diff --git a/tests/api-resources/abuse-reports.test.ts b/tests/api-resources/abuse-reports.test.ts
index e33365cb8d..f26e4c84f0 100644
--- a/tests/api-resources/abuse-reports.test.ts
+++ b/tests/api-resources/abuse-reports.test.ts
@@ -12,7 +12,7 @@ const client = new Cloudflare({
describe('resource abuseReports', () => {
// TODO: investigate unauthorized HTTP response
test.skip('create: only required params', async () => {
- const responsePromise = client.abuseReports.create('abuse_dmca', {
+ const responsePromise = client.abuseReports.create('abuse_general', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
address1: 'x',
agent_name: 'x',
@@ -36,7 +36,7 @@ describe('resource abuseReports', () => {
// TODO: investigate unauthorized HTTP response
test.skip('create: required and optional params', async () => {
- const response = await client.abuseReports.create('abuse_dmca', {
+ const response = await client.abuseReports.create('abuse_general', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
address1: 'x',
agent_name: 'x',
@@ -48,7 +48,7 @@ describe('resource abuseReports', () => {
owner_notification: 'send',
signature: 'signature',
state: 'x',
- act: 'abuse_dmca',
+ act: 'abuse_general',
comments: 'x',
company: 'x',
destination_ips: 'destination_ips',
diff --git a/tests/api-resources/accounts/accounts.test.ts b/tests/api-resources/accounts/accounts.test.ts
index b122463a1d..d6aa0a71d1 100644
--- a/tests/api-resources/accounts/accounts.test.ts
+++ b/tests/api-resources/accounts/accounts.test.ts
@@ -78,7 +78,7 @@ describe('resource accounts', () => {
// ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error
await expect(
client.accounts.list(
- { direction: 'asc', name: 'example.com', page: 1, per_page: 5 },
+ { direction: 'desc', name: 'example.com', page: 1, per_page: 5 },
{ path: '/_stainless_unknown_path' },
),
).rejects.toThrow(Cloudflare.NotFoundError);
diff --git a/tests/api-resources/accounts/logs/audit.test.ts b/tests/api-resources/accounts/logs/audit.test.ts
index 8d954a7eba..f87b0f2baf 100644
--- a/tests/api-resources/accounts/logs/audit.test.ts
+++ b/tests/api-resources/accounts/logs/audit.test.ts
@@ -41,7 +41,7 @@ describe('resource audit', () => {
actor_ip_address: '17.168.228.63',
actor_token_id: '144cdb2e39c55e203cf225d8d8208647',
actor_token_name: 'Test Token',
- actor_type: 'cloudflare_admin',
+ actor_type: 'account',
audit_log_id: 'f174be97-19b1-40d6-954d-70cd5fbd52db',
cursor: 'Q1buH-__DQqqig7SVYXT-SsMOTGY2Z3Y80W-fGgva7yaDdmPKveucH5ddOcHsJRhNb-xUK8agZQqkJSMAENGO8NU6g==',
direction: 'desc',
diff --git a/tests/api-resources/accounts/members.test.ts b/tests/api-resources/accounts/members.test.ts
index 9e99f87916..b0b1f88f9c 100644
--- a/tests/api-resources/accounts/members.test.ts
+++ b/tests/api-resources/accounts/members.test.ts
@@ -72,8 +72,8 @@ describe('resource members', () => {
test('list: required and optional params', async () => {
const response = await client.accounts.members.list({
account_id: 'eb78d65290b24279ba6f44721b3ea3c4',
- direction: 'asc',
- order: 'user.first_name',
+ direction: 'desc',
+ order: 'status',
page: 1,
per_page: 5,
status: 'accepted',
diff --git a/tests/api-resources/accounts/subscriptions.test.ts b/tests/api-resources/accounts/subscriptions.test.ts
index 31b523f38a..cb3621c09c 100644
--- a/tests/api-resources/accounts/subscriptions.test.ts
+++ b/tests/api-resources/accounts/subscriptions.test.ts
@@ -26,7 +26,7 @@ describe('resource subscriptions', () => {
test('create: required and optional params', async () => {
const response = await client.accounts.subscriptions.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- frequency: 'weekly',
+ frequency: 'monthly',
rate_plan: {
id: 'free',
currency: 'USD',
@@ -55,7 +55,7 @@ describe('resource subscriptions', () => {
test('update: required and optional params', async () => {
const response = await client.accounts.subscriptions.update('506e3185e9c882d175a2d0cb0093d9f2', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- frequency: 'weekly',
+ frequency: 'monthly',
rate_plan: {
id: 'free',
currency: 'USD',
diff --git a/tests/api-resources/accounts/tokens/tokens.test.ts b/tests/api-resources/accounts/tokens/tokens.test.ts
index 4c7b188110..ccde6464d6 100644
--- a/tests/api-resources/accounts/tokens/tokens.test.ts
+++ b/tests/api-resources/accounts/tokens/tokens.test.ts
@@ -142,7 +142,7 @@ describe('resource tokens', () => {
test.skip('list: required and optional params', async () => {
const response = await client.accounts.tokens.list({
account_id: 'eb78d65290b24279ba6f44721b3ea3c4',
- direction: 'asc',
+ direction: 'desc',
page: 1,
per_page: 5,
});
diff --git a/tests/api-resources/alerting/policies.test.ts b/tests/api-resources/alerting/policies.test.ts
index 51dda9d6f4..aed5640624 100644
--- a/tests/api-resources/alerting/policies.test.ts
+++ b/tests/api-resources/alerting/policies.test.ts
@@ -14,7 +14,7 @@ describe('resource policies', () => {
test.skip('create: only required params', async () => {
const responsePromise = client.alerting.policies.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- alert_type: 'access_custom_certificate_expiration_type',
+ alert_type: 'universal_ssl_event_type',
enabled: true,
mechanisms: {},
name: 'SSL Notification Event Policy',
@@ -32,7 +32,7 @@ describe('resource policies', () => {
test.skip('create: required and optional params', async () => {
const response = await client.alerting.policies.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- alert_type: 'access_custom_certificate_expiration_type',
+ alert_type: 'universal_ssl_event_type',
enabled: true,
mechanisms: {
email: [{ id: 'test@example.com' }],
@@ -108,7 +108,7 @@ describe('resource policies', () => {
const response = await client.alerting.policies.update('0da2b59e-f118-439d-8097-bdfb215203c9', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
alert_interval: '30m',
- alert_type: 'access_custom_certificate_expiration_type',
+ alert_type: 'universal_ssl_event_type',
description: 'Something describing the policy.',
enabled: true,
filters: {
diff --git a/tests/api-resources/api-gateway/discovery/operations.test.ts b/tests/api-resources/api-gateway/discovery/operations.test.ts
index 7a171a3354..efb0f604be 100644
--- a/tests/api-resources/api-gateway/discovery/operations.test.ts
+++ b/tests/api-resources/api-gateway/discovery/operations.test.ts
@@ -27,11 +27,11 @@ describe('resource operations', () => {
const response = await client.apiGateway.discovery.operations.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
diff: true,
- direction: 'asc',
+ direction: 'desc',
endpoint: '/api/v1',
host: ['api.cloudflare.com'],
method: ['GET'],
- order: 'host',
+ order: 'method',
origin: 'ML',
page: 1,
per_page: 5,
@@ -57,7 +57,7 @@ describe('resource operations', () => {
const response = await client.apiGateway.discovery.operations.bulkEdit({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
body: {
- '3818d821-5901-4147-a474-f5f5aec1d54e': { state: 'review' },
+ '3818d821-5901-4147-a474-f5f5aec1d54e': { state: 'ignored' },
'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { state: 'review' },
},
});
diff --git a/tests/api-resources/api-gateway/operations/operations.test.ts b/tests/api-resources/api-gateway/operations/operations.test.ts
index 11ef3ed995..210df87d23 100644
--- a/tests/api-resources/api-gateway/operations/operations.test.ts
+++ b/tests/api-resources/api-gateway/operations/operations.test.ts
@@ -51,7 +51,7 @@ describe('resource operations', () => {
test('list: required and optional params', async () => {
const response = await client.apiGateway.operations.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- direction: 'asc',
+ direction: 'desc',
endpoint: '/api/v1',
feature: ['thresholds'],
host: ['api.cloudflare.com'],
diff --git a/tests/api-resources/api-gateway/operations/schema-validation.test.ts b/tests/api-resources/api-gateway/operations/schema-validation.test.ts
index 6db1381197..62c1d4ce8b 100644
--- a/tests/api-resources/api-gateway/operations/schema-validation.test.ts
+++ b/tests/api-resources/api-gateway/operations/schema-validation.test.ts
@@ -27,7 +27,7 @@ describe('resource schemaValidation', () => {
test('update: required and optional params', async () => {
const response = await client.apiGateway.operations.schemaValidation.update(
'f174e90a-fafe-4643-bbbc-4a0ed4fc8415',
- { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mitigation_action: 'log' },
+ { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mitigation_action: 'block' },
);
});
@@ -53,7 +53,7 @@ describe('resource schemaValidation', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
settings_multiple_request: {
'3818d821-5901-4147-a474-f5f5aec1d54e': { mitigation_action: 'log' },
- 'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { mitigation_action: 'log' },
+ 'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { mitigation_action: 'block' },
},
});
});
diff --git a/tests/api-resources/api-gateway/settings/schema-validation.test.ts b/tests/api-resources/api-gateway/settings/schema-validation.test.ts
index 0513dff7ea..5ab4bffc12 100644
--- a/tests/api-resources/api-gateway/settings/schema-validation.test.ts
+++ b/tests/api-resources/api-gateway/settings/schema-validation.test.ts
@@ -13,7 +13,7 @@ describe('resource schemaValidation', () => {
test('update: only required params', async () => {
const responsePromise = client.apiGateway.settings.schemaValidation.update({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- validation_default_mitigation_action: 'none',
+ validation_default_mitigation_action: 'block',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -27,7 +27,7 @@ describe('resource schemaValidation', () => {
test('update: required and optional params', async () => {
const response = await client.apiGateway.settings.schemaValidation.update({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- validation_default_mitigation_action: 'none',
+ validation_default_mitigation_action: 'block',
validation_override_mitigation_action: 'none',
});
});
@@ -48,7 +48,7 @@ describe('resource schemaValidation', () => {
test('edit: required and optional params', async () => {
const response = await client.apiGateway.settings.schemaValidation.edit({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- validation_default_mitigation_action: 'none',
+ validation_default_mitigation_action: 'block',
validation_override_mitigation_action: 'none',
});
});
diff --git a/tests/api-resources/custom-certificates/custom-certificates.test.ts b/tests/api-resources/custom-certificates/custom-certificates.test.ts
index 1d8b1f281e..b72ebb0988 100644
--- a/tests/api-resources/custom-certificates/custom-certificates.test.ts
+++ b/tests/api-resources/custom-certificates/custom-certificates.test.ts
@@ -37,7 +37,7 @@ describe('resource customCertificates', () => {
bundle_method: 'ubiquitous',
geo_restrictions: { label: 'us' },
policy: '(country: US) or (region: EU)',
- type: 'legacy_custom',
+ type: 'sni_custom',
});
});
diff --git a/tests/api-resources/custom-hostnames/custom-hostnames.test.ts b/tests/api-resources/custom-hostnames/custom-hostnames.test.ts
index cf9c4c6055..21af18bd1b 100644
--- a/tests/api-resources/custom-hostnames/custom-hostnames.test.ts
+++ b/tests/api-resources/custom-hostnames/custom-hostnames.test.ts
@@ -31,7 +31,7 @@ describe('resource customHostnames', () => {
hostname: 'app.example.com',
ssl: {
bundle_method: 'ubiquitous',
- certificate_authority: 'digicert',
+ certificate_authority: 'google',
cloudflare_branding: false,
custom_cert_bundle: [
{
@@ -50,7 +50,7 @@ describe('resource customHostnames', () => {
ciphers: ['ECDHE-RSA-AES128-GCM-SHA256', 'AES128-SHA'],
early_hints: 'on',
http2: 'on',
- min_tls_version: '1.0',
+ min_tls_version: '1.2',
tls_1_3: 'on',
},
type: 'dv',
@@ -75,7 +75,7 @@ describe('resource customHostnames', () => {
const response = await client.customHostnames.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
id: '0d89c70d-ad9f-4843-b99f-6cc0252067e9',
- direction: 'asc',
+ direction: 'desc',
hostname: 'app.example.com',
order: 'ssl',
page: 1,
@@ -124,7 +124,7 @@ describe('resource customHostnames', () => {
custom_origin_sni: 'sni.example.com',
ssl: {
bundle_method: 'ubiquitous',
- certificate_authority: 'digicert',
+ certificate_authority: 'google',
cloudflare_branding: false,
custom_cert_bundle: [
{
@@ -143,7 +143,7 @@ describe('resource customHostnames', () => {
ciphers: ['ECDHE-RSA-AES128-GCM-SHA256', 'AES128-SHA'],
early_hints: 'on',
http2: 'on',
- min_tls_version: '1.0',
+ min_tls_version: '1.2',
tls_1_3: 'on',
},
type: 'dv',
diff --git a/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts b/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts
index 5b816cfaec..dc85bd3a8f 100644
--- a/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts
+++ b/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts
@@ -35,7 +35,7 @@ describe('resource bytimes', () => {
metrics: 'queryCount,uncachedCount',
since: '2023-11-11T12:00:00Z',
sort: '+responseCode,-queryName',
- time_delta: 'all',
+ time_delta: 'hour',
until: '2023-11-11T13:00:00Z',
},
);
diff --git a/tests/api-resources/dns/analytics/reports/bytimes.test.ts b/tests/api-resources/dns/analytics/reports/bytimes.test.ts
index 92b93a9e99..36c84da035 100644
--- a/tests/api-resources/dns/analytics/reports/bytimes.test.ts
+++ b/tests/api-resources/dns/analytics/reports/bytimes.test.ts
@@ -32,7 +32,7 @@ describe('resource bytimes', () => {
metrics: 'queryCount,uncachedCount',
since: '2023-11-11T12:00:00Z',
sort: '+responseCode,-queryName',
- time_delta: 'all',
+ time_delta: 'hour',
until: '2023-11-11T13:00:00Z',
});
});
diff --git a/tests/api-resources/dns/settings/account/account.test.ts b/tests/api-resources/dns/settings/account/account.test.ts
index 28e0754b6c..d01f868674 100644
--- a/tests/api-resources/dns/settings/account/account.test.ts
+++ b/tests/api-resources/dns/settings/account/account.test.ts
@@ -45,7 +45,7 @@ describe('resource account', () => {
rname: 'admin.example.com',
ttl: 3600,
},
- zone_mode: 'standard',
+ zone_mode: 'dns_only',
},
});
});
diff --git a/tests/api-resources/dns/settings/zone.test.ts b/tests/api-resources/dns/settings/zone.test.ts
index 11ce940111..f0cf9e79c9 100644
--- a/tests/api-resources/dns/settings/zone.test.ts
+++ b/tests/api-resources/dns/settings/zone.test.ts
@@ -42,7 +42,7 @@ describe('resource zone', () => {
rname: 'admin.example.com',
ttl: 3600,
},
- zone_mode: 'standard',
+ zone_mode: 'dns_only',
});
});
diff --git a/tests/api-resources/email-routing/rules/catch-alls.test.ts b/tests/api-resources/email-routing/rules/catch-alls.test.ts
index aaf4cce456..6789a6defe 100644
--- a/tests/api-resources/email-routing/rules/catch-alls.test.ts
+++ b/tests/api-resources/email-routing/rules/catch-alls.test.ts
@@ -13,7 +13,7 @@ describe('resource catchAlls', () => {
test('update: only required params', async () => {
const responsePromise = client.emailRouting.rules.catchAlls.update({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop' }],
+ actions: [{ type: 'forward' }],
matchers: [{ type: 'all' }],
});
const rawResponse = await responsePromise.asResponse();
@@ -28,7 +28,7 @@ describe('resource catchAlls', () => {
test('update: required and optional params', async () => {
const response = await client.emailRouting.rules.catchAlls.update({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }],
+ actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }],
matchers: [{ type: 'all' }],
enabled: true,
name: 'Send to user@example.net rule.',
diff --git a/tests/api-resources/email-routing/rules/rules.test.ts b/tests/api-resources/email-routing/rules/rules.test.ts
index 0898d97374..753c6ee628 100644
--- a/tests/api-resources/email-routing/rules/rules.test.ts
+++ b/tests/api-resources/email-routing/rules/rules.test.ts
@@ -13,7 +13,7 @@ describe('resource rules', () => {
test('create: only required params', async () => {
const responsePromise = client.emailRouting.rules.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }],
+ actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }],
matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }],
});
const rawResponse = await responsePromise.asResponse();
@@ -28,7 +28,7 @@ describe('resource rules', () => {
test('create: required and optional params', async () => {
const response = await client.emailRouting.rules.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }],
+ actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }],
matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }],
enabled: true,
name: 'Send to user@example.net rule.',
@@ -39,7 +39,7 @@ describe('resource rules', () => {
test('update: only required params', async () => {
const responsePromise = client.emailRouting.rules.update('a7e6fb77503c41d8a7f3113c6918f10c', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }],
+ actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }],
matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }],
});
const rawResponse = await responsePromise.asResponse();
@@ -54,7 +54,7 @@ describe('resource rules', () => {
test('update: required and optional params', async () => {
const response = await client.emailRouting.rules.update('a7e6fb77503c41d8a7f3113c6918f10c', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }],
+ actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }],
matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }],
enabled: true,
name: 'Send to user@example.net rule.',
diff --git a/tests/api-resources/firewall/access-rules.test.ts b/tests/api-resources/firewall/access-rules.test.ts
index d74b626157..3dbca41d7a 100644
--- a/tests/api-resources/firewall/access-rules.test.ts
+++ b/tests/api-resources/firewall/access-rules.test.ts
@@ -14,7 +14,7 @@ describe('resource accessRules', () => {
test.skip('create: only required params', async () => {
const responsePromise = client.firewall.accessRules.create({
configuration: {},
- mode: 'block',
+ mode: 'challenge',
account_id: 'account_id',
});
const rawResponse = await responsePromise.asResponse();
@@ -30,7 +30,7 @@ describe('resource accessRules', () => {
test.skip('create: required and optional params', async () => {
const response = await client.firewall.accessRules.create({
configuration: { target: 'ip', value: '198.51.100.4' },
- mode: 'block',
+ mode: 'challenge',
account_id: 'account_id',
notes: 'This rule is enabled because of an event that occurred on date X.',
});
@@ -66,7 +66,7 @@ describe('resource accessRules', () => {
test.skip('edit: only required params', async () => {
const responsePromise = client.firewall.accessRules.edit('023e105f4ecef8ad9ca31a8372d0c353', {
configuration: {},
- mode: 'block',
+ mode: 'challenge',
account_id: 'account_id',
});
const rawResponse = await responsePromise.asResponse();
@@ -82,7 +82,7 @@ describe('resource accessRules', () => {
test.skip('edit: required and optional params', async () => {
const response = await client.firewall.accessRules.edit('023e105f4ecef8ad9ca31a8372d0c353', {
configuration: { target: 'ip', value: '198.51.100.4' },
- mode: 'block',
+ mode: 'challenge',
account_id: 'account_id',
notes: 'This rule is enabled because of an event that occurred on date X.',
});
diff --git a/tests/api-resources/firewall/rules.test.ts b/tests/api-resources/firewall/rules.test.ts
index e1d526de46..e73f30c3b0 100644
--- a/tests/api-resources/firewall/rules.test.ts
+++ b/tests/api-resources/firewall/rules.test.ts
@@ -31,7 +31,7 @@ describe('resource rules', () => {
const response = await client.firewall.rules.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
action: {
- mode: 'simulate',
+ mode: 'challenge',
response: { body: 'This request has been rate-limited.', content_type: 'text/xml' },
timeout: 86400,
},
@@ -66,7 +66,7 @@ describe('resource rules', () => {
const response = await client.firewall.rules.update('372e67954025e0ba6aaa6d586b9e0b60', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
action: {
- mode: 'simulate',
+ mode: 'challenge',
response: { body: 'This request has been rate-limited.', content_type: 'text/xml' },
timeout: 86400,
},
diff --git a/tests/api-resources/firewall/ua-rules.test.ts b/tests/api-resources/firewall/ua-rules.test.ts
index 19ac730ea9..5e38482e48 100644
--- a/tests/api-resources/firewall/ua-rules.test.ts
+++ b/tests/api-resources/firewall/ua-rules.test.ts
@@ -15,7 +15,7 @@ describe('resource uaRules', () => {
const responsePromise = client.firewall.uaRules.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
configuration: {},
- mode: 'block',
+ mode: 'challenge',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -31,7 +31,7 @@ describe('resource uaRules', () => {
const response = await client.firewall.uaRules.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
configuration: { target: 'ip', value: '198.51.100.4' },
- mode: 'block',
+ mode: 'challenge',
});
});
@@ -40,7 +40,7 @@ describe('resource uaRules', () => {
const responsePromise = client.firewall.uaRules.update('372e67954025e0ba6aaa6d586b9e0b59', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
configuration: {},
- mode: 'block',
+ mode: 'challenge',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -56,7 +56,7 @@ describe('resource uaRules', () => {
const response = await client.firewall.uaRules.update('372e67954025e0ba6aaa6d586b9e0b59', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
configuration: { target: 'ip', value: '198.51.100.4' },
- mode: 'block',
+ mode: 'challenge',
});
});
diff --git a/tests/api-resources/firewall/waf/overrides.test.ts b/tests/api-resources/firewall/waf/overrides.test.ts
index fa20db5135..d1c84296ff 100644
--- a/tests/api-resources/firewall/waf/overrides.test.ts
+++ b/tests/api-resources/firewall/waf/overrides.test.ts
@@ -39,7 +39,7 @@ describe('resource overrides', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
id: '023e105f4ecef8ad9ca31a8372d0c353',
rewrite_action: {},
- rules: { '100015': 'challenge' },
+ rules: { '100015': 'disable' },
urls: ['shop.example.com/*'],
});
const rawResponse = await responsePromise.asResponse();
@@ -63,7 +63,7 @@ describe('resource overrides', () => {
disable: 'challenge',
simulate: 'challenge',
},
- rules: { '100015': 'challenge' },
+ rules: { '100015': 'disable' },
urls: ['shop.example.com/*'],
});
});
diff --git a/tests/api-resources/firewall/waf/packages/groups.test.ts b/tests/api-resources/firewall/waf/packages/groups.test.ts
index c117c3fcfa..e4c0f06295 100644
--- a/tests/api-resources/firewall/waf/packages/groups.test.ts
+++ b/tests/api-resources/firewall/waf/packages/groups.test.ts
@@ -26,7 +26,7 @@ describe('resource groups', () => {
test('list: required and optional params', async () => {
const response = await client.firewall.waf.packages.groups.list('a25a9a7e9c00afc1fb2e0245519d725b', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- direction: 'asc',
+ direction: 'desc',
match: 'any',
mode: 'on',
name: 'Project Honey Pot',
diff --git a/tests/api-resources/firewall/waf/packages/packages.test.ts b/tests/api-resources/firewall/waf/packages/packages.test.ts
index 635987a357..6e3dea1309 100644
--- a/tests/api-resources/firewall/waf/packages/packages.test.ts
+++ b/tests/api-resources/firewall/waf/packages/packages.test.ts
@@ -28,7 +28,7 @@ describe('resource packages', () => {
test.skip('list: required and optional params', async () => {
const response = await client.firewall.waf.packages.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- direction: 'asc',
+ direction: 'desc',
match: 'any',
name: 'USER',
order: 'name',
diff --git a/tests/api-resources/firewall/waf/packages/rules.test.ts b/tests/api-resources/firewall/waf/packages/rules.test.ts
index 5f4159efc4..44fa0938aa 100644
--- a/tests/api-resources/firewall/waf/packages/rules.test.ts
+++ b/tests/api-resources/firewall/waf/packages/rules.test.ts
@@ -27,10 +27,10 @@ describe('resource rules', () => {
const response = await client.firewall.waf.packages.rules.list('a25a9a7e9c00afc1fb2e0245519d725b', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
description: 'SQL injection prevention for SELECT statements',
- direction: 'asc',
+ direction: 'desc',
group_id: 'de677e5818985db1285d0e80225f06e5',
match: 'any',
- mode: 'DIS',
+ mode: 'CHL',
order: 'priority',
page: 1,
per_page: 5,
@@ -57,7 +57,7 @@ describe('resource rules', () => {
const response = await client.firewall.waf.packages.rules.edit(
'a25a9a7e9c00afc1fb2e0245519d725b',
'a25a9a7e9c00afc1fb2e0245519d725b',
- { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mode: 'default' },
+ { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mode: 'on' },
);
});
diff --git a/tests/api-resources/healthchecks/healthchecks.test.ts b/tests/api-resources/healthchecks/healthchecks.test.ts
index 2ffb4a76ab..b319c922ff 100644
--- a/tests/api-resources/healthchecks/healthchecks.test.ts
+++ b/tests/api-resources/healthchecks/healthchecks.test.ts
@@ -30,7 +30,7 @@ describe('resource healthchecks', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
address: 'www.example.com',
name: 'server-1',
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
consecutive_fails: 0,
consecutive_successes: 0,
description: 'Health check for www.example.com',
@@ -73,7 +73,7 @@ describe('resource healthchecks', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
address: 'www.example.com',
name: 'server-1',
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
consecutive_fails: 0,
consecutive_successes: 0,
description: 'Health check for www.example.com',
@@ -154,7 +154,7 @@ describe('resource healthchecks', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
address: 'www.example.com',
name: 'server-1',
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
consecutive_fails: 0,
consecutive_successes: 0,
description: 'Health check for www.example.com',
diff --git a/tests/api-resources/healthchecks/previews.test.ts b/tests/api-resources/healthchecks/previews.test.ts
index b116ab5a0d..bfe172a323 100644
--- a/tests/api-resources/healthchecks/previews.test.ts
+++ b/tests/api-resources/healthchecks/previews.test.ts
@@ -30,7 +30,7 @@ describe('resource previews', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
address: 'www.example.com',
name: 'server-1',
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
consecutive_fails: 0,
consecutive_successes: 0,
description: 'Health check for www.example.com',
diff --git a/tests/api-resources/images/v1/variants.test.ts b/tests/api-resources/images/v1/variants.test.ts
index ecef242a19..50a1c3bc03 100644
--- a/tests/api-resources/images/v1/variants.test.ts
+++ b/tests/api-resources/images/v1/variants.test.ts
@@ -14,7 +14,7 @@ describe('resource variants', () => {
const responsePromise = client.images.v1.variants.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
id: 'hero',
- options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 },
+ options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 },
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -29,7 +29,7 @@ describe('resource variants', () => {
const response = await client.images.v1.variants.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
id: 'hero',
- options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 },
+ options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 },
neverRequireSignedURLs: true,
});
});
@@ -73,7 +73,7 @@ describe('resource variants', () => {
test('edit: only required params', async () => {
const responsePromise = client.images.v1.variants.edit('hero', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 },
+ options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 },
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -87,7 +87,7 @@ describe('resource variants', () => {
test('edit: required and optional params', async () => {
const response = await client.images.v1.variants.edit('hero', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 },
+ options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 },
neverRequireSignedURLs: true,
});
});
diff --git a/tests/api-resources/load-balancers/load-balancers.test.ts b/tests/api-resources/load-balancers/load-balancers.test.ts
index 94531ff815..ae55f005f1 100644
--- a/tests/api-resources/load-balancers/load-balancers.test.ts
+++ b/tests/api-resources/load-balancers/load-balancers.test.ts
@@ -46,7 +46,7 @@ describe('resource loadBalancers', () => {
US: ['de90f38ced07c2e2f4df50b1f61d4194', '00920f38ce07c2e2f4df50b1f61d4194'],
},
description: 'Load Balancer for www.example.com',
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
networks: ['string'],
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
@@ -85,7 +85,7 @@ describe('resource loadBalancers', () => {
'00920f38ce07c2e2f4df50b1f61d4194',
],
fallback_pool: 'fallback_pool',
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'],
@@ -102,34 +102,34 @@ describe('resource loadBalancers', () => {
ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'],
WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
},
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
},
priority: 0,
terminates: true,
},
],
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
});
});
@@ -171,7 +171,7 @@ describe('resource loadBalancers', () => {
},
description: 'Load Balancer for www.example.com',
enabled: true,
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
networks: ['string'],
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
@@ -210,7 +210,7 @@ describe('resource loadBalancers', () => {
'00920f38ce07c2e2f4df50b1f61d4194',
],
fallback_pool: 'fallback_pool',
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'],
@@ -227,34 +227,34 @@ describe('resource loadBalancers', () => {
ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'],
WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
},
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
},
priority: 0,
terminates: true,
},
],
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
});
});
@@ -322,7 +322,7 @@ describe('resource loadBalancers', () => {
description: 'Load Balancer for www.example.com',
enabled: true,
fallback_pool: 'fallback_pool',
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
name: 'www.example.com',
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
@@ -361,7 +361,7 @@ describe('resource loadBalancers', () => {
'00920f38ce07c2e2f4df50b1f61d4194',
],
fallback_pool: 'fallback_pool',
- location_strategy: { mode: 'pop', prefer_ecs: 'always' },
+ location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' },
pop_pools: {
LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'],
@@ -378,34 +378,34 @@ describe('resource loadBalancers', () => {
ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'],
WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'],
},
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
},
priority: 0,
terminates: true,
},
],
- session_affinity: 'none',
+ session_affinity: 'cookie',
session_affinity_attributes: {
drain_duration: 100,
headers: ['x'],
require_all_headers: true,
samesite: 'Auto',
secure: 'Auto',
- zero_downtime_failover: 'none',
+ zero_downtime_failover: 'sticky',
},
session_affinity_ttl: 1800,
- steering_policy: 'off',
+ steering_policy: 'dynamic_latency',
ttl: 30,
});
});
diff --git a/tests/api-resources/load-balancers/monitors/monitors.test.ts b/tests/api-resources/load-balancers/monitors/monitors.test.ts
index 71e0a1a442..5009015f38 100644
--- a/tests/api-resources/load-balancers/monitors/monitors.test.ts
+++ b/tests/api-resources/load-balancers/monitors/monitors.test.ts
@@ -41,7 +41,7 @@ describe('resource monitors', () => {
probe_zone: 'example.com',
retries: 0,
timeout: 0,
- type: 'http',
+ type: 'https',
});
});
@@ -76,7 +76,7 @@ describe('resource monitors', () => {
probe_zone: 'example.com',
retries: 0,
timeout: 0,
- type: 'http',
+ type: 'https',
});
});
@@ -149,7 +149,7 @@ describe('resource monitors', () => {
probe_zone: 'example.com',
retries: 0,
timeout: 0,
- type: 'http',
+ type: 'https',
});
});
diff --git a/tests/api-resources/load-balancers/monitors/previews.test.ts b/tests/api-resources/load-balancers/monitors/previews.test.ts
index e9c7c1cb79..ba9a582c1f 100644
--- a/tests/api-resources/load-balancers/monitors/previews.test.ts
+++ b/tests/api-resources/load-balancers/monitors/previews.test.ts
@@ -42,7 +42,7 @@ describe('resource previews', () => {
probe_zone: 'example.com',
retries: 0,
timeout: 0,
- type: 'http',
+ type: 'https',
});
});
});
diff --git a/tests/api-resources/load-balancers/pools/health.test.ts b/tests/api-resources/load-balancers/pools/health.test.ts
index 71151c6e9e..b1b80dd52e 100644
--- a/tests/api-resources/load-balancers/pools/health.test.ts
+++ b/tests/api-resources/load-balancers/pools/health.test.ts
@@ -41,7 +41,7 @@ describe('resource health', () => {
probe_zone: 'example.com',
retries: 0,
timeout: 0,
- type: 'http',
+ type: 'https',
});
});
diff --git a/tests/api-resources/load-balancers/pools/pools.test.ts b/tests/api-resources/load-balancers/pools/pools.test.ts
index 5cc16677d4..924a4f42af 100644
--- a/tests/api-resources/load-balancers/pools/pools.test.ts
+++ b/tests/api-resources/load-balancers/pools/pools.test.ts
@@ -89,7 +89,7 @@ describe('resource pools', () => {
weight: 0.6,
},
],
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
description: 'Primary data center - Provider XYZ',
enabled: false,
latitude: 0,
@@ -186,7 +186,7 @@ describe('resource pools', () => {
test('edit: required and optional params', async () => {
const response = await client.loadBalancers.pools.edit('17b5962d775c646f3f9725cbc7a53df4', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- check_regions: ['WNAM', 'ENAM'],
+ check_regions: ['WEU', 'ENAM'],
description: 'Primary data center - Provider XYZ',
enabled: false,
latitude: 0,
diff --git a/tests/api-resources/load-balancers/searches.test.ts b/tests/api-resources/load-balancers/searches.test.ts
index add2728d53..02837b7b84 100644
--- a/tests/api-resources/load-balancers/searches.test.ts
+++ b/tests/api-resources/load-balancers/searches.test.ts
@@ -30,7 +30,7 @@ describe('resource searches', () => {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
page: 1,
per_page: 1,
- search_params: { query: 'primary', references: '' },
+ search_params: { query: 'primary', references: '*' },
});
});
});
diff --git a/tests/api-resources/logs/rayid.test.ts b/tests/api-resources/logs/rayid.test.ts
index 92816a04c8..4e5aeb35e0 100644
--- a/tests/api-resources/logs/rayid.test.ts
+++ b/tests/api-resources/logs/rayid.test.ts
@@ -27,7 +27,7 @@ describe('resource RayID', () => {
const response = await client.logs.RayID.get('41ddf1740f67442d', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
fields: 'ClientIP,RayID,EdgeStartTimestamp',
- timestamps: 'unix',
+ timestamps: 'unixnano',
});
});
});
diff --git a/tests/api-resources/logs/received/received.test.ts b/tests/api-resources/logs/received/received.test.ts
index 16d1848200..9cbc7e0830 100644
--- a/tests/api-resources/logs/received/received.test.ts
+++ b/tests/api-resources/logs/received/received.test.ts
@@ -32,7 +32,7 @@ describe('resource received', () => {
fields: 'ClientIP,RayID,EdgeStartTimestamp',
sample: 0.1,
start: '2018-05-20T10:00:00Z',
- timestamps: 'unix',
+ timestamps: 'unixnano',
});
});
});
diff --git a/tests/api-resources/magic-transit/cf-interconnects.test.ts b/tests/api-resources/magic-transit/cf-interconnects.test.ts
index 8f1a7b68f2..7bd0b7f7be 100644
--- a/tests/api-resources/magic-transit/cf-interconnects.test.ts
+++ b/tests/api-resources/magic-transit/cf-interconnects.test.ts
@@ -30,7 +30,7 @@ describe('resource cfInterconnects', () => {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
description: 'Tunnel for Interconnect to ORD',
gre: { cloudflare_endpoint: '203.0.113.1' },
- health_check: { enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, type: 'reply' },
+ health_check: { enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, type: 'request' },
interface_address: '192.0.2.0/31',
mtu: 0,
'x-magic-new-hc-target': true,
diff --git a/tests/api-resources/magic-transit/gre-tunnels.test.ts b/tests/api-resources/magic-transit/gre-tunnels.test.ts
index fa4e8b7706..b8a102b70a 100644
--- a/tests/api-resources/magic-transit/gre-tunnels.test.ts
+++ b/tests/api-resources/magic-transit/gre-tunnels.test.ts
@@ -62,11 +62,11 @@ describe('resource greTunnels', () => {
name: 'GRE_1',
description: 'Tunnel for ISP X',
health_check: {
- direction: 'unidirectional',
+ direction: 'bidirectional',
enabled: true,
rate: 'low',
target: { saved: '203.0.113.1' },
- type: 'reply',
+ type: 'request',
},
mtu: 0,
ttl: 0,
diff --git a/tests/api-resources/magic-transit/ipsec-tunnels.test.ts b/tests/api-resources/magic-transit/ipsec-tunnels.test.ts
index 80344216c9..ec8bd888c7 100644
--- a/tests/api-resources/magic-transit/ipsec-tunnels.test.ts
+++ b/tests/api-resources/magic-transit/ipsec-tunnels.test.ts
@@ -35,11 +35,11 @@ describe('resource ipsecTunnels', () => {
customer_endpoint: '203.0.113.1',
description: 'Tunnel for ISP X',
health_check: {
- direction: 'unidirectional',
+ direction: 'bidirectional',
enabled: true,
rate: 'low',
target: { saved: '203.0.113.1' },
- type: 'reply',
+ type: 'request',
},
psk: 'O3bwKSjnaoCxDoUxjcq4Rk8ZKkezQUiy',
replay_protection: false,
@@ -74,11 +74,11 @@ describe('resource ipsecTunnels', () => {
customer_endpoint: '203.0.113.1',
description: 'Tunnel for ISP X',
health_check: {
- direction: 'unidirectional',
+ direction: 'bidirectional',
enabled: true,
rate: 'low',
target: { saved: '203.0.113.1' },
- type: 'reply',
+ type: 'request',
},
psk: 'O3bwKSjnaoCxDoUxjcq4Rk8ZKkezQUiy',
replay_protection: false,
diff --git a/tests/api-resources/memberships.test.ts b/tests/api-resources/memberships.test.ts
index dcb8f60117..1473965911 100644
--- a/tests/api-resources/memberships.test.ts
+++ b/tests/api-resources/memberships.test.ts
@@ -53,9 +53,9 @@ describe('resource memberships', () => {
client.memberships.list(
{
account: { name: 'Demo Account' },
- direction: 'asc',
+ direction: 'desc',
name: 'Demo Account',
- order: 'id',
+ order: 'status',
page: 1,
per_page: 5,
status: 'accepted',
diff --git a/tests/api-resources/page-rules.test.ts b/tests/api-resources/page-rules.test.ts
index f37479340f..6210d21044 100644
--- a/tests/api-resources/page-rules.test.ts
+++ b/tests/api-resources/page-rules.test.ts
@@ -78,7 +78,7 @@ describe('resource pageRules', () => {
test('list: required and optional params', async () => {
const response = await client.pageRules.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- direction: 'asc',
+ direction: 'desc',
match: 'any',
order: 'status',
status: 'active',
diff --git a/tests/api-resources/page-shield/cookies.test.ts b/tests/api-resources/page-shield/cookies.test.ts
index a9b2f5f87f..4294533afb 100644
--- a/tests/api-resources/page-shield/cookies.test.ts
+++ b/tests/api-resources/page-shield/cookies.test.ts
@@ -35,7 +35,7 @@ describe('resource cookies', () => {
page_url: 'example.com/page,*/checkout,example.com/*,*checkout*',
path: '/',
per_page: 100,
- same_site: 'lax',
+ same_site: 'strict',
secure: true,
type: 'first_party',
});
diff --git a/tests/api-resources/pages/projects/deployments/deployments.test.ts b/tests/api-resources/pages/projects/deployments/deployments.test.ts
index 9d01b60b82..41d5114e2a 100644
--- a/tests/api-resources/pages/projects/deployments/deployments.test.ts
+++ b/tests/api-resources/pages/projects/deployments/deployments.test.ts
@@ -48,7 +48,7 @@ describe('resource deployments', () => {
test('list: required and optional params', async () => {
const response = await client.pages.projects.deployments.list('this-is-my-project-01', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
- env: 'production',
+ env: 'preview',
});
});
diff --git a/tests/api-resources/r2/buckets/buckets.test.ts b/tests/api-resources/r2/buckets/buckets.test.ts
index b0baf78fc7..93377fc815 100644
--- a/tests/api-resources/r2/buckets/buckets.test.ts
+++ b/tests/api-resources/r2/buckets/buckets.test.ts
@@ -53,7 +53,7 @@ describe('resource buckets', () => {
const response = await client.r2.buckets.list({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
cursor: 'cursor',
- direction: 'asc',
+ direction: 'desc',
name_contains: 'my-bucket',
order: 'name',
per_page: 1,
diff --git a/tests/api-resources/r2/buckets/domains/custom.test.ts b/tests/api-resources/r2/buckets/domains/custom.test.ts
index 3483661ac4..414dbbd1dc 100644
--- a/tests/api-resources/r2/buckets/domains/custom.test.ts
+++ b/tests/api-resources/r2/buckets/domains/custom.test.ts
@@ -63,7 +63,7 @@ describe('resource custom', () => {
{
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
enabled: true,
- minTLS: '1.0',
+ minTLS: '1.2',
jurisdiction: 'default',
},
);
diff --git a/tests/api-resources/r2/temporary-credentials.test.ts b/tests/api-resources/r2/temporary-credentials.test.ts
index ead58de69f..12f9ce71e6 100644
--- a/tests/api-resources/r2/temporary-credentials.test.ts
+++ b/tests/api-resources/r2/temporary-credentials.test.ts
@@ -16,7 +16,7 @@ describe('resource temporaryCredentials', () => {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
bucket: 'example-bucket',
parentAccessKeyId: 'example-access-key-id',
- permission: 'admin-read-write',
+ permission: 'object-read-write',
ttlSeconds: 3600,
});
const rawResponse = await responsePromise.asResponse();
@@ -34,7 +34,7 @@ describe('resource temporaryCredentials', () => {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
bucket: 'example-bucket',
parentAccessKeyId: 'example-access-key-id',
- permission: 'admin-read-write',
+ permission: 'object-read-write',
ttlSeconds: 3600,
objects: ['example-object'],
prefixes: ['example-prefix/'],
diff --git a/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts b/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts
index 70d426687f..6d0bce064f 100644
--- a/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts
+++ b/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts
@@ -33,7 +33,7 @@ describe('resource summary', () => {
await expect(
client.radar.ai.inference.timeseriesGroups.summary.model(
{
- aggInterval: '15m',
+ aggInterval: '1h',
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
dateStart: ['2019-12-27T18:11:19.117Z'],
@@ -69,7 +69,7 @@ describe('resource summary', () => {
await expect(
client.radar.ai.inference.timeseriesGroups.summary.task(
{
- aggInterval: '15m',
+ aggInterval: '1h',
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
dateStart: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/ai/timeseries-groups.test.ts b/tests/api-resources/radar/ai/timeseries-groups.test.ts
index 75aa7020ee..386515626c 100644
--- a/tests/api-resources/radar/ai/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/ai/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.ai.timeseriesGroups.userAgent(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/as112/as112.test.ts b/tests/api-resources/radar/as112/as112.test.ts
index 7ced3bae33..6a188a3f5a 100644
--- a/tests/api-resources/radar/as112/as112.test.ts
+++ b/tests/api-resources/radar/as112/as112.test.ts
@@ -33,7 +33,7 @@ describe('resource as112', () => {
await expect(
client.radar.as112.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/as112/timeseries-groups.test.ts b/tests/api-resources/radar/as112/timeseries-groups.test.ts
index 5aae2eeb6a..0b54804536 100644
--- a/tests/api-resources/radar/as112/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/as112/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.dnssec(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -74,7 +74,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.edns(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -115,7 +115,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -156,7 +156,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.protocol(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -196,7 +196,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.queryType(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -237,7 +237,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.as112.timeseriesGroups.responseCodes(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/attacks/layer3/layer3.test.ts b/tests/api-resources/radar/attacks/layer3/layer3.test.ts
index 9a0e849a45..b3d845624c 100644
--- a/tests/api-resources/radar/attacks/layer3/layer3.test.ts
+++ b/tests/api-resources/radar/attacks/layer3/layer3.test.ts
@@ -33,7 +33,7 @@ describe('resource layer3', () => {
await expect(
client.radar.attacks.layer3.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -45,7 +45,7 @@ describe('resource layer3', () => {
location: ['string'],
metric: 'BYTES',
name: ['main_series'],
- normalization: 'PERCENTAGE_CHANGE',
+ normalization: 'MIN0_MAX',
protocol: ['UDP'],
},
{ path: '/_stainless_unknown_path' },
diff --git a/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts b/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts
index cf56f39de5..a5d754867e 100644
--- a/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.bitrate(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -74,7 +74,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.duration(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -115,7 +115,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.industry(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -157,7 +157,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -197,7 +197,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.protocol(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -237,7 +237,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.vector(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -279,7 +279,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer3.timeseriesGroups.vertical(
{
- aggInterval: '15m',
+ aggInterval: '1h',
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
diff --git a/tests/api-resources/radar/attacks/layer7/layer7.test.ts b/tests/api-resources/radar/attacks/layer7/layer7.test.ts
index 4df93b7583..edab41b510 100644
--- a/tests/api-resources/radar/attacks/layer7/layer7.test.ts
+++ b/tests/api-resources/radar/attacks/layer7/layer7.test.ts
@@ -33,7 +33,7 @@ describe('resource layer7', () => {
await expect(
client.radar.attacks.layer7.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -46,7 +46,7 @@ describe('resource layer7', () => {
location: ['string'],
mitigationProduct: ['DDOS'],
name: ['main_series'],
- normalization: 'PERCENTAGE_CHANGE',
+ normalization: 'MIN0_MAX',
},
{ path: '/_stainless_unknown_path' },
),
diff --git a/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts b/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts
index 1ce5ca0591..287010a122 100644
--- a/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.httpMethod(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -76,7 +76,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.httpVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -118,7 +118,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.industry(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -162,7 +162,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -204,7 +204,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.managedRules(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -248,7 +248,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.mitigationProduct(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -291,7 +291,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.attacks.layer7.timeseriesGroups.vertical(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/attacks/layer7/top/top.test.ts b/tests/api-resources/radar/attacks/layer7/top/top.test.ts
index 604411fa35..459439ed87 100644
--- a/tests/api-resources/radar/attacks/layer7/top/top.test.ts
+++ b/tests/api-resources/radar/attacks/layer7/top/top.test.ts
@@ -43,7 +43,7 @@ describe('resource top', () => {
limitDirection: 'ORIGIN',
limitPerLocation: 10,
location: ['string'],
- magnitude: 'AFFECTED_ZONES',
+ magnitude: 'MITIGATED_REQUESTS',
mitigationProduct: ['DDOS'],
name: ['main_series'],
normalization: 'PERCENTAGE',
diff --git a/tests/api-resources/radar/bgp/bgp.test.ts b/tests/api-resources/radar/bgp/bgp.test.ts
index d4baf72664..3e1f6563c8 100644
--- a/tests/api-resources/radar/bgp/bgp.test.ts
+++ b/tests/api-resources/radar/bgp/bgp.test.ts
@@ -33,7 +33,7 @@ describe('resource bgp', () => {
await expect(
client.radar.bgp.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
diff --git a/tests/api-resources/radar/bgp/hijacks/events.test.ts b/tests/api-resources/radar/bgp/hijacks/events.test.ts
index ff90e3e4bd..2121dc6d82 100644
--- a/tests/api-resources/radar/bgp/hijacks/events.test.ts
+++ b/tests/api-resources/radar/bgp/hijacks/events.test.ts
@@ -46,7 +46,7 @@ describe('resource events', () => {
page: 0,
per_page: 0,
prefix: '1.1.1.0/24',
- sortBy: 'ID',
+ sortBy: 'TIME',
sortOrder: 'ASC',
victimAsn: 0,
},
diff --git a/tests/api-resources/radar/bgp/leaks/events.test.ts b/tests/api-resources/radar/bgp/leaks/events.test.ts
index ff3edab344..f01690aceb 100644
--- a/tests/api-resources/radar/bgp/leaks/events.test.ts
+++ b/tests/api-resources/radar/bgp/leaks/events.test.ts
@@ -43,7 +43,7 @@ describe('resource events', () => {
leakAsn: 0,
page: 0,
per_page: 0,
- sortBy: 'ID',
+ sortBy: 'TIME',
sortOrder: 'ASC',
},
{ path: '/_stainless_unknown_path' },
diff --git a/tests/api-resources/radar/bgp/routes.test.ts b/tests/api-resources/radar/bgp/routes.test.ts
index 0775e1efe0..dd1a373c89 100644
--- a/tests/api-resources/radar/bgp/routes.test.ts
+++ b/tests/api-resources/radar/bgp/routes.test.ts
@@ -32,7 +32,7 @@ describe('resource routes', () => {
// ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error
await expect(
client.radar.bgp.routes.ases(
- { format: 'JSON', limit: 5, location: 'US', sortBy: 'cone', sortOrder: 'ASC' },
+ { format: 'JSON', limit: 5, location: 'US', sortBy: 'ipv4', sortOrder: 'ASC' },
{ path: '/_stainless_unknown_path' },
),
).rejects.toThrow(Cloudflare.NotFoundError);
@@ -88,7 +88,7 @@ describe('resource routes', () => {
// ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error
await expect(
client.radar.bgp.routes.pfx2as(
- { format: 'JSON', longestPrefixMatch: true, origin: 0, prefix: '1.1.1.0/24', rpkiStatus: 'VALID' },
+ { format: 'JSON', longestPrefixMatch: true, origin: 0, prefix: '1.1.1.0/24', rpkiStatus: 'INVALID' },
{ path: '/_stainless_unknown_path' },
),
).rejects.toThrow(Cloudflare.NotFoundError);
diff --git a/tests/api-resources/radar/dns/dns.test.ts b/tests/api-resources/radar/dns/dns.test.ts
index 85ff797a31..bff5419da4 100644
--- a/tests/api-resources/radar/dns/dns.test.ts
+++ b/tests/api-resources/radar/dns/dns.test.ts
@@ -33,7 +33,7 @@ describe('resource dns', () => {
await expect(
client.radar.dns.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/dns/timeseries-groups.test.ts b/tests/api-resources/radar/dns/timeseries-groups.test.ts
index f44531867c..0cc7ce283a 100644
--- a/tests/api-resources/radar/dns/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/dns/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.cacheHit(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -76,7 +76,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.dnssec(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -119,7 +119,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.dnssecAware(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -162,7 +162,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.dnssecE2E(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -205,7 +205,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -248,7 +248,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.matchingAnswer(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -291,7 +291,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.protocol(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -333,7 +333,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.queryType(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -376,7 +376,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.responseCode(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -419,7 +419,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.dns.timeseriesGroups.responseTTL(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/email/routing/timeseries-groups.test.ts b/tests/api-resources/radar/email/routing/timeseries-groups.test.ts
index ed3855208f..be3660bb17 100644
--- a/tests/api-resources/radar/email/routing/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/email/routing/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.arc(
{
- aggInterval: '15m',
+ aggInterval: '1h',
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
dateStart: ['2019-12-27T18:11:19.117Z'],
@@ -73,7 +73,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.dkim(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -113,7 +113,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.dmarc(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -153,7 +153,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.encrypted(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -193,7 +193,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -233,7 +233,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.routing.timeseriesGroups.spf(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
diff --git a/tests/api-resources/radar/email/security/timeseries-groups.test.ts b/tests/api-resources/radar/email/security/timeseries-groups.test.ts
index 9c834e63e6..580b1d32f4 100644
--- a/tests/api-resources/radar/email/security/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/email/security/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.arc(
{
- aggInterval: '15m',
+ aggInterval: '1h',
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
dateStart: ['2019-12-27T18:11:19.117Z'],
@@ -72,7 +72,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.dkim(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -111,7 +111,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.dmarc(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -150,7 +150,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.malicious(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -190,7 +190,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.spam(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -230,7 +230,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.spf(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -269,7 +269,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.spoof(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -309,7 +309,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.threatCategory(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -349,7 +349,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.email.security.timeseriesGroups.tlsVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
arc: ['PASS'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
diff --git a/tests/api-resources/radar/http/http.test.ts b/tests/api-resources/radar/http/http.test.ts
index 035dda3d4f..ec89d94c31 100644
--- a/tests/api-resources/radar/http/http.test.ts
+++ b/tests/api-resources/radar/http/http.test.ts
@@ -33,7 +33,7 @@ describe('resource http', () => {
await expect(
client.radar.http.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -48,7 +48,7 @@ describe('resource http', () => {
ipVersion: ['IPv4'],
location: ['string'],
name: ['main_series'],
- normalization: 'PERCENTAGE_CHANGE',
+ normalization: 'MIN0_MAX',
os: ['WINDOWS'],
tlsVersion: ['TLSv1_0'],
},
diff --git a/tests/api-resources/radar/http/timeseries-groups.test.ts b/tests/api-resources/radar/http/timeseries-groups.test.ts
index efe6ca4836..c333ae2e20 100644
--- a/tests/api-resources/radar/http/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/http/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.botClass(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
browserFamily: ['CHROME'],
continent: ['string'],
@@ -78,7 +78,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.browser(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -125,7 +125,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.browserFamily(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
continent: ['string'],
@@ -171,7 +171,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.deviceType(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -216,7 +216,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.httpProtocol(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -261,7 +261,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.httpVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -306,7 +306,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.ipVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -351,7 +351,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.os(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -396,7 +396,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.postQuantum(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
@@ -442,7 +442,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.http.timeseriesGroups.tlsVersion(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
botClass: ['LIKELY_AUTOMATED'],
browserFamily: ['CHROME'],
diff --git a/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts b/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts
index 9859872182..ccc0cac1bf 100644
--- a/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts
+++ b/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts
@@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.leakedCredentials.timeseriesGroups.botClass(
{
- aggInterval: '15m',
+ aggInterval: '1h',
compromised: ['CLEAN'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
@@ -69,7 +69,7 @@ describe('resource timeseriesGroups', () => {
await expect(
client.radar.leakedCredentials.timeseriesGroups.compromised(
{
- aggInterval: '15m',
+ aggInterval: '1h',
botClass: ['LIKELY_AUTOMATED'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
dateRange: ['7d'],
diff --git a/tests/api-resources/radar/netflows/netflows.test.ts b/tests/api-resources/radar/netflows/netflows.test.ts
index ac41c75460..0b1b8a553f 100644
--- a/tests/api-resources/radar/netflows/netflows.test.ts
+++ b/tests/api-resources/radar/netflows/netflows.test.ts
@@ -70,7 +70,7 @@ describe('resource netflows', () => {
await expect(
client.radar.netflows.timeseries(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
@@ -79,7 +79,7 @@ describe('resource netflows', () => {
format: 'JSON',
location: ['string'],
name: ['main_series'],
- normalization: 'PERCENTAGE_CHANGE',
+ normalization: 'MIN0_MAX',
product: ['HTTP'],
},
{ path: '/_stainless_unknown_path' },
diff --git a/tests/api-resources/radar/quality/iqi.test.ts b/tests/api-resources/radar/quality/iqi.test.ts
index 94fc4e60f1..83f506bcd6 100644
--- a/tests/api-resources/radar/quality/iqi.test.ts
+++ b/tests/api-resources/radar/quality/iqi.test.ts
@@ -49,7 +49,7 @@ describe('resource iqi', () => {
test('timeseriesGroups: required and optional params', async () => {
const response = await client.radar.quality.iqi.timeseriesGroups({
metric: 'BANDWIDTH',
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/radar/tcp-resets-timeouts.test.ts b/tests/api-resources/radar/tcp-resets-timeouts.test.ts
index 98f036f93b..1eb492ca7e 100644
--- a/tests/api-resources/radar/tcp-resets-timeouts.test.ts
+++ b/tests/api-resources/radar/tcp-resets-timeouts.test.ts
@@ -70,7 +70,7 @@ describe('resource tcpResetsTimeouts', () => {
await expect(
client.radar.tcpResetsTimeouts.timeseriesGroups(
{
- aggInterval: '15m',
+ aggInterval: '1h',
asn: ['string'],
continent: ['string'],
dateEnd: ['2019-12-27T18:11:19.117Z'],
diff --git a/tests/api-resources/rate-limits.test.ts b/tests/api-resources/rate-limits.test.ts
index fcf4677a5a..ed633db972 100644
--- a/tests/api-resources/rate-limits.test.ts
+++ b/tests/api-resources/rate-limits.test.ts
@@ -33,12 +33,12 @@ describe('resource rateLimits', () => {
const response = await client.rateLimits.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
action: {
- mode: 'simulate',
+ mode: 'challenge',
response: { body: 'This request has been rate-limited.', content_type: 'text/xml' },
timeout: 86400,
},
match: {
- headers: [{ name: 'Cf-Cache-Status', op: 'eq', value: 'HIT' }],
+ headers: [{ name: 'Cf-Cache-Status', op: 'ne', value: 'HIT' }],
request: { methods: ['GET', 'POST'], schemes: ['HTTP', 'HTTPS'], url: '*.example.org/path*' },
response: { origin_traffic: true },
},
@@ -108,12 +108,12 @@ describe('resource rateLimits', () => {
const response = await client.rateLimits.edit('372e67954025e0ba6aaa6d586b9e0b59', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
action: {
- mode: 'simulate',
+ mode: 'challenge',
response: { body: 'This request has been rate-limited.', content_type: 'text/xml' },
timeout: 86400,
},
match: {
- headers: [{ name: 'Cf-Cache-Status', op: 'eq', value: 'HIT' }],
+ headers: [{ name: 'Cf-Cache-Status', op: 'ne', value: 'HIT' }],
request: { methods: ['GET', 'POST'], schemes: ['HTTP', 'HTTPS'], url: '*.example.org/path*' },
response: { origin_traffic: true },
},
diff --git a/tests/api-resources/rulesets/phases/phases.test.ts b/tests/api-resources/rulesets/phases/phases.test.ts
index aafaef630b..ab41bec324 100644
--- a/tests/api-resources/rulesets/phases/phases.test.ts
+++ b/tests/api-resources/rulesets/phases/phases.test.ts
@@ -12,7 +12,9 @@ const client = new Cloudflare({
describe('resource phases', () => {
// TODO: investigate broken test
test.skip('update', async () => {
- const responsePromise = client.rulesets.phases.update('ddos_l4', { account_id: 'account_id' });
+ const responsePromise = client.rulesets.phases.update('http_request_firewall_custom', {
+ account_id: 'account_id',
+ });
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
const response = await responsePromise;
@@ -24,7 +26,9 @@ describe('resource phases', () => {
// TODO: investigate broken test
test.skip('get', async () => {
- const responsePromise = client.rulesets.phases.get('ddos_l4', { account_id: 'account_id' });
+ const responsePromise = client.rulesets.phases.get('http_request_firewall_custom', {
+ account_id: 'account_id',
+ });
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
const response = await responsePromise;
diff --git a/tests/api-resources/rulesets/phases/versions.test.ts b/tests/api-resources/rulesets/phases/versions.test.ts
index d82e8b7f02..42b3e37b6d 100644
--- a/tests/api-resources/rulesets/phases/versions.test.ts
+++ b/tests/api-resources/rulesets/phases/versions.test.ts
@@ -12,7 +12,9 @@ const client = new Cloudflare({
describe('resource versions', () => {
// TODO: investigate broken test
test.skip('list', async () => {
- const responsePromise = client.rulesets.phases.versions.list('ddos_l4', { account_id: 'account_id' });
+ const responsePromise = client.rulesets.phases.versions.list('http_request_firewall_custom', {
+ account_id: 'account_id',
+ });
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
const response = await responsePromise;
@@ -24,7 +26,9 @@ describe('resource versions', () => {
// TODO: investigate broken test
test.skip('get', async () => {
- const responsePromise = client.rulesets.phases.versions.get('ddos_l4', '1', { account_id: 'account_id' });
+ const responsePromise = client.rulesets.phases.versions.get('http_request_firewall_custom', '1', {
+ account_id: 'account_id',
+ });
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
const response = await responsePromise;
diff --git a/tests/api-resources/rulesets/rulesets.test.ts b/tests/api-resources/rulesets/rulesets.test.ts
index 7903904da3..0b514b88e2 100644
--- a/tests/api-resources/rulesets/rulesets.test.ts
+++ b/tests/api-resources/rulesets/rulesets.test.ts
@@ -13,9 +13,9 @@ describe('resource rulesets', () => {
// TODO: investigate broken test
test.skip('create: only required params', async () => {
const responsePromise = client.rulesets.create({
- kind: 'managed',
+ kind: 'root',
name: 'My ruleset',
- phase: 'ddos_l4',
+ phase: 'http_request_firewall_custom',
account_id: 'account_id',
});
const rawResponse = await responsePromise.asResponse();
@@ -30,9 +30,9 @@ describe('resource rulesets', () => {
// TODO: investigate broken test
test.skip('create: required and optional params', async () => {
const response = await client.rulesets.create({
- kind: 'managed',
+ kind: 'root',
name: 'My ruleset',
- phase: 'ddos_l4',
+ phase: 'http_request_firewall_custom',
account_id: 'account_id',
description: 'My ruleset to execute managed rulesets',
rules: [
@@ -56,7 +56,7 @@ describe('resource rulesets', () => {
logging: { enabled: true },
ratelimit: {
characteristics: ['ip.src'],
- period: 10,
+ period: 60,
counting_expression: 'http.request.body.raw eq "abcd"',
mitigation_timeout: 600,
requests_per_period: 1000,
diff --git a/tests/api-resources/spectrum/analytics/events/bytimes.test.ts b/tests/api-resources/spectrum/analytics/events/bytimes.test.ts
index 3f630b9b5a..ec06ed7ff4 100644
--- a/tests/api-resources/spectrum/analytics/events/bytimes.test.ts
+++ b/tests/api-resources/spectrum/analytics/events/bytimes.test.ts
@@ -13,7 +13,7 @@ describe('resource bytimes', () => {
test('get: only required params', async () => {
const responsePromise = client.spectrum.analytics.events.bytimes.get({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- time_delta: 'year',
+ time_delta: 'minute',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -27,7 +27,7 @@ describe('resource bytimes', () => {
test('get: required and optional params', async () => {
const response = await client.spectrum.analytics.events.bytimes.get({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- time_delta: 'year',
+ time_delta: 'minute',
dimensions: ['event', 'appID'],
filters: 'event==disconnect%20AND%20coloName!=SFO',
metrics: ['count', 'bytesIngress'],
diff --git a/tests/api-resources/spectrum/apps.test.ts b/tests/api-resources/spectrum/apps.test.ts
index 89691196f6..2dc7ed7932 100644
--- a/tests/api-resources/spectrum/apps.test.ts
+++ b/tests/api-resources/spectrum/apps.test.ts
@@ -18,7 +18,7 @@ describe('resource apps', () => {
ip_firewall: true,
protocol: 'tcp/22',
proxy_protocol: 'off',
- tls: 'off',
+ tls: 'full',
traffic_type: 'direct',
});
const rawResponse = await responsePromise.asResponse();
@@ -38,7 +38,7 @@ describe('resource apps', () => {
ip_firewall: true,
protocol: 'tcp/22',
proxy_protocol: 'off',
- tls: 'off',
+ tls: 'full',
traffic_type: 'direct',
argo_smart_routing: true,
edge_ips: { connectivity: 'all', type: 'dynamic' },
@@ -56,7 +56,7 @@ describe('resource apps', () => {
ip_firewall: true,
protocol: 'tcp/22',
proxy_protocol: 'off',
- tls: 'off',
+ tls: 'full',
traffic_type: 'direct',
});
const rawResponse = await responsePromise.asResponse();
@@ -76,7 +76,7 @@ describe('resource apps', () => {
ip_firewall: true,
protocol: 'tcp/22',
proxy_protocol: 'off',
- tls: 'off',
+ tls: 'full',
traffic_type: 'direct',
argo_smart_routing: true,
edge_ips: { connectivity: 'all', type: 'dynamic' },
@@ -102,7 +102,7 @@ describe('resource apps', () => {
test.skip('list: required and optional params', async () => {
const response = await client.spectrum.apps.list({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- direction: 'asc',
+ direction: 'desc',
order: 'protocol',
page: 1,
per_page: 1,
diff --git a/tests/api-resources/speed/pages/pages.test.ts b/tests/api-resources/speed/pages/pages.test.ts
index 033f102cec..76e009a459 100644
--- a/tests/api-resources/speed/pages/pages.test.ts
+++ b/tests/api-resources/speed/pages/pages.test.ts
@@ -31,7 +31,7 @@ describe('resource pages', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
deviceType: 'DESKTOP',
metrics: 'performanceScore,ttfb,fcp,si,lcp,tti,tbt,cls',
- region: 'asia-east1',
+ region: 'us-central1',
start: '2014-01-01T05:20:00.12345Z',
tz: 'tz',
});
@@ -50,7 +50,7 @@ describe('resource pages', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
deviceType: 'DESKTOP',
metrics: 'performanceScore,ttfb,fcp,si,lcp,tti,tbt,cls',
- region: 'asia-east1',
+ region: 'us-central1',
start: '2014-01-01T05:20:00.12345Z',
tz: 'tz',
end: '2014-01-01T05:20:00.12345Z',
diff --git a/tests/api-resources/speed/pages/tests.test.ts b/tests/api-resources/speed/pages/tests.test.ts
index 68803f1123..e4af4445a1 100644
--- a/tests/api-resources/speed/pages/tests.test.ts
+++ b/tests/api-resources/speed/pages/tests.test.ts
@@ -26,7 +26,7 @@ describe('resource tests', () => {
test('create: required and optional params', async () => {
const response = await client.speed.pages.tests.create('example.com', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- region: 'asia-east1',
+ region: 'us-central1',
});
});
@@ -48,7 +48,7 @@ describe('resource tests', () => {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
page: 0,
per_page: 5,
- region: 'asia-east1',
+ region: 'us-central1',
});
});
@@ -68,7 +68,7 @@ describe('resource tests', () => {
test('delete: required and optional params', async () => {
const response = await client.speed.pages.tests.delete('example.com', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- region: 'asia-east1',
+ region: 'us-central1',
});
});
diff --git a/tests/api-resources/speed/schedule.test.ts b/tests/api-resources/speed/schedule.test.ts
index 9b8c169225..af501d1f69 100644
--- a/tests/api-resources/speed/schedule.test.ts
+++ b/tests/api-resources/speed/schedule.test.ts
@@ -26,7 +26,7 @@ describe('resource schedule', () => {
test('create: required and optional params', async () => {
const response = await client.speed.schedule.create('example.com', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- region: 'asia-east1',
+ region: 'us-central1',
});
});
@@ -46,7 +46,7 @@ describe('resource schedule', () => {
test('delete: required and optional params', async () => {
const response = await client.speed.schedule.delete('example.com', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- region: 'asia-east1',
+ region: 'us-central1',
});
});
@@ -66,7 +66,7 @@ describe('resource schedule', () => {
test('get: required and optional params', async () => {
const response = await client.speed.schedule.get('example.com', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- region: 'asia-east1',
+ region: 'us-central1',
});
});
});
diff --git a/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts b/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts
index 7414ce0ffe..ce54844c79 100644
--- a/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts
+++ b/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts
@@ -13,7 +13,7 @@ describe('resource certificatePacks', () => {
test('create: only required params', async () => {
const responsePromise = client.ssl.certificatePacks.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- certificate_authority: 'google',
+ certificate_authority: 'lets_encrypt',
hosts: ['example.com', '*.example.com', 'www.example.com'],
type: 'advanced',
validation_method: 'txt',
@@ -31,7 +31,7 @@ describe('resource certificatePacks', () => {
test('create: required and optional params', async () => {
const response = await client.ssl.certificatePacks.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- certificate_authority: 'google',
+ certificate_authority: 'lets_encrypt',
hosts: ['example.com', '*.example.com', 'www.example.com'],
type: 'advanced',
validation_method: 'txt',
diff --git a/tests/api-resources/ssl/verification.test.ts b/tests/api-resources/ssl/verification.test.ts
index a7681299b1..6669fdc04b 100644
--- a/tests/api-resources/ssl/verification.test.ts
+++ b/tests/api-resources/ssl/verification.test.ts
@@ -13,7 +13,7 @@ describe('resource verification', () => {
test('edit: only required params', async () => {
const responsePromise = client.ssl.verification.edit('a77f8bd7-3b47-46b4-a6f1-75cf98109948', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- validation_method: 'http',
+ validation_method: 'txt',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -27,7 +27,7 @@ describe('resource verification', () => {
test('edit: required and optional params', async () => {
const response = await client.ssl.verification.edit('a77f8bd7-3b47-46b4-a6f1-75cf98109948', {
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
- validation_method: 'http',
+ validation_method: 'txt',
});
});
diff --git a/tests/api-resources/stream/stream.test.ts b/tests/api-resources/stream/stream.test.ts
index 05f6443f3a..1559b01649 100644
--- a/tests/api-resources/stream/stream.test.ts
+++ b/tests/api-resources/stream/stream.test.ts
@@ -61,7 +61,7 @@ describe('resource stream', () => {
include_counts: true,
search: 'puppy.mp4',
start: '2014-01-02T02:20:00Z',
- status: 'pendingupload',
+ status: 'inprogress',
type: 'live',
});
});
diff --git a/tests/api-resources/stream/token.test.ts b/tests/api-resources/stream/token.test.ts
index 2eeb9d4b4d..9e6739b341 100644
--- a/tests/api-resources/stream/token.test.ts
+++ b/tests/api-resources/stream/token.test.ts
@@ -28,9 +28,9 @@ describe('resource token', () => {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
id: 'ab0d4ef71g4425f8dcba9041231813000',
accessRules: [
- { action: 'allow', country: ['US', 'MX'], ip: ['string'], type: 'any' },
- { action: 'allow', country: ['string'], ip: ['93.184.216.0/24', '2400:cb00::/32'], type: 'any' },
- { action: 'allow', country: ['string'], ip: ['string'], type: 'any' },
+ { action: 'block', country: ['US', 'MX'], ip: ['string'], type: 'ip.geoip.country' },
+ { action: 'allow', country: ['string'], ip: ['93.184.216.0/24', '2400:cb00::/32'], type: 'ip.src' },
+ { action: 'block', country: ['string'], ip: ['string'], type: 'any' },
],
downloadable: true,
exp: 0,
diff --git a/tests/api-resources/turnstile/widgets.test.ts b/tests/api-resources/turnstile/widgets.test.ts
index 4956642d55..e468ace3b8 100644
--- a/tests/api-resources/turnstile/widgets.test.ts
+++ b/tests/api-resources/turnstile/widgets.test.ts
@@ -14,7 +14,7 @@ describe('resource widgets', () => {
const responsePromise = client.turnstile.widgets.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'],
- mode: 'non-interactive',
+ mode: 'invisible',
name: 'blog.cloudflare.com login form',
});
const rawResponse = await responsePromise.asResponse();
@@ -30,14 +30,14 @@ describe('resource widgets', () => {
const response = await client.turnstile.widgets.create({
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'],
- mode: 'non-interactive',
+ mode: 'invisible',
name: 'blog.cloudflare.com login form',
direction: 'asc',
order: 'id',
page: 1,
per_page: 5,
bot_fight_mode: false,
- clearance_level: 'no_clearance',
+ clearance_level: 'interactive',
ephemeral_id: false,
offlabel: false,
region: 'world',
@@ -48,7 +48,7 @@ describe('resource widgets', () => {
const responsePromise = client.turnstile.widgets.update('0x4AAF00AAAABn0R22HWm-YUc', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'],
- mode: 'non-interactive',
+ mode: 'invisible',
name: 'blog.cloudflare.com login form',
});
const rawResponse = await responsePromise.asResponse();
@@ -64,10 +64,10 @@ describe('resource widgets', () => {
const response = await client.turnstile.widgets.update('0x4AAF00AAAABn0R22HWm-YUc', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'],
- mode: 'non-interactive',
+ mode: 'invisible',
name: 'blog.cloudflare.com login form',
bot_fight_mode: false,
- clearance_level: 'no_clearance',
+ clearance_level: 'interactive',
ephemeral_id: false,
offlabel: false,
});
diff --git a/tests/api-resources/user/billing/history.test.ts b/tests/api-resources/user/billing/history.test.ts
index ca5ac5a635..f5c3c7ec4a 100644
--- a/tests/api-resources/user/billing/history.test.ts
+++ b/tests/api-resources/user/billing/history.test.ts
@@ -35,7 +35,7 @@ describe('resource history', () => {
{
action: 'subscription',
occurred_at: '2014-03-01T12:21:59.3456Z',
- order: 'type',
+ order: 'occurred_at',
page: 1,
per_page: 5,
type: 'charge',
diff --git a/tests/api-resources/user/organizations.test.ts b/tests/api-resources/user/organizations.test.ts
index 01c9b6e9ee..26494ae49a 100644
--- a/tests/api-resources/user/organizations.test.ts
+++ b/tests/api-resources/user/organizations.test.ts
@@ -33,10 +33,10 @@ describe('resource organizations', () => {
await expect(
client.user.organizations.list(
{
- direction: 'asc',
+ direction: 'desc',
match: 'any',
name: 'Cloudflare, Inc.',
- order: 'id',
+ order: 'status',
page: 1,
per_page: 5,
status: 'member',
diff --git a/tests/api-resources/user/tokens/tokens.test.ts b/tests/api-resources/user/tokens/tokens.test.ts
index 83b1e1e964..700a927eac 100644
--- a/tests/api-resources/user/tokens/tokens.test.ts
+++ b/tests/api-resources/user/tokens/tokens.test.ts
@@ -147,7 +147,7 @@ describe('resource tokens', () => {
// ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error
await expect(
client.user.tokens.list(
- { direction: 'asc', page: 1, per_page: 5 },
+ { direction: 'desc', page: 1, per_page: 5 },
{ path: '/_stainless_unknown_path' },
),
).rejects.toThrow(Cloudflare.NotFoundError);
diff --git a/tests/api-resources/waiting-rooms/waiting-rooms.test.ts b/tests/api-resources/waiting-rooms/waiting-rooms.test.ts
index f1496d7bcc..b7f7177f26 100644
--- a/tests/api-resources/waiting-rooms/waiting-rooms.test.ts
+++ b/tests/api-resources/waiting-rooms/waiting-rooms.test.ts
@@ -39,7 +39,7 @@ describe('resource waitingRooms', () => {
cookie_suffix: 'abcd',
custom_page_html:
'{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}',
- default_template_language: 'en-US',
+ default_template_language: 'es-ES',
description: 'Production - DO NOT MODIFY',
disable_session_renewal: false,
enabled_origin_commands: ['revoke'],
@@ -47,7 +47,7 @@ describe('resource waitingRooms', () => {
path: '/shop/checkout',
queue_all: true,
queueing_method: 'fifo',
- queueing_status_code: 200,
+ queueing_status_code: 202,
session_duration: 1,
suspended: true,
turnstile_action: 'log',
@@ -84,7 +84,7 @@ describe('resource waitingRooms', () => {
cookie_suffix: 'abcd',
custom_page_html:
'{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}',
- default_template_language: 'en-US',
+ default_template_language: 'es-ES',
description: 'Production - DO NOT MODIFY',
disable_session_renewal: false,
enabled_origin_commands: ['revoke'],
@@ -92,7 +92,7 @@ describe('resource waitingRooms', () => {
path: '/shop/checkout',
queue_all: true,
queueing_method: 'fifo',
- queueing_status_code: 200,
+ queueing_status_code: 202,
session_duration: 1,
suspended: true,
turnstile_action: 'log',
@@ -159,7 +159,7 @@ describe('resource waitingRooms', () => {
cookie_suffix: 'abcd',
custom_page_html:
'{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}',
- default_template_language: 'en-US',
+ default_template_language: 'es-ES',
description: 'Production - DO NOT MODIFY',
disable_session_renewal: false,
enabled_origin_commands: ['revoke'],
@@ -167,7 +167,7 @@ describe('resource waitingRooms', () => {
path: '/shop/checkout',
queue_all: true,
queueing_method: 'fifo',
- queueing_status_code: 200,
+ queueing_status_code: 202,
session_duration: 1,
suspended: true,
turnstile_action: 'log',
diff --git a/tests/api-resources/web3/hostnames/hostnames.test.ts b/tests/api-resources/web3/hostnames/hostnames.test.ts
index 04f3b52be6..4d2602b9c3 100644
--- a/tests/api-resources/web3/hostnames/hostnames.test.ts
+++ b/tests/api-resources/web3/hostnames/hostnames.test.ts
@@ -14,7 +14,7 @@ describe('resource hostnames', () => {
const responsePromise = client.web3.hostnames.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
name: 'gateway.example.com',
- target: 'ethereum',
+ target: 'ipfs',
});
const rawResponse = await responsePromise.asResponse();
expect(rawResponse).toBeInstanceOf(Response);
@@ -29,7 +29,7 @@ describe('resource hostnames', () => {
const response = await client.web3.hostnames.create({
zone_id: '023e105f4ecef8ad9ca31a8372d0c353',
name: 'gateway.example.com',
- target: 'ethereum',
+ target: 'ipfs',
description: 'This is my IPFS gateway.',
dnslink: '/ipns/onboarding.ipfs.cloudflare.com',
});
diff --git a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts
index 2ec93c0ebd..fb9fa2c63e 100644
--- a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts
+++ b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts
@@ -39,13 +39,13 @@ describe('resource scripts', () => {
_headers: '/dashboard/*\nX-Frame-Options: DENY\n\n/static/*\nAccess-Control-Allow-Origin: *',
_redirects: '/foo /bar 301\n/news/* /blog/:splat',
html_handling: 'auto-trailing-slash',
- not_found_handling: 'none',
+ not_found_handling: '404-page',
run_worker_first: false,
serve_directly: true,
},
jwt: 'jwt',
},
- bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }],
+ bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }],
body_part: 'worker.js',
compatibility_date: '2021-01-01',
compatibility_flags: ['nodejs_compat'],
diff --git a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts
index 1cf321d40c..f44af08fa0 100644
--- a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts
+++ b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts
@@ -34,7 +34,7 @@ describe('resource settings', () => {
{
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
settings: {
- bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }],
+ bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }],
compatibility_date: '2021-01-01',
compatibility_flags: ['nodejs_compat'],
limits: { cpu_ms: 50 },
diff --git a/tests/api-resources/workers/scripts/script-and-version-settings.test.ts b/tests/api-resources/workers/scripts/script-and-version-settings.test.ts
index acfbb2a4ec..ed2c081d22 100644
--- a/tests/api-resources/workers/scripts/script-and-version-settings.test.ts
+++ b/tests/api-resources/workers/scripts/script-and-version-settings.test.ts
@@ -27,7 +27,7 @@ describe('resource scriptAndVersionSettings', () => {
const response = await client.workers.scripts.scriptAndVersionSettings.edit('this-is_my_script-01', {
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
settings: {
- bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }],
+ bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }],
compatibility_date: '2021-01-01',
compatibility_flags: ['nodejs_compat'],
limits: { cpu_ms: 50 },
diff --git a/tests/api-resources/workers/scripts/scripts.test.ts b/tests/api-resources/workers/scripts/scripts.test.ts
index 46c4dd4ebc..7f79b7c986 100644
--- a/tests/api-resources/workers/scripts/scripts.test.ts
+++ b/tests/api-resources/workers/scripts/scripts.test.ts
@@ -35,13 +35,13 @@ describe('resource scripts', () => {
_headers: '/dashboard/*\nX-Frame-Options: DENY\n\n/static/*\nAccess-Control-Allow-Origin: *',
_redirects: '/foo /bar 301\n/news/* /blog/:splat',
html_handling: 'auto-trailing-slash',
- not_found_handling: 'none',
+ not_found_handling: '404-page',
run_worker_first: false,
serve_directly: true,
},
jwt: 'jwt',
},
- bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }],
+ bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }],
body_part: 'worker.js',
compatibility_date: '2021-01-01',
compatibility_flags: ['nodejs_compat'],
diff --git a/tests/api-resources/workers/scripts/versions.test.ts b/tests/api-resources/workers/scripts/versions.test.ts
index 2676bd7ff2..c12c104fa3 100644
--- a/tests/api-resources/workers/scripts/versions.test.ts
+++ b/tests/api-resources/workers/scripts/versions.test.ts
@@ -32,7 +32,7 @@ describe('resource versions', () => {
metadata: {
main_module: 'worker.js',
annotations: { 'workers/message': 'Fixed worker code.', 'workers/tag': 'workers/tag' },
- bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }],
+ bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }],
compatibility_date: '2021-01-01',
compatibility_flags: ['nodejs_compat'],
keep_bindings: ['string'],
diff --git a/tests/api-resources/zero-trust/devices/posture/posture.test.ts b/tests/api-resources/zero-trust/devices/posture/posture.test.ts
index 3421b8bd79..b596a78407 100644
--- a/tests/api-resources/zero-trust/devices/posture/posture.test.ts
+++ b/tests/api-resources/zero-trust/devices/posture/posture.test.ts
@@ -33,7 +33,7 @@ describe('resource posture', () => {
description: 'The rule for admin serial numbers',
expiration: '1h',
input: {
- operating_system: 'windows',
+ operating_system: 'linux',
path: '/bin/cat',
exists: true,
sha256: 'https://api.us-2.crowdstrike.com',
@@ -67,7 +67,7 @@ describe('resource posture', () => {
description: 'The rule for admin serial numbers',
expiration: '1h',
input: {
- operating_system: 'windows',
+ operating_system: 'linux',
path: '/bin/cat',
exists: true,
sha256: 'https://api.us-2.crowdstrike.com',
diff --git a/tests/api-resources/zero-trust/gateway/rules.test.ts b/tests/api-resources/zero-trust/gateway/rules.test.ts
index b4333f046a..d1c3b76866 100644
--- a/tests/api-resources/zero-trust/gateway/rules.test.ts
+++ b/tests/api-resources/zero-trust/gateway/rules.test.ts
@@ -13,7 +13,7 @@ describe('resource rules', () => {
test('create: only required params', async () => {
const responsePromise = client.zeroTrust.gateway.rules.create({
account_id: '699d98642c564d2e855e9661899b7252',
- action: 'on',
+ action: 'allow',
name: 'block bad websites',
});
const rawResponse = await responsePromise.asResponse();
@@ -28,7 +28,7 @@ describe('resource rules', () => {
test('create: required and optional params', async () => {
const response = await client.zeroTrust.gateway.rules.create({
account_id: '699d98642c564d2e855e9661899b7252',
- action: 'on',
+ action: 'allow',
name: 'block bad websites',
description: 'Block bad websites based on their host name.',
device_posture: 'any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})',
@@ -42,7 +42,7 @@ describe('resource rules', () => {
allow_child_bypass: false,
audit_ssh: { command_logging: false },
biso_admin_controls: {
- copy: 'enabled',
+ copy: 'remote_only',
dcp: false,
dd: false,
dk: false,
@@ -91,7 +91,7 @@ describe('resource rules', () => {
redirect: { target_uri: 'https://example.com', preserve_path_and_query: true },
resolve_dns_internally: { fallback: 'none', view_id: 'view_id' },
resolve_dns_through_cloudflare: true,
- untrusted_cert: { action: 'pass_through' },
+ untrusted_cert: { action: 'error' },
},
schedule: {
fri: '08:00-12:30,13:30-17:00',
@@ -111,7 +111,7 @@ describe('resource rules', () => {
test('update: only required params', async () => {
const responsePromise = client.zeroTrust.gateway.rules.update('f174e90a-fafe-4643-bbbc-4a0ed4fc8415', {
account_id: '699d98642c564d2e855e9661899b7252',
- action: 'on',
+ action: 'allow',
name: 'block bad websites',
});
const rawResponse = await responsePromise.asResponse();
@@ -126,7 +126,7 @@ describe('resource rules', () => {
test('update: required and optional params', async () => {
const response = await client.zeroTrust.gateway.rules.update('f174e90a-fafe-4643-bbbc-4a0ed4fc8415', {
account_id: '699d98642c564d2e855e9661899b7252',
- action: 'on',
+ action: 'allow',
name: 'block bad websites',
description: 'Block bad websites based on their host name.',
device_posture: 'any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})',
@@ -140,7 +140,7 @@ describe('resource rules', () => {
allow_child_bypass: false,
audit_ssh: { command_logging: false },
biso_admin_controls: {
- copy: 'enabled',
+ copy: 'remote_only',
dcp: false,
dd: false,
dk: false,
@@ -189,7 +189,7 @@ describe('resource rules', () => {
redirect: { target_uri: 'https://example.com', preserve_path_and_query: true },
resolve_dns_internally: { fallback: 'none', view_id: 'view_id' },
resolve_dns_through_cloudflare: true,
- untrusted_cert: { action: 'pass_through' },
+ untrusted_cert: { action: 'error' },
},
schedule: {
fri: '08:00-12:30,13:30-17:00',
diff --git a/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts b/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts
index 7edcc8041e..0ccd9e8e69 100644
--- a/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts
+++ b/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts
@@ -28,7 +28,7 @@ describe('resource cloudflared', () => {
const response = await client.zeroTrust.tunnels.cloudflared.create({
account_id: '699d98642c564d2e855e9661899b7252',
name: 'blog',
- config_src: 'local',
+ config_src: 'cloudflare',
tunnel_secret: 'AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=',
});
});
@@ -56,7 +56,7 @@ describe('resource cloudflared', () => {
name: 'blog',
page: 1,
per_page: 1,
- status: 'inactive',
+ status: 'healthy',
uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415',
was_active_at: '2009-11-10T23:00:00Z',
was_inactive_at: '2009-11-10T23:00:00Z',
diff --git a/tests/api-resources/zero-trust/tunnels/tunnels.test.ts b/tests/api-resources/zero-trust/tunnels/tunnels.test.ts
index e69ee503e1..40ebec2e05 100644
--- a/tests/api-resources/zero-trust/tunnels/tunnels.test.ts
+++ b/tests/api-resources/zero-trust/tunnels/tunnels.test.ts
@@ -31,7 +31,7 @@ describe('resource tunnels', () => {
name: 'blog',
page: 1,
per_page: 1,
- status: 'inactive',
+ status: 'healthy',
tun_types: ['cfd_tunnel'],
uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415',
was_active_at: '2009-11-10T23:00:00Z',
diff --git a/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts b/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts
index cf48e7afa5..684883cc20 100644
--- a/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts
+++ b/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts
@@ -54,7 +54,7 @@ describe('resource warpConnector', () => {
name: 'blog',
page: 1,
per_page: 1,
- status: 'inactive',
+ status: 'healthy',
uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415',
was_active_at: '2009-11-10T23:00:00Z',
was_inactive_at: '2009-11-10T23:00:00Z',
diff --git a/tests/api-resources/zones/zones.test.ts b/tests/api-resources/zones/zones.test.ts
index 3ab76e7340..369a82634c 100644
--- a/tests/api-resources/zones/zones.test.ts
+++ b/tests/api-resources/zones/zones.test.ts
@@ -53,10 +53,10 @@ describe('resource zones', () => {
client.zones.list(
{
account: { id: 'id', name: 'name' },
- direction: 'asc',
+ direction: 'desc',
match: 'any',
name: 'name',
- order: 'name',
+ order: 'status',
page: 1,
per_page: 5,
status: 'initializing',