*] in {"finance"})', @@ -181,6 +182,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: expiration={ "expires_at": parse_datetime("2014-01-01T05:20:20Z"), "duration": 10, + "expired": False, }, filters=["http"], identity='any(identity.groups.name[*] in {"finance"})', @@ -515,6 +517,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare expiration={ "expires_at": parse_datetime("2014-01-01T05:20:20Z"), "duration": 10, + "expired": False, }, filters=["http"], identity='any(identity.groups.name[*] in {"finance"})', @@ -654,6 +657,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare expiration={ "expires_at": parse_datetime("2014-01-01T05:20:20Z"), "duration": 10, + "expired": False, }, filters=["http"], identity='any(identity.groups.name[*] in {"finance"})',