From 8d1d2ce18ed349751c97fec99a7e2047ab655aa2 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 8 Apr 2025 14:29:58 +0000 Subject: [PATCH] chore(tests): improve enum examples --- tests/api-resources/abuse-reports.test.ts | 6 +-- tests/api-resources/accounts/accounts.test.ts | 2 +- .../api-resources/accounts/logs/audit.test.ts | 2 +- tests/api-resources/accounts/members.test.ts | 4 +- .../accounts/subscriptions.test.ts | 4 +- .../accounts/tokens/tokens.test.ts | 2 +- tests/api-resources/alerting/policies.test.ts | 6 +-- .../api-gateway/discovery/operations.test.ts | 6 +-- .../api-gateway/operations/operations.test.ts | 2 +- .../operations/schema-validation.test.ts | 4 +- .../settings/schema-validation.test.ts | 6 +-- .../custom-certificates.test.ts | 2 +- .../custom-hostnames/custom-hostnames.test.ts | 10 ++-- .../analytics/reports/bytimes.test.ts | 2 +- .../dns/analytics/reports/bytimes.test.ts | 2 +- .../dns/settings/account/account.test.ts | 2 +- tests/api-resources/dns/settings/zone.test.ts | 2 +- .../email-routing/rules/catch-alls.test.ts | 4 +- .../email-routing/rules/rules.test.ts | 8 ++-- .../firewall/access-rules.test.ts | 8 ++-- tests/api-resources/firewall/rules.test.ts | 4 +- tests/api-resources/firewall/ua-rules.test.ts | 8 ++-- .../firewall/waf/overrides.test.ts | 4 +- .../firewall/waf/packages/groups.test.ts | 2 +- .../firewall/waf/packages/packages.test.ts | 2 +- .../firewall/waf/packages/rules.test.ts | 6 +-- .../healthchecks/healthchecks.test.ts | 6 +-- .../healthchecks/previews.test.ts | 2 +- .../api-resources/images/v1/variants.test.ts | 8 ++-- .../load-balancers/load-balancers.test.ts | 48 +++++++++---------- .../load-balancers/monitors/monitors.test.ts | 6 +-- .../load-balancers/monitors/previews.test.ts | 2 +- .../load-balancers/pools/health.test.ts | 2 +- .../load-balancers/pools/pools.test.ts | 4 +- .../load-balancers/searches.test.ts | 2 +- tests/api-resources/logs/rayid.test.ts | 2 +- .../logs/received/received.test.ts | 2 +- .../magic-transit/cf-interconnects.test.ts | 2 +- .../magic-transit/gre-tunnels.test.ts | 4 +- .../magic-transit/ipsec-tunnels.test.ts | 8 ++-- tests/api-resources/memberships.test.ts | 4 +- tests/api-resources/page-rules.test.ts | 2 +- .../api-resources/page-shield/cookies.test.ts | 2 +- .../projects/deployments/deployments.test.ts | 2 +- .../api-resources/r2/buckets/buckets.test.ts | 2 +- .../r2/buckets/domains/custom.test.ts | 2 +- .../r2/temporary-credentials.test.ts | 4 +- .../timeseries-groups/summary.test.ts | 4 +- .../radar/ai/timeseries-groups.test.ts | 2 +- tests/api-resources/radar/as112/as112.test.ts | 2 +- .../radar/as112/timeseries-groups.test.ts | 12 ++--- .../radar/attacks/layer3/layer3.test.ts | 4 +- .../attacks/layer3/timeseries-groups.test.ts | 14 +++--- .../radar/attacks/layer7/layer7.test.ts | 4 +- .../attacks/layer7/timeseries-groups.test.ts | 14 +++--- .../radar/attacks/layer7/top/top.test.ts | 2 +- tests/api-resources/radar/bgp/bgp.test.ts | 2 +- .../radar/bgp/hijacks/events.test.ts | 2 +- .../radar/bgp/leaks/events.test.ts | 2 +- tests/api-resources/radar/bgp/routes.test.ts | 4 +- tests/api-resources/radar/dns/dns.test.ts | 2 +- .../radar/dns/timeseries-groups.test.ts | 20 ++++---- .../email/routing/timeseries-groups.test.ts | 12 ++--- .../email/security/timeseries-groups.test.ts | 18 +++---- tests/api-resources/radar/http/http.test.ts | 4 +- .../radar/http/timeseries-groups.test.ts | 20 ++++---- .../timeseries-groups.test.ts | 4 +- .../radar/netflows/netflows.test.ts | 4 +- tests/api-resources/radar/quality/iqi.test.ts | 2 +- .../radar/tcp-resets-timeouts.test.ts | 2 +- tests/api-resources/rate-limits.test.ts | 8 ++-- .../rulesets/phases/phases.test.ts | 8 +++- .../rulesets/phases/versions.test.ts | 8 +++- tests/api-resources/rulesets/rulesets.test.ts | 10 ++-- .../spectrum/analytics/events/bytimes.test.ts | 4 +- tests/api-resources/spectrum/apps.test.ts | 10 ++-- tests/api-resources/speed/pages/pages.test.ts | 4 +- tests/api-resources/speed/pages/tests.test.ts | 6 +-- tests/api-resources/speed/schedule.test.ts | 6 +-- .../certificate-packs.test.ts | 4 +- tests/api-resources/ssl/verification.test.ts | 4 +- tests/api-resources/stream/stream.test.ts | 2 +- tests/api-resources/stream/token.test.ts | 6 +-- tests/api-resources/turnstile/widgets.test.ts | 12 ++--- .../user/billing/history.test.ts | 2 +- .../api-resources/user/organizations.test.ts | 4 +- .../api-resources/user/tokens/tokens.test.ts | 2 +- .../waiting-rooms/waiting-rooms.test.ts | 12 ++--- .../web3/hostnames/hostnames.test.ts | 4 +- .../namespaces/scripts/scripts.test.ts | 4 +- .../namespaces/scripts/settings.test.ts | 2 +- .../script-and-version-settings.test.ts | 2 +- .../workers/scripts/scripts.test.ts | 4 +- .../workers/scripts/versions.test.ts | 2 +- .../devices/posture/posture.test.ts | 4 +- .../zero-trust/gateway/rules.test.ts | 16 +++---- .../tunnels/cloudflared/cloudflared.test.ts | 4 +- .../zero-trust/tunnels/tunnels.test.ts | 2 +- .../warp-connector/warp-connector.test.ts | 2 +- tests/api-resources/zones/zones.test.ts | 4 +- 100 files changed, 276 insertions(+), 268 deletions(-) diff --git a/tests/api-resources/abuse-reports.test.ts b/tests/api-resources/abuse-reports.test.ts index e33365cb8d..f26e4c84f0 100644 --- a/tests/api-resources/abuse-reports.test.ts +++ b/tests/api-resources/abuse-reports.test.ts @@ -12,7 +12,7 @@ const client = new Cloudflare({ describe('resource abuseReports', () => { // TODO: investigate unauthorized HTTP response test.skip('create: only required params', async () => { - const responsePromise = client.abuseReports.create('abuse_dmca', { + const responsePromise = client.abuseReports.create('abuse_general', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', address1: 'x', agent_name: 'x', @@ -36,7 +36,7 @@ describe('resource abuseReports', () => { // TODO: investigate unauthorized HTTP response test.skip('create: required and optional params', async () => { - const response = await client.abuseReports.create('abuse_dmca', { + const response = await client.abuseReports.create('abuse_general', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', address1: 'x', agent_name: 'x', @@ -48,7 +48,7 @@ describe('resource abuseReports', () => { owner_notification: 'send', signature: 'signature', state: 'x', - act: 'abuse_dmca', + act: 'abuse_general', comments: 'x', company: 'x', destination_ips: 'destination_ips', diff --git a/tests/api-resources/accounts/accounts.test.ts b/tests/api-resources/accounts/accounts.test.ts index b122463a1d..d6aa0a71d1 100644 --- a/tests/api-resources/accounts/accounts.test.ts +++ b/tests/api-resources/accounts/accounts.test.ts @@ -78,7 +78,7 @@ describe('resource accounts', () => { // ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error await expect( client.accounts.list( - { direction: 'asc', name: 'example.com', page: 1, per_page: 5 }, + { direction: 'desc', name: 'example.com', page: 1, per_page: 5 }, { path: '/_stainless_unknown_path' }, ), ).rejects.toThrow(Cloudflare.NotFoundError); diff --git a/tests/api-resources/accounts/logs/audit.test.ts b/tests/api-resources/accounts/logs/audit.test.ts index 8d954a7eba..f87b0f2baf 100644 --- a/tests/api-resources/accounts/logs/audit.test.ts +++ b/tests/api-resources/accounts/logs/audit.test.ts @@ -41,7 +41,7 @@ describe('resource audit', () => { actor_ip_address: '17.168.228.63', actor_token_id: '144cdb2e39c55e203cf225d8d8208647', actor_token_name: 'Test Token', - actor_type: 'cloudflare_admin', + actor_type: 'account', audit_log_id: 'f174be97-19b1-40d6-954d-70cd5fbd52db', cursor: 'Q1buH-__DQqqig7SVYXT-SsMOTGY2Z3Y80W-fGgva7yaDdmPKveucH5ddOcHsJRhNb-xUK8agZQqkJSMAENGO8NU6g==', direction: 'desc', diff --git a/tests/api-resources/accounts/members.test.ts b/tests/api-resources/accounts/members.test.ts index 9e99f87916..b0b1f88f9c 100644 --- a/tests/api-resources/accounts/members.test.ts +++ b/tests/api-resources/accounts/members.test.ts @@ -72,8 +72,8 @@ describe('resource members', () => { test('list: required and optional params', async () => { const response = await client.accounts.members.list({ account_id: 'eb78d65290b24279ba6f44721b3ea3c4', - direction: 'asc', - order: 'user.first_name', + direction: 'desc', + order: 'status', page: 1, per_page: 5, status: 'accepted', diff --git a/tests/api-resources/accounts/subscriptions.test.ts b/tests/api-resources/accounts/subscriptions.test.ts index 31b523f38a..cb3621c09c 100644 --- a/tests/api-resources/accounts/subscriptions.test.ts +++ b/tests/api-resources/accounts/subscriptions.test.ts @@ -26,7 +26,7 @@ describe('resource subscriptions', () => { test('create: required and optional params', async () => { const response = await client.accounts.subscriptions.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', - frequency: 'weekly', + frequency: 'monthly', rate_plan: { id: 'free', currency: 'USD', @@ -55,7 +55,7 @@ describe('resource subscriptions', () => { test('update: required and optional params', async () => { const response = await client.accounts.subscriptions.update('506e3185e9c882d175a2d0cb0093d9f2', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', - frequency: 'weekly', + frequency: 'monthly', rate_plan: { id: 'free', currency: 'USD', diff --git a/tests/api-resources/accounts/tokens/tokens.test.ts b/tests/api-resources/accounts/tokens/tokens.test.ts index 4c7b188110..ccde6464d6 100644 --- a/tests/api-resources/accounts/tokens/tokens.test.ts +++ b/tests/api-resources/accounts/tokens/tokens.test.ts @@ -142,7 +142,7 @@ describe('resource tokens', () => { test.skip('list: required and optional params', async () => { const response = await client.accounts.tokens.list({ account_id: 'eb78d65290b24279ba6f44721b3ea3c4', - direction: 'asc', + direction: 'desc', page: 1, per_page: 5, }); diff --git a/tests/api-resources/alerting/policies.test.ts b/tests/api-resources/alerting/policies.test.ts index 51dda9d6f4..aed5640624 100644 --- a/tests/api-resources/alerting/policies.test.ts +++ b/tests/api-resources/alerting/policies.test.ts @@ -14,7 +14,7 @@ describe('resource policies', () => { test.skip('create: only required params', async () => { const responsePromise = client.alerting.policies.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', - alert_type: 'access_custom_certificate_expiration_type', + alert_type: 'universal_ssl_event_type', enabled: true, mechanisms: {}, name: 'SSL Notification Event Policy', @@ -32,7 +32,7 @@ describe('resource policies', () => { test.skip('create: required and optional params', async () => { const response = await client.alerting.policies.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', - alert_type: 'access_custom_certificate_expiration_type', + alert_type: 'universal_ssl_event_type', enabled: true, mechanisms: { email: [{ id: 'test@example.com' }], @@ -108,7 +108,7 @@ describe('resource policies', () => { const response = await client.alerting.policies.update('0da2b59e-f118-439d-8097-bdfb215203c9', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', alert_interval: '30m', - alert_type: 'access_custom_certificate_expiration_type', + alert_type: 'universal_ssl_event_type', description: 'Something describing the policy.', enabled: true, filters: { diff --git a/tests/api-resources/api-gateway/discovery/operations.test.ts b/tests/api-resources/api-gateway/discovery/operations.test.ts index 7a171a3354..efb0f604be 100644 --- a/tests/api-resources/api-gateway/discovery/operations.test.ts +++ b/tests/api-resources/api-gateway/discovery/operations.test.ts @@ -27,11 +27,11 @@ describe('resource operations', () => { const response = await client.apiGateway.discovery.operations.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', diff: true, - direction: 'asc', + direction: 'desc', endpoint: '/api/v1', host: ['api.cloudflare.com'], method: ['GET'], - order: 'host', + order: 'method', origin: 'ML', page: 1, per_page: 5, @@ -57,7 +57,7 @@ describe('resource operations', () => { const response = await client.apiGateway.discovery.operations.bulkEdit({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', body: { - '3818d821-5901-4147-a474-f5f5aec1d54e': { state: 'review' }, + '3818d821-5901-4147-a474-f5f5aec1d54e': { state: 'ignored' }, 'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { state: 'review' }, }, }); diff --git a/tests/api-resources/api-gateway/operations/operations.test.ts b/tests/api-resources/api-gateway/operations/operations.test.ts index 11ef3ed995..210df87d23 100644 --- a/tests/api-resources/api-gateway/operations/operations.test.ts +++ b/tests/api-resources/api-gateway/operations/operations.test.ts @@ -51,7 +51,7 @@ describe('resource operations', () => { test('list: required and optional params', async () => { const response = await client.apiGateway.operations.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - direction: 'asc', + direction: 'desc', endpoint: '/api/v1', feature: ['thresholds'], host: ['api.cloudflare.com'], diff --git a/tests/api-resources/api-gateway/operations/schema-validation.test.ts b/tests/api-resources/api-gateway/operations/schema-validation.test.ts index 6db1381197..62c1d4ce8b 100644 --- a/tests/api-resources/api-gateway/operations/schema-validation.test.ts +++ b/tests/api-resources/api-gateway/operations/schema-validation.test.ts @@ -27,7 +27,7 @@ describe('resource schemaValidation', () => { test('update: required and optional params', async () => { const response = await client.apiGateway.operations.schemaValidation.update( 'f174e90a-fafe-4643-bbbc-4a0ed4fc8415', - { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mitigation_action: 'log' }, + { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mitigation_action: 'block' }, ); }); @@ -53,7 +53,7 @@ describe('resource schemaValidation', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', settings_multiple_request: { '3818d821-5901-4147-a474-f5f5aec1d54e': { mitigation_action: 'log' }, - 'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { mitigation_action: 'log' }, + 'b17c8043-99a0-4202-b7d9-8f7cdbee02cd': { mitigation_action: 'block' }, }, }); }); diff --git a/tests/api-resources/api-gateway/settings/schema-validation.test.ts b/tests/api-resources/api-gateway/settings/schema-validation.test.ts index 0513dff7ea..5ab4bffc12 100644 --- a/tests/api-resources/api-gateway/settings/schema-validation.test.ts +++ b/tests/api-resources/api-gateway/settings/schema-validation.test.ts @@ -13,7 +13,7 @@ describe('resource schemaValidation', () => { test('update: only required params', async () => { const responsePromise = client.apiGateway.settings.schemaValidation.update({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - validation_default_mitigation_action: 'none', + validation_default_mitigation_action: 'block', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -27,7 +27,7 @@ describe('resource schemaValidation', () => { test('update: required and optional params', async () => { const response = await client.apiGateway.settings.schemaValidation.update({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - validation_default_mitigation_action: 'none', + validation_default_mitigation_action: 'block', validation_override_mitigation_action: 'none', }); }); @@ -48,7 +48,7 @@ describe('resource schemaValidation', () => { test('edit: required and optional params', async () => { const response = await client.apiGateway.settings.schemaValidation.edit({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - validation_default_mitigation_action: 'none', + validation_default_mitigation_action: 'block', validation_override_mitigation_action: 'none', }); }); diff --git a/tests/api-resources/custom-certificates/custom-certificates.test.ts b/tests/api-resources/custom-certificates/custom-certificates.test.ts index 1d8b1f281e..b72ebb0988 100644 --- a/tests/api-resources/custom-certificates/custom-certificates.test.ts +++ b/tests/api-resources/custom-certificates/custom-certificates.test.ts @@ -37,7 +37,7 @@ describe('resource customCertificates', () => { bundle_method: 'ubiquitous', geo_restrictions: { label: 'us' }, policy: '(country: US) or (region: EU)', - type: 'legacy_custom', + type: 'sni_custom', }); }); diff --git a/tests/api-resources/custom-hostnames/custom-hostnames.test.ts b/tests/api-resources/custom-hostnames/custom-hostnames.test.ts index cf9c4c6055..21af18bd1b 100644 --- a/tests/api-resources/custom-hostnames/custom-hostnames.test.ts +++ b/tests/api-resources/custom-hostnames/custom-hostnames.test.ts @@ -31,7 +31,7 @@ describe('resource customHostnames', () => { hostname: 'app.example.com', ssl: { bundle_method: 'ubiquitous', - certificate_authority: 'digicert', + certificate_authority: 'google', cloudflare_branding: false, custom_cert_bundle: [ { @@ -50,7 +50,7 @@ describe('resource customHostnames', () => { ciphers: ['ECDHE-RSA-AES128-GCM-SHA256', 'AES128-SHA'], early_hints: 'on', http2: 'on', - min_tls_version: '1.0', + min_tls_version: '1.2', tls_1_3: 'on', }, type: 'dv', @@ -75,7 +75,7 @@ describe('resource customHostnames', () => { const response = await client.customHostnames.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', id: '0d89c70d-ad9f-4843-b99f-6cc0252067e9', - direction: 'asc', + direction: 'desc', hostname: 'app.example.com', order: 'ssl', page: 1, @@ -124,7 +124,7 @@ describe('resource customHostnames', () => { custom_origin_sni: 'sni.example.com', ssl: { bundle_method: 'ubiquitous', - certificate_authority: 'digicert', + certificate_authority: 'google', cloudflare_branding: false, custom_cert_bundle: [ { @@ -143,7 +143,7 @@ describe('resource customHostnames', () => { ciphers: ['ECDHE-RSA-AES128-GCM-SHA256', 'AES128-SHA'], early_hints: 'on', http2: 'on', - min_tls_version: '1.0', + min_tls_version: '1.2', tls_1_3: 'on', }, type: 'dv', diff --git a/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts b/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts index 5b816cfaec..dc85bd3a8f 100644 --- a/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts +++ b/tests/api-resources/dns-firewall/analytics/reports/bytimes.test.ts @@ -35,7 +35,7 @@ describe('resource bytimes', () => { metrics: 'queryCount,uncachedCount', since: '2023-11-11T12:00:00Z', sort: '+responseCode,-queryName', - time_delta: 'all', + time_delta: 'hour', until: '2023-11-11T13:00:00Z', }, ); diff --git a/tests/api-resources/dns/analytics/reports/bytimes.test.ts b/tests/api-resources/dns/analytics/reports/bytimes.test.ts index 92b93a9e99..36c84da035 100644 --- a/tests/api-resources/dns/analytics/reports/bytimes.test.ts +++ b/tests/api-resources/dns/analytics/reports/bytimes.test.ts @@ -32,7 +32,7 @@ describe('resource bytimes', () => { metrics: 'queryCount,uncachedCount', since: '2023-11-11T12:00:00Z', sort: '+responseCode,-queryName', - time_delta: 'all', + time_delta: 'hour', until: '2023-11-11T13:00:00Z', }); }); diff --git a/tests/api-resources/dns/settings/account/account.test.ts b/tests/api-resources/dns/settings/account/account.test.ts index 28e0754b6c..d01f868674 100644 --- a/tests/api-resources/dns/settings/account/account.test.ts +++ b/tests/api-resources/dns/settings/account/account.test.ts @@ -45,7 +45,7 @@ describe('resource account', () => { rname: 'admin.example.com', ttl: 3600, }, - zone_mode: 'standard', + zone_mode: 'dns_only', }, }); }); diff --git a/tests/api-resources/dns/settings/zone.test.ts b/tests/api-resources/dns/settings/zone.test.ts index 11ce940111..f0cf9e79c9 100644 --- a/tests/api-resources/dns/settings/zone.test.ts +++ b/tests/api-resources/dns/settings/zone.test.ts @@ -42,7 +42,7 @@ describe('resource zone', () => { rname: 'admin.example.com', ttl: 3600, }, - zone_mode: 'standard', + zone_mode: 'dns_only', }); }); diff --git a/tests/api-resources/email-routing/rules/catch-alls.test.ts b/tests/api-resources/email-routing/rules/catch-alls.test.ts index aaf4cce456..6789a6defe 100644 --- a/tests/api-resources/email-routing/rules/catch-alls.test.ts +++ b/tests/api-resources/email-routing/rules/catch-alls.test.ts @@ -13,7 +13,7 @@ describe('resource catchAlls', () => { test('update: only required params', async () => { const responsePromise = client.emailRouting.rules.catchAlls.update({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop' }], + actions: [{ type: 'forward' }], matchers: [{ type: 'all' }], }); const rawResponse = await responsePromise.asResponse(); @@ -28,7 +28,7 @@ describe('resource catchAlls', () => { test('update: required and optional params', async () => { const response = await client.emailRouting.rules.catchAlls.update({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }], + actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }], matchers: [{ type: 'all' }], enabled: true, name: 'Send to user@example.net rule.', diff --git a/tests/api-resources/email-routing/rules/rules.test.ts b/tests/api-resources/email-routing/rules/rules.test.ts index 0898d97374..753c6ee628 100644 --- a/tests/api-resources/email-routing/rules/rules.test.ts +++ b/tests/api-resources/email-routing/rules/rules.test.ts @@ -13,7 +13,7 @@ describe('resource rules', () => { test('create: only required params', async () => { const responsePromise = client.emailRouting.rules.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }], + actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }], matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }], }); const rawResponse = await responsePromise.asResponse(); @@ -28,7 +28,7 @@ describe('resource rules', () => { test('create: required and optional params', async () => { const response = await client.emailRouting.rules.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }], + actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }], matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }], enabled: true, name: 'Send to user@example.net rule.', @@ -39,7 +39,7 @@ describe('resource rules', () => { test('update: only required params', async () => { const responsePromise = client.emailRouting.rules.update('a7e6fb77503c41d8a7f3113c6918f10c', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }], + actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }], matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }], }); const rawResponse = await responsePromise.asResponse(); @@ -54,7 +54,7 @@ describe('resource rules', () => { test('update: required and optional params', async () => { const response = await client.emailRouting.rules.update('a7e6fb77503c41d8a7f3113c6918f10c', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - actions: [{ type: 'drop', value: ['destinationaddress@example.net'] }], + actions: [{ type: 'forward', value: ['destinationaddress@example.net'] }], matchers: [{ field: 'to', type: 'literal', value: 'test@example.com' }], enabled: true, name: 'Send to user@example.net rule.', diff --git a/tests/api-resources/firewall/access-rules.test.ts b/tests/api-resources/firewall/access-rules.test.ts index d74b626157..3dbca41d7a 100644 --- a/tests/api-resources/firewall/access-rules.test.ts +++ b/tests/api-resources/firewall/access-rules.test.ts @@ -14,7 +14,7 @@ describe('resource accessRules', () => { test.skip('create: only required params', async () => { const responsePromise = client.firewall.accessRules.create({ configuration: {}, - mode: 'block', + mode: 'challenge', account_id: 'account_id', }); const rawResponse = await responsePromise.asResponse(); @@ -30,7 +30,7 @@ describe('resource accessRules', () => { test.skip('create: required and optional params', async () => { const response = await client.firewall.accessRules.create({ configuration: { target: 'ip', value: '198.51.100.4' }, - mode: 'block', + mode: 'challenge', account_id: 'account_id', notes: 'This rule is enabled because of an event that occurred on date X.', }); @@ -66,7 +66,7 @@ describe('resource accessRules', () => { test.skip('edit: only required params', async () => { const responsePromise = client.firewall.accessRules.edit('023e105f4ecef8ad9ca31a8372d0c353', { configuration: {}, - mode: 'block', + mode: 'challenge', account_id: 'account_id', }); const rawResponse = await responsePromise.asResponse(); @@ -82,7 +82,7 @@ describe('resource accessRules', () => { test.skip('edit: required and optional params', async () => { const response = await client.firewall.accessRules.edit('023e105f4ecef8ad9ca31a8372d0c353', { configuration: { target: 'ip', value: '198.51.100.4' }, - mode: 'block', + mode: 'challenge', account_id: 'account_id', notes: 'This rule is enabled because of an event that occurred on date X.', }); diff --git a/tests/api-resources/firewall/rules.test.ts b/tests/api-resources/firewall/rules.test.ts index e1d526de46..e73f30c3b0 100644 --- a/tests/api-resources/firewall/rules.test.ts +++ b/tests/api-resources/firewall/rules.test.ts @@ -31,7 +31,7 @@ describe('resource rules', () => { const response = await client.firewall.rules.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', action: { - mode: 'simulate', + mode: 'challenge', response: { body: 'This request has been rate-limited.', content_type: 'text/xml' }, timeout: 86400, }, @@ -66,7 +66,7 @@ describe('resource rules', () => { const response = await client.firewall.rules.update('372e67954025e0ba6aaa6d586b9e0b60', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', action: { - mode: 'simulate', + mode: 'challenge', response: { body: 'This request has been rate-limited.', content_type: 'text/xml' }, timeout: 86400, }, diff --git a/tests/api-resources/firewall/ua-rules.test.ts b/tests/api-resources/firewall/ua-rules.test.ts index 19ac730ea9..5e38482e48 100644 --- a/tests/api-resources/firewall/ua-rules.test.ts +++ b/tests/api-resources/firewall/ua-rules.test.ts @@ -15,7 +15,7 @@ describe('resource uaRules', () => { const responsePromise = client.firewall.uaRules.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', configuration: {}, - mode: 'block', + mode: 'challenge', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -31,7 +31,7 @@ describe('resource uaRules', () => { const response = await client.firewall.uaRules.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', configuration: { target: 'ip', value: '198.51.100.4' }, - mode: 'block', + mode: 'challenge', }); }); @@ -40,7 +40,7 @@ describe('resource uaRules', () => { const responsePromise = client.firewall.uaRules.update('372e67954025e0ba6aaa6d586b9e0b59', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', configuration: {}, - mode: 'block', + mode: 'challenge', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -56,7 +56,7 @@ describe('resource uaRules', () => { const response = await client.firewall.uaRules.update('372e67954025e0ba6aaa6d586b9e0b59', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', configuration: { target: 'ip', value: '198.51.100.4' }, - mode: 'block', + mode: 'challenge', }); }); diff --git a/tests/api-resources/firewall/waf/overrides.test.ts b/tests/api-resources/firewall/waf/overrides.test.ts index fa20db5135..d1c84296ff 100644 --- a/tests/api-resources/firewall/waf/overrides.test.ts +++ b/tests/api-resources/firewall/waf/overrides.test.ts @@ -39,7 +39,7 @@ describe('resource overrides', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', id: '023e105f4ecef8ad9ca31a8372d0c353', rewrite_action: {}, - rules: { '100015': 'challenge' }, + rules: { '100015': 'disable' }, urls: ['shop.example.com/*'], }); const rawResponse = await responsePromise.asResponse(); @@ -63,7 +63,7 @@ describe('resource overrides', () => { disable: 'challenge', simulate: 'challenge', }, - rules: { '100015': 'challenge' }, + rules: { '100015': 'disable' }, urls: ['shop.example.com/*'], }); }); diff --git a/tests/api-resources/firewall/waf/packages/groups.test.ts b/tests/api-resources/firewall/waf/packages/groups.test.ts index c117c3fcfa..e4c0f06295 100644 --- a/tests/api-resources/firewall/waf/packages/groups.test.ts +++ b/tests/api-resources/firewall/waf/packages/groups.test.ts @@ -26,7 +26,7 @@ describe('resource groups', () => { test('list: required and optional params', async () => { const response = await client.firewall.waf.packages.groups.list('a25a9a7e9c00afc1fb2e0245519d725b', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - direction: 'asc', + direction: 'desc', match: 'any', mode: 'on', name: 'Project Honey Pot', diff --git a/tests/api-resources/firewall/waf/packages/packages.test.ts b/tests/api-resources/firewall/waf/packages/packages.test.ts index 635987a357..6e3dea1309 100644 --- a/tests/api-resources/firewall/waf/packages/packages.test.ts +++ b/tests/api-resources/firewall/waf/packages/packages.test.ts @@ -28,7 +28,7 @@ describe('resource packages', () => { test.skip('list: required and optional params', async () => { const response = await client.firewall.waf.packages.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - direction: 'asc', + direction: 'desc', match: 'any', name: 'USER', order: 'name', diff --git a/tests/api-resources/firewall/waf/packages/rules.test.ts b/tests/api-resources/firewall/waf/packages/rules.test.ts index 5f4159efc4..44fa0938aa 100644 --- a/tests/api-resources/firewall/waf/packages/rules.test.ts +++ b/tests/api-resources/firewall/waf/packages/rules.test.ts @@ -27,10 +27,10 @@ describe('resource rules', () => { const response = await client.firewall.waf.packages.rules.list('a25a9a7e9c00afc1fb2e0245519d725b', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', description: 'SQL injection prevention for SELECT statements', - direction: 'asc', + direction: 'desc', group_id: 'de677e5818985db1285d0e80225f06e5', match: 'any', - mode: 'DIS', + mode: 'CHL', order: 'priority', page: 1, per_page: 5, @@ -57,7 +57,7 @@ describe('resource rules', () => { const response = await client.firewall.waf.packages.rules.edit( 'a25a9a7e9c00afc1fb2e0245519d725b', 'a25a9a7e9c00afc1fb2e0245519d725b', - { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mode: 'default' }, + { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', mode: 'on' }, ); }); diff --git a/tests/api-resources/healthchecks/healthchecks.test.ts b/tests/api-resources/healthchecks/healthchecks.test.ts index 2ffb4a76ab..b319c922ff 100644 --- a/tests/api-resources/healthchecks/healthchecks.test.ts +++ b/tests/api-resources/healthchecks/healthchecks.test.ts @@ -30,7 +30,7 @@ describe('resource healthchecks', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', address: 'www.example.com', name: 'server-1', - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], consecutive_fails: 0, consecutive_successes: 0, description: 'Health check for www.example.com', @@ -73,7 +73,7 @@ describe('resource healthchecks', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', address: 'www.example.com', name: 'server-1', - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], consecutive_fails: 0, consecutive_successes: 0, description: 'Health check for www.example.com', @@ -154,7 +154,7 @@ describe('resource healthchecks', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', address: 'www.example.com', name: 'server-1', - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], consecutive_fails: 0, consecutive_successes: 0, description: 'Health check for www.example.com', diff --git a/tests/api-resources/healthchecks/previews.test.ts b/tests/api-resources/healthchecks/previews.test.ts index b116ab5a0d..bfe172a323 100644 --- a/tests/api-resources/healthchecks/previews.test.ts +++ b/tests/api-resources/healthchecks/previews.test.ts @@ -30,7 +30,7 @@ describe('resource previews', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', address: 'www.example.com', name: 'server-1', - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], consecutive_fails: 0, consecutive_successes: 0, description: 'Health check for www.example.com', diff --git a/tests/api-resources/images/v1/variants.test.ts b/tests/api-resources/images/v1/variants.test.ts index ecef242a19..50a1c3bc03 100644 --- a/tests/api-resources/images/v1/variants.test.ts +++ b/tests/api-resources/images/v1/variants.test.ts @@ -14,7 +14,7 @@ describe('resource variants', () => { const responsePromise = client.images.v1.variants.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', id: 'hero', - options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 }, + options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 }, }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -29,7 +29,7 @@ describe('resource variants', () => { const response = await client.images.v1.variants.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', id: 'hero', - options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 }, + options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 }, neverRequireSignedURLs: true, }); }); @@ -73,7 +73,7 @@ describe('resource variants', () => { test('edit: only required params', async () => { const responsePromise = client.images.v1.variants.edit('hero', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', - options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 }, + options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 }, }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -87,7 +87,7 @@ describe('resource variants', () => { test('edit: required and optional params', async () => { const response = await client.images.v1.variants.edit('hero', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', - options: { fit: 'scale-down', height: 768, metadata: 'keep', width: 1366 }, + options: { fit: 'scale-down', height: 768, metadata: 'none', width: 1366 }, neverRequireSignedURLs: true, }); }); diff --git a/tests/api-resources/load-balancers/load-balancers.test.ts b/tests/api-resources/load-balancers/load-balancers.test.ts index 94531ff815..ae55f005f1 100644 --- a/tests/api-resources/load-balancers/load-balancers.test.ts +++ b/tests/api-resources/load-balancers/load-balancers.test.ts @@ -46,7 +46,7 @@ describe('resource loadBalancers', () => { US: ['de90f38ced07c2e2f4df50b1f61d4194', '00920f38ce07c2e2f4df50b1f61d4194'], }, description: 'Load Balancer for www.example.com', - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, networks: ['string'], pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], @@ -85,7 +85,7 @@ describe('resource loadBalancers', () => { '00920f38ce07c2e2f4df50b1f61d4194', ], fallback_pool: 'fallback_pool', - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'], @@ -102,34 +102,34 @@ describe('resource loadBalancers', () => { ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'], WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], }, - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }, priority: 0, terminates: true, }, ], - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }); }); @@ -171,7 +171,7 @@ describe('resource loadBalancers', () => { }, description: 'Load Balancer for www.example.com', enabled: true, - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, networks: ['string'], pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], @@ -210,7 +210,7 @@ describe('resource loadBalancers', () => { '00920f38ce07c2e2f4df50b1f61d4194', ], fallback_pool: 'fallback_pool', - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'], @@ -227,34 +227,34 @@ describe('resource loadBalancers', () => { ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'], WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], }, - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }, priority: 0, terminates: true, }, ], - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }); }); @@ -322,7 +322,7 @@ describe('resource loadBalancers', () => { description: 'Load Balancer for www.example.com', enabled: true, fallback_pool: 'fallback_pool', - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, name: 'www.example.com', pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], @@ -361,7 +361,7 @@ describe('resource loadBalancers', () => { '00920f38ce07c2e2f4df50b1f61d4194', ], fallback_pool: 'fallback_pool', - location_strategy: { mode: 'pop', prefer_ecs: 'always' }, + location_strategy: { mode: 'resolver_ip', prefer_ecs: 'always' }, pop_pools: { LAX: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], LHR: ['abd90f38ced07c2e2f4df50b1f61d4194', 'f9138c5d07c2e2f4df57b1f61d4196'], @@ -378,34 +378,34 @@ describe('resource loadBalancers', () => { ENAM: ['00920f38ce07c2e2f4df50b1f61d4194'], WNAM: ['de90f38ced07c2e2f4df50b1f61d4194', '9290f38c5d07c2e2f4df57b1f61d4196'], }, - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }, priority: 0, terminates: true, }, ], - session_affinity: 'none', + session_affinity: 'cookie', session_affinity_attributes: { drain_duration: 100, headers: ['x'], require_all_headers: true, samesite: 'Auto', secure: 'Auto', - zero_downtime_failover: 'none', + zero_downtime_failover: 'sticky', }, session_affinity_ttl: 1800, - steering_policy: 'off', + steering_policy: 'dynamic_latency', ttl: 30, }); }); diff --git a/tests/api-resources/load-balancers/monitors/monitors.test.ts b/tests/api-resources/load-balancers/monitors/monitors.test.ts index 71e0a1a442..5009015f38 100644 --- a/tests/api-resources/load-balancers/monitors/monitors.test.ts +++ b/tests/api-resources/load-balancers/monitors/monitors.test.ts @@ -41,7 +41,7 @@ describe('resource monitors', () => { probe_zone: 'example.com', retries: 0, timeout: 0, - type: 'http', + type: 'https', }); }); @@ -76,7 +76,7 @@ describe('resource monitors', () => { probe_zone: 'example.com', retries: 0, timeout: 0, - type: 'http', + type: 'https', }); }); @@ -149,7 +149,7 @@ describe('resource monitors', () => { probe_zone: 'example.com', retries: 0, timeout: 0, - type: 'http', + type: 'https', }); }); diff --git a/tests/api-resources/load-balancers/monitors/previews.test.ts b/tests/api-resources/load-balancers/monitors/previews.test.ts index e9c7c1cb79..ba9a582c1f 100644 --- a/tests/api-resources/load-balancers/monitors/previews.test.ts +++ b/tests/api-resources/load-balancers/monitors/previews.test.ts @@ -42,7 +42,7 @@ describe('resource previews', () => { probe_zone: 'example.com', retries: 0, timeout: 0, - type: 'http', + type: 'https', }); }); }); diff --git a/tests/api-resources/load-balancers/pools/health.test.ts b/tests/api-resources/load-balancers/pools/health.test.ts index 71151c6e9e..b1b80dd52e 100644 --- a/tests/api-resources/load-balancers/pools/health.test.ts +++ b/tests/api-resources/load-balancers/pools/health.test.ts @@ -41,7 +41,7 @@ describe('resource health', () => { probe_zone: 'example.com', retries: 0, timeout: 0, - type: 'http', + type: 'https', }); }); diff --git a/tests/api-resources/load-balancers/pools/pools.test.ts b/tests/api-resources/load-balancers/pools/pools.test.ts index 5cc16677d4..924a4f42af 100644 --- a/tests/api-resources/load-balancers/pools/pools.test.ts +++ b/tests/api-resources/load-balancers/pools/pools.test.ts @@ -89,7 +89,7 @@ describe('resource pools', () => { weight: 0.6, }, ], - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], description: 'Primary data center - Provider XYZ', enabled: false, latitude: 0, @@ -186,7 +186,7 @@ describe('resource pools', () => { test('edit: required and optional params', async () => { const response = await client.loadBalancers.pools.edit('17b5962d775c646f3f9725cbc7a53df4', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', - check_regions: ['WNAM', 'ENAM'], + check_regions: ['WEU', 'ENAM'], description: 'Primary data center - Provider XYZ', enabled: false, latitude: 0, diff --git a/tests/api-resources/load-balancers/searches.test.ts b/tests/api-resources/load-balancers/searches.test.ts index add2728d53..02837b7b84 100644 --- a/tests/api-resources/load-balancers/searches.test.ts +++ b/tests/api-resources/load-balancers/searches.test.ts @@ -30,7 +30,7 @@ describe('resource searches', () => { account_id: '023e105f4ecef8ad9ca31a8372d0c353', page: 1, per_page: 1, - search_params: { query: 'primary', references: '' }, + search_params: { query: 'primary', references: '*' }, }); }); }); diff --git a/tests/api-resources/logs/rayid.test.ts b/tests/api-resources/logs/rayid.test.ts index 92816a04c8..4e5aeb35e0 100644 --- a/tests/api-resources/logs/rayid.test.ts +++ b/tests/api-resources/logs/rayid.test.ts @@ -27,7 +27,7 @@ describe('resource RayID', () => { const response = await client.logs.RayID.get('41ddf1740f67442d', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', fields: 'ClientIP,RayID,EdgeStartTimestamp', - timestamps: 'unix', + timestamps: 'unixnano', }); }); }); diff --git a/tests/api-resources/logs/received/received.test.ts b/tests/api-resources/logs/received/received.test.ts index 16d1848200..9cbc7e0830 100644 --- a/tests/api-resources/logs/received/received.test.ts +++ b/tests/api-resources/logs/received/received.test.ts @@ -32,7 +32,7 @@ describe('resource received', () => { fields: 'ClientIP,RayID,EdgeStartTimestamp', sample: 0.1, start: '2018-05-20T10:00:00Z', - timestamps: 'unix', + timestamps: 'unixnano', }); }); }); diff --git a/tests/api-resources/magic-transit/cf-interconnects.test.ts b/tests/api-resources/magic-transit/cf-interconnects.test.ts index 8f1a7b68f2..7bd0b7f7be 100644 --- a/tests/api-resources/magic-transit/cf-interconnects.test.ts +++ b/tests/api-resources/magic-transit/cf-interconnects.test.ts @@ -30,7 +30,7 @@ describe('resource cfInterconnects', () => { account_id: '023e105f4ecef8ad9ca31a8372d0c353', description: 'Tunnel for Interconnect to ORD', gre: { cloudflare_endpoint: '203.0.113.1' }, - health_check: { enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, type: 'reply' }, + health_check: { enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, type: 'request' }, interface_address: '192.0.2.0/31', mtu: 0, 'x-magic-new-hc-target': true, diff --git a/tests/api-resources/magic-transit/gre-tunnels.test.ts b/tests/api-resources/magic-transit/gre-tunnels.test.ts index fa4e8b7706..b8a102b70a 100644 --- a/tests/api-resources/magic-transit/gre-tunnels.test.ts +++ b/tests/api-resources/magic-transit/gre-tunnels.test.ts @@ -62,11 +62,11 @@ describe('resource greTunnels', () => { name: 'GRE_1', description: 'Tunnel for ISP X', health_check: { - direction: 'unidirectional', + direction: 'bidirectional', enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, - type: 'reply', + type: 'request', }, mtu: 0, ttl: 0, diff --git a/tests/api-resources/magic-transit/ipsec-tunnels.test.ts b/tests/api-resources/magic-transit/ipsec-tunnels.test.ts index 80344216c9..ec8bd888c7 100644 --- a/tests/api-resources/magic-transit/ipsec-tunnels.test.ts +++ b/tests/api-resources/magic-transit/ipsec-tunnels.test.ts @@ -35,11 +35,11 @@ describe('resource ipsecTunnels', () => { customer_endpoint: '203.0.113.1', description: 'Tunnel for ISP X', health_check: { - direction: 'unidirectional', + direction: 'bidirectional', enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, - type: 'reply', + type: 'request', }, psk: 'O3bwKSjnaoCxDoUxjcq4Rk8ZKkezQUiy', replay_protection: false, @@ -74,11 +74,11 @@ describe('resource ipsecTunnels', () => { customer_endpoint: '203.0.113.1', description: 'Tunnel for ISP X', health_check: { - direction: 'unidirectional', + direction: 'bidirectional', enabled: true, rate: 'low', target: { saved: '203.0.113.1' }, - type: 'reply', + type: 'request', }, psk: 'O3bwKSjnaoCxDoUxjcq4Rk8ZKkezQUiy', replay_protection: false, diff --git a/tests/api-resources/memberships.test.ts b/tests/api-resources/memberships.test.ts index dcb8f60117..1473965911 100644 --- a/tests/api-resources/memberships.test.ts +++ b/tests/api-resources/memberships.test.ts @@ -53,9 +53,9 @@ describe('resource memberships', () => { client.memberships.list( { account: { name: 'Demo Account' }, - direction: 'asc', + direction: 'desc', name: 'Demo Account', - order: 'id', + order: 'status', page: 1, per_page: 5, status: 'accepted', diff --git a/tests/api-resources/page-rules.test.ts b/tests/api-resources/page-rules.test.ts index f37479340f..6210d21044 100644 --- a/tests/api-resources/page-rules.test.ts +++ b/tests/api-resources/page-rules.test.ts @@ -78,7 +78,7 @@ describe('resource pageRules', () => { test('list: required and optional params', async () => { const response = await client.pageRules.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - direction: 'asc', + direction: 'desc', match: 'any', order: 'status', status: 'active', diff --git a/tests/api-resources/page-shield/cookies.test.ts b/tests/api-resources/page-shield/cookies.test.ts index a9b2f5f87f..4294533afb 100644 --- a/tests/api-resources/page-shield/cookies.test.ts +++ b/tests/api-resources/page-shield/cookies.test.ts @@ -35,7 +35,7 @@ describe('resource cookies', () => { page_url: 'example.com/page,*/checkout,example.com/*,*checkout*', path: '/', per_page: 100, - same_site: 'lax', + same_site: 'strict', secure: true, type: 'first_party', }); diff --git a/tests/api-resources/pages/projects/deployments/deployments.test.ts b/tests/api-resources/pages/projects/deployments/deployments.test.ts index 9d01b60b82..41d5114e2a 100644 --- a/tests/api-resources/pages/projects/deployments/deployments.test.ts +++ b/tests/api-resources/pages/projects/deployments/deployments.test.ts @@ -48,7 +48,7 @@ describe('resource deployments', () => { test('list: required and optional params', async () => { const response = await client.pages.projects.deployments.list('this-is-my-project-01', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', - env: 'production', + env: 'preview', }); }); diff --git a/tests/api-resources/r2/buckets/buckets.test.ts b/tests/api-resources/r2/buckets/buckets.test.ts index b0baf78fc7..93377fc815 100644 --- a/tests/api-resources/r2/buckets/buckets.test.ts +++ b/tests/api-resources/r2/buckets/buckets.test.ts @@ -53,7 +53,7 @@ describe('resource buckets', () => { const response = await client.r2.buckets.list({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', cursor: 'cursor', - direction: 'asc', + direction: 'desc', name_contains: 'my-bucket', order: 'name', per_page: 1, diff --git a/tests/api-resources/r2/buckets/domains/custom.test.ts b/tests/api-resources/r2/buckets/domains/custom.test.ts index 3483661ac4..414dbbd1dc 100644 --- a/tests/api-resources/r2/buckets/domains/custom.test.ts +++ b/tests/api-resources/r2/buckets/domains/custom.test.ts @@ -63,7 +63,7 @@ describe('resource custom', () => { { account_id: '023e105f4ecef8ad9ca31a8372d0c353', enabled: true, - minTLS: '1.0', + minTLS: '1.2', jurisdiction: 'default', }, ); diff --git a/tests/api-resources/r2/temporary-credentials.test.ts b/tests/api-resources/r2/temporary-credentials.test.ts index ead58de69f..12f9ce71e6 100644 --- a/tests/api-resources/r2/temporary-credentials.test.ts +++ b/tests/api-resources/r2/temporary-credentials.test.ts @@ -16,7 +16,7 @@ describe('resource temporaryCredentials', () => { account_id: '023e105f4ecef8ad9ca31a8372d0c353', bucket: 'example-bucket', parentAccessKeyId: 'example-access-key-id', - permission: 'admin-read-write', + permission: 'object-read-write', ttlSeconds: 3600, }); const rawResponse = await responsePromise.asResponse(); @@ -34,7 +34,7 @@ describe('resource temporaryCredentials', () => { account_id: '023e105f4ecef8ad9ca31a8372d0c353', bucket: 'example-bucket', parentAccessKeyId: 'example-access-key-id', - permission: 'admin-read-write', + permission: 'object-read-write', ttlSeconds: 3600, objects: ['example-object'], prefixes: ['example-prefix/'], diff --git a/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts b/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts index 70d426687f..6d0bce064f 100644 --- a/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts +++ b/tests/api-resources/radar/ai/inference/timeseries-groups/summary.test.ts @@ -33,7 +33,7 @@ describe('resource summary', () => { await expect( client.radar.ai.inference.timeseriesGroups.summary.model( { - aggInterval: '15m', + aggInterval: '1h', dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], dateStart: ['2019-12-27T18:11:19.117Z'], @@ -69,7 +69,7 @@ describe('resource summary', () => { await expect( client.radar.ai.inference.timeseriesGroups.summary.task( { - aggInterval: '15m', + aggInterval: '1h', dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], dateStart: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/ai/timeseries-groups.test.ts b/tests/api-resources/radar/ai/timeseries-groups.test.ts index 75aa7020ee..386515626c 100644 --- a/tests/api-resources/radar/ai/timeseries-groups.test.ts +++ b/tests/api-resources/radar/ai/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.ai.timeseriesGroups.userAgent( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/as112/as112.test.ts b/tests/api-resources/radar/as112/as112.test.ts index 7ced3bae33..6a188a3f5a 100644 --- a/tests/api-resources/radar/as112/as112.test.ts +++ b/tests/api-resources/radar/as112/as112.test.ts @@ -33,7 +33,7 @@ describe('resource as112', () => { await expect( client.radar.as112.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/as112/timeseries-groups.test.ts b/tests/api-resources/radar/as112/timeseries-groups.test.ts index 5aae2eeb6a..0b54804536 100644 --- a/tests/api-resources/radar/as112/timeseries-groups.test.ts +++ b/tests/api-resources/radar/as112/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.dnssec( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -74,7 +74,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.edns( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -115,7 +115,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -156,7 +156,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.protocol( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -196,7 +196,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.queryType( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -237,7 +237,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.as112.timeseriesGroups.responseCodes( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/attacks/layer3/layer3.test.ts b/tests/api-resources/radar/attacks/layer3/layer3.test.ts index 9a0e849a45..b3d845624c 100644 --- a/tests/api-resources/radar/attacks/layer3/layer3.test.ts +++ b/tests/api-resources/radar/attacks/layer3/layer3.test.ts @@ -33,7 +33,7 @@ describe('resource layer3', () => { await expect( client.radar.attacks.layer3.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -45,7 +45,7 @@ describe('resource layer3', () => { location: ['string'], metric: 'BYTES', name: ['main_series'], - normalization: 'PERCENTAGE_CHANGE', + normalization: 'MIN0_MAX', protocol: ['UDP'], }, { path: '/_stainless_unknown_path' }, diff --git a/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts b/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts index cf56f39de5..a5d754867e 100644 --- a/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts +++ b/tests/api-resources/radar/attacks/layer3/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.bitrate( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -74,7 +74,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.duration( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -115,7 +115,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.industry( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -157,7 +157,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -197,7 +197,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.protocol( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -237,7 +237,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.vector( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -279,7 +279,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer3.timeseriesGroups.vertical( { - aggInterval: '15m', + aggInterval: '1h', continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], diff --git a/tests/api-resources/radar/attacks/layer7/layer7.test.ts b/tests/api-resources/radar/attacks/layer7/layer7.test.ts index 4df93b7583..edab41b510 100644 --- a/tests/api-resources/radar/attacks/layer7/layer7.test.ts +++ b/tests/api-resources/radar/attacks/layer7/layer7.test.ts @@ -33,7 +33,7 @@ describe('resource layer7', () => { await expect( client.radar.attacks.layer7.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -46,7 +46,7 @@ describe('resource layer7', () => { location: ['string'], mitigationProduct: ['DDOS'], name: ['main_series'], - normalization: 'PERCENTAGE_CHANGE', + normalization: 'MIN0_MAX', }, { path: '/_stainless_unknown_path' }, ), diff --git a/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts b/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts index 1ce5ca0591..287010a122 100644 --- a/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts +++ b/tests/api-resources/radar/attacks/layer7/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.httpMethod( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -76,7 +76,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.httpVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -118,7 +118,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.industry( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -162,7 +162,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -204,7 +204,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.managedRules( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -248,7 +248,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.mitigationProduct( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -291,7 +291,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.attacks.layer7.timeseriesGroups.vertical( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/attacks/layer7/top/top.test.ts b/tests/api-resources/radar/attacks/layer7/top/top.test.ts index 604411fa35..459439ed87 100644 --- a/tests/api-resources/radar/attacks/layer7/top/top.test.ts +++ b/tests/api-resources/radar/attacks/layer7/top/top.test.ts @@ -43,7 +43,7 @@ describe('resource top', () => { limitDirection: 'ORIGIN', limitPerLocation: 10, location: ['string'], - magnitude: 'AFFECTED_ZONES', + magnitude: 'MITIGATED_REQUESTS', mitigationProduct: ['DDOS'], name: ['main_series'], normalization: 'PERCENTAGE', diff --git a/tests/api-resources/radar/bgp/bgp.test.ts b/tests/api-resources/radar/bgp/bgp.test.ts index d4baf72664..3e1f6563c8 100644 --- a/tests/api-resources/radar/bgp/bgp.test.ts +++ b/tests/api-resources/radar/bgp/bgp.test.ts @@ -33,7 +33,7 @@ describe('resource bgp', () => { await expect( client.radar.bgp.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], diff --git a/tests/api-resources/radar/bgp/hijacks/events.test.ts b/tests/api-resources/radar/bgp/hijacks/events.test.ts index ff90e3e4bd..2121dc6d82 100644 --- a/tests/api-resources/radar/bgp/hijacks/events.test.ts +++ b/tests/api-resources/radar/bgp/hijacks/events.test.ts @@ -46,7 +46,7 @@ describe('resource events', () => { page: 0, per_page: 0, prefix: '1.1.1.0/24', - sortBy: 'ID', + sortBy: 'TIME', sortOrder: 'ASC', victimAsn: 0, }, diff --git a/tests/api-resources/radar/bgp/leaks/events.test.ts b/tests/api-resources/radar/bgp/leaks/events.test.ts index ff3edab344..f01690aceb 100644 --- a/tests/api-resources/radar/bgp/leaks/events.test.ts +++ b/tests/api-resources/radar/bgp/leaks/events.test.ts @@ -43,7 +43,7 @@ describe('resource events', () => { leakAsn: 0, page: 0, per_page: 0, - sortBy: 'ID', + sortBy: 'TIME', sortOrder: 'ASC', }, { path: '/_stainless_unknown_path' }, diff --git a/tests/api-resources/radar/bgp/routes.test.ts b/tests/api-resources/radar/bgp/routes.test.ts index 0775e1efe0..dd1a373c89 100644 --- a/tests/api-resources/radar/bgp/routes.test.ts +++ b/tests/api-resources/radar/bgp/routes.test.ts @@ -32,7 +32,7 @@ describe('resource routes', () => { // ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error await expect( client.radar.bgp.routes.ases( - { format: 'JSON', limit: 5, location: 'US', sortBy: 'cone', sortOrder: 'ASC' }, + { format: 'JSON', limit: 5, location: 'US', sortBy: 'ipv4', sortOrder: 'ASC' }, { path: '/_stainless_unknown_path' }, ), ).rejects.toThrow(Cloudflare.NotFoundError); @@ -88,7 +88,7 @@ describe('resource routes', () => { // ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error await expect( client.radar.bgp.routes.pfx2as( - { format: 'JSON', longestPrefixMatch: true, origin: 0, prefix: '1.1.1.0/24', rpkiStatus: 'VALID' }, + { format: 'JSON', longestPrefixMatch: true, origin: 0, prefix: '1.1.1.0/24', rpkiStatus: 'INVALID' }, { path: '/_stainless_unknown_path' }, ), ).rejects.toThrow(Cloudflare.NotFoundError); diff --git a/tests/api-resources/radar/dns/dns.test.ts b/tests/api-resources/radar/dns/dns.test.ts index 85ff797a31..bff5419da4 100644 --- a/tests/api-resources/radar/dns/dns.test.ts +++ b/tests/api-resources/radar/dns/dns.test.ts @@ -33,7 +33,7 @@ describe('resource dns', () => { await expect( client.radar.dns.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/dns/timeseries-groups.test.ts b/tests/api-resources/radar/dns/timeseries-groups.test.ts index f44531867c..0cc7ce283a 100644 --- a/tests/api-resources/radar/dns/timeseries-groups.test.ts +++ b/tests/api-resources/radar/dns/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.cacheHit( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -76,7 +76,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.dnssec( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -119,7 +119,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.dnssecAware( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -162,7 +162,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.dnssecE2E( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -205,7 +205,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -248,7 +248,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.matchingAnswer( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -291,7 +291,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.protocol( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -333,7 +333,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.queryType( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -376,7 +376,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.responseCode( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -419,7 +419,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.dns.timeseriesGroups.responseTTL( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/email/routing/timeseries-groups.test.ts b/tests/api-resources/radar/email/routing/timeseries-groups.test.ts index ed3855208f..be3660bb17 100644 --- a/tests/api-resources/radar/email/routing/timeseries-groups.test.ts +++ b/tests/api-resources/radar/email/routing/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.arc( { - aggInterval: '15m', + aggInterval: '1h', dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], dateStart: ['2019-12-27T18:11:19.117Z'], @@ -73,7 +73,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.dkim( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -113,7 +113,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.dmarc( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -153,7 +153,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.encrypted( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -193,7 +193,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -233,7 +233,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.routing.timeseriesGroups.spf( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], diff --git a/tests/api-resources/radar/email/security/timeseries-groups.test.ts b/tests/api-resources/radar/email/security/timeseries-groups.test.ts index 9c834e63e6..580b1d32f4 100644 --- a/tests/api-resources/radar/email/security/timeseries-groups.test.ts +++ b/tests/api-resources/radar/email/security/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.arc( { - aggInterval: '15m', + aggInterval: '1h', dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], dateStart: ['2019-12-27T18:11:19.117Z'], @@ -72,7 +72,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.dkim( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -111,7 +111,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.dmarc( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -150,7 +150,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.malicious( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -190,7 +190,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.spam( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -230,7 +230,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.spf( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -269,7 +269,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.spoof( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -309,7 +309,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.threatCategory( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -349,7 +349,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.email.security.timeseriesGroups.tlsVersion( { - aggInterval: '15m', + aggInterval: '1h', arc: ['PASS'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], diff --git a/tests/api-resources/radar/http/http.test.ts b/tests/api-resources/radar/http/http.test.ts index 035dda3d4f..ec89d94c31 100644 --- a/tests/api-resources/radar/http/http.test.ts +++ b/tests/api-resources/radar/http/http.test.ts @@ -33,7 +33,7 @@ describe('resource http', () => { await expect( client.radar.http.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -48,7 +48,7 @@ describe('resource http', () => { ipVersion: ['IPv4'], location: ['string'], name: ['main_series'], - normalization: 'PERCENTAGE_CHANGE', + normalization: 'MIN0_MAX', os: ['WINDOWS'], tlsVersion: ['TLSv1_0'], }, diff --git a/tests/api-resources/radar/http/timeseries-groups.test.ts b/tests/api-resources/radar/http/timeseries-groups.test.ts index efe6ca4836..c333ae2e20 100644 --- a/tests/api-resources/radar/http/timeseries-groups.test.ts +++ b/tests/api-resources/radar/http/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.botClass( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], browserFamily: ['CHROME'], continent: ['string'], @@ -78,7 +78,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.browser( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -125,7 +125,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.browserFamily( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], continent: ['string'], @@ -171,7 +171,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.deviceType( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -216,7 +216,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.httpProtocol( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -261,7 +261,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.httpVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -306,7 +306,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.ipVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -351,7 +351,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.os( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -396,7 +396,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.postQuantum( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], @@ -442,7 +442,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.http.timeseriesGroups.tlsVersion( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], botClass: ['LIKELY_AUTOMATED'], browserFamily: ['CHROME'], diff --git a/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts b/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts index 9859872182..ccc0cac1bf 100644 --- a/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts +++ b/tests/api-resources/radar/leaked-credentials/timeseries-groups.test.ts @@ -33,7 +33,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.leakedCredentials.timeseriesGroups.botClass( { - aggInterval: '15m', + aggInterval: '1h', compromised: ['CLEAN'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], @@ -69,7 +69,7 @@ describe('resource timeseriesGroups', () => { await expect( client.radar.leakedCredentials.timeseriesGroups.compromised( { - aggInterval: '15m', + aggInterval: '1h', botClass: ['LIKELY_AUTOMATED'], dateEnd: ['2019-12-27T18:11:19.117Z'], dateRange: ['7d'], diff --git a/tests/api-resources/radar/netflows/netflows.test.ts b/tests/api-resources/radar/netflows/netflows.test.ts index ac41c75460..0b1b8a553f 100644 --- a/tests/api-resources/radar/netflows/netflows.test.ts +++ b/tests/api-resources/radar/netflows/netflows.test.ts @@ -70,7 +70,7 @@ describe('resource netflows', () => { await expect( client.radar.netflows.timeseries( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], @@ -79,7 +79,7 @@ describe('resource netflows', () => { format: 'JSON', location: ['string'], name: ['main_series'], - normalization: 'PERCENTAGE_CHANGE', + normalization: 'MIN0_MAX', product: ['HTTP'], }, { path: '/_stainless_unknown_path' }, diff --git a/tests/api-resources/radar/quality/iqi.test.ts b/tests/api-resources/radar/quality/iqi.test.ts index 94fc4e60f1..83f506bcd6 100644 --- a/tests/api-resources/radar/quality/iqi.test.ts +++ b/tests/api-resources/radar/quality/iqi.test.ts @@ -49,7 +49,7 @@ describe('resource iqi', () => { test('timeseriesGroups: required and optional params', async () => { const response = await client.radar.quality.iqi.timeseriesGroups({ metric: 'BANDWIDTH', - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/radar/tcp-resets-timeouts.test.ts b/tests/api-resources/radar/tcp-resets-timeouts.test.ts index 98f036f93b..1eb492ca7e 100644 --- a/tests/api-resources/radar/tcp-resets-timeouts.test.ts +++ b/tests/api-resources/radar/tcp-resets-timeouts.test.ts @@ -70,7 +70,7 @@ describe('resource tcpResetsTimeouts', () => { await expect( client.radar.tcpResetsTimeouts.timeseriesGroups( { - aggInterval: '15m', + aggInterval: '1h', asn: ['string'], continent: ['string'], dateEnd: ['2019-12-27T18:11:19.117Z'], diff --git a/tests/api-resources/rate-limits.test.ts b/tests/api-resources/rate-limits.test.ts index fcf4677a5a..ed633db972 100644 --- a/tests/api-resources/rate-limits.test.ts +++ b/tests/api-resources/rate-limits.test.ts @@ -33,12 +33,12 @@ describe('resource rateLimits', () => { const response = await client.rateLimits.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', action: { - mode: 'simulate', + mode: 'challenge', response: { body: 'This request has been rate-limited.', content_type: 'text/xml' }, timeout: 86400, }, match: { - headers: [{ name: 'Cf-Cache-Status', op: 'eq', value: 'HIT' }], + headers: [{ name: 'Cf-Cache-Status', op: 'ne', value: 'HIT' }], request: { methods: ['GET', 'POST'], schemes: ['HTTP', 'HTTPS'], url: '*.example.org/path*' }, response: { origin_traffic: true }, }, @@ -108,12 +108,12 @@ describe('resource rateLimits', () => { const response = await client.rateLimits.edit('372e67954025e0ba6aaa6d586b9e0b59', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', action: { - mode: 'simulate', + mode: 'challenge', response: { body: 'This request has been rate-limited.', content_type: 'text/xml' }, timeout: 86400, }, match: { - headers: [{ name: 'Cf-Cache-Status', op: 'eq', value: 'HIT' }], + headers: [{ name: 'Cf-Cache-Status', op: 'ne', value: 'HIT' }], request: { methods: ['GET', 'POST'], schemes: ['HTTP', 'HTTPS'], url: '*.example.org/path*' }, response: { origin_traffic: true }, }, diff --git a/tests/api-resources/rulesets/phases/phases.test.ts b/tests/api-resources/rulesets/phases/phases.test.ts index aafaef630b..ab41bec324 100644 --- a/tests/api-resources/rulesets/phases/phases.test.ts +++ b/tests/api-resources/rulesets/phases/phases.test.ts @@ -12,7 +12,9 @@ const client = new Cloudflare({ describe('resource phases', () => { // TODO: investigate broken test test.skip('update', async () => { - const responsePromise = client.rulesets.phases.update('ddos_l4', { account_id: 'account_id' }); + const responsePromise = client.rulesets.phases.update('http_request_firewall_custom', { + account_id: 'account_id', + }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); const response = await responsePromise; @@ -24,7 +26,9 @@ describe('resource phases', () => { // TODO: investigate broken test test.skip('get', async () => { - const responsePromise = client.rulesets.phases.get('ddos_l4', { account_id: 'account_id' }); + const responsePromise = client.rulesets.phases.get('http_request_firewall_custom', { + account_id: 'account_id', + }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); const response = await responsePromise; diff --git a/tests/api-resources/rulesets/phases/versions.test.ts b/tests/api-resources/rulesets/phases/versions.test.ts index d82e8b7f02..42b3e37b6d 100644 --- a/tests/api-resources/rulesets/phases/versions.test.ts +++ b/tests/api-resources/rulesets/phases/versions.test.ts @@ -12,7 +12,9 @@ const client = new Cloudflare({ describe('resource versions', () => { // TODO: investigate broken test test.skip('list', async () => { - const responsePromise = client.rulesets.phases.versions.list('ddos_l4', { account_id: 'account_id' }); + const responsePromise = client.rulesets.phases.versions.list('http_request_firewall_custom', { + account_id: 'account_id', + }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); const response = await responsePromise; @@ -24,7 +26,9 @@ describe('resource versions', () => { // TODO: investigate broken test test.skip('get', async () => { - const responsePromise = client.rulesets.phases.versions.get('ddos_l4', '1', { account_id: 'account_id' }); + const responsePromise = client.rulesets.phases.versions.get('http_request_firewall_custom', '1', { + account_id: 'account_id', + }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); const response = await responsePromise; diff --git a/tests/api-resources/rulesets/rulesets.test.ts b/tests/api-resources/rulesets/rulesets.test.ts index 7903904da3..0b514b88e2 100644 --- a/tests/api-resources/rulesets/rulesets.test.ts +++ b/tests/api-resources/rulesets/rulesets.test.ts @@ -13,9 +13,9 @@ describe('resource rulesets', () => { // TODO: investigate broken test test.skip('create: only required params', async () => { const responsePromise = client.rulesets.create({ - kind: 'managed', + kind: 'root', name: 'My ruleset', - phase: 'ddos_l4', + phase: 'http_request_firewall_custom', account_id: 'account_id', }); const rawResponse = await responsePromise.asResponse(); @@ -30,9 +30,9 @@ describe('resource rulesets', () => { // TODO: investigate broken test test.skip('create: required and optional params', async () => { const response = await client.rulesets.create({ - kind: 'managed', + kind: 'root', name: 'My ruleset', - phase: 'ddos_l4', + phase: 'http_request_firewall_custom', account_id: 'account_id', description: 'My ruleset to execute managed rulesets', rules: [ @@ -56,7 +56,7 @@ describe('resource rulesets', () => { logging: { enabled: true }, ratelimit: { characteristics: ['ip.src'], - period: 10, + period: 60, counting_expression: 'http.request.body.raw eq "abcd"', mitigation_timeout: 600, requests_per_period: 1000, diff --git a/tests/api-resources/spectrum/analytics/events/bytimes.test.ts b/tests/api-resources/spectrum/analytics/events/bytimes.test.ts index 3f630b9b5a..ec06ed7ff4 100644 --- a/tests/api-resources/spectrum/analytics/events/bytimes.test.ts +++ b/tests/api-resources/spectrum/analytics/events/bytimes.test.ts @@ -13,7 +13,7 @@ describe('resource bytimes', () => { test('get: only required params', async () => { const responsePromise = client.spectrum.analytics.events.bytimes.get({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - time_delta: 'year', + time_delta: 'minute', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -27,7 +27,7 @@ describe('resource bytimes', () => { test('get: required and optional params', async () => { const response = await client.spectrum.analytics.events.bytimes.get({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - time_delta: 'year', + time_delta: 'minute', dimensions: ['event', 'appID'], filters: 'event==disconnect%20AND%20coloName!=SFO', metrics: ['count', 'bytesIngress'], diff --git a/tests/api-resources/spectrum/apps.test.ts b/tests/api-resources/spectrum/apps.test.ts index 89691196f6..2dc7ed7932 100644 --- a/tests/api-resources/spectrum/apps.test.ts +++ b/tests/api-resources/spectrum/apps.test.ts @@ -18,7 +18,7 @@ describe('resource apps', () => { ip_firewall: true, protocol: 'tcp/22', proxy_protocol: 'off', - tls: 'off', + tls: 'full', traffic_type: 'direct', }); const rawResponse = await responsePromise.asResponse(); @@ -38,7 +38,7 @@ describe('resource apps', () => { ip_firewall: true, protocol: 'tcp/22', proxy_protocol: 'off', - tls: 'off', + tls: 'full', traffic_type: 'direct', argo_smart_routing: true, edge_ips: { connectivity: 'all', type: 'dynamic' }, @@ -56,7 +56,7 @@ describe('resource apps', () => { ip_firewall: true, protocol: 'tcp/22', proxy_protocol: 'off', - tls: 'off', + tls: 'full', traffic_type: 'direct', }); const rawResponse = await responsePromise.asResponse(); @@ -76,7 +76,7 @@ describe('resource apps', () => { ip_firewall: true, protocol: 'tcp/22', proxy_protocol: 'off', - tls: 'off', + tls: 'full', traffic_type: 'direct', argo_smart_routing: true, edge_ips: { connectivity: 'all', type: 'dynamic' }, @@ -102,7 +102,7 @@ describe('resource apps', () => { test.skip('list: required and optional params', async () => { const response = await client.spectrum.apps.list({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - direction: 'asc', + direction: 'desc', order: 'protocol', page: 1, per_page: 1, diff --git a/tests/api-resources/speed/pages/pages.test.ts b/tests/api-resources/speed/pages/pages.test.ts index 033f102cec..76e009a459 100644 --- a/tests/api-resources/speed/pages/pages.test.ts +++ b/tests/api-resources/speed/pages/pages.test.ts @@ -31,7 +31,7 @@ describe('resource pages', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', deviceType: 'DESKTOP', metrics: 'performanceScore,ttfb,fcp,si,lcp,tti,tbt,cls', - region: 'asia-east1', + region: 'us-central1', start: '2014-01-01T05:20:00.12345Z', tz: 'tz', }); @@ -50,7 +50,7 @@ describe('resource pages', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', deviceType: 'DESKTOP', metrics: 'performanceScore,ttfb,fcp,si,lcp,tti,tbt,cls', - region: 'asia-east1', + region: 'us-central1', start: '2014-01-01T05:20:00.12345Z', tz: 'tz', end: '2014-01-01T05:20:00.12345Z', diff --git a/tests/api-resources/speed/pages/tests.test.ts b/tests/api-resources/speed/pages/tests.test.ts index 68803f1123..e4af4445a1 100644 --- a/tests/api-resources/speed/pages/tests.test.ts +++ b/tests/api-resources/speed/pages/tests.test.ts @@ -26,7 +26,7 @@ describe('resource tests', () => { test('create: required and optional params', async () => { const response = await client.speed.pages.tests.create('example.com', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - region: 'asia-east1', + region: 'us-central1', }); }); @@ -48,7 +48,7 @@ describe('resource tests', () => { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', page: 0, per_page: 5, - region: 'asia-east1', + region: 'us-central1', }); }); @@ -68,7 +68,7 @@ describe('resource tests', () => { test('delete: required and optional params', async () => { const response = await client.speed.pages.tests.delete('example.com', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - region: 'asia-east1', + region: 'us-central1', }); }); diff --git a/tests/api-resources/speed/schedule.test.ts b/tests/api-resources/speed/schedule.test.ts index 9b8c169225..af501d1f69 100644 --- a/tests/api-resources/speed/schedule.test.ts +++ b/tests/api-resources/speed/schedule.test.ts @@ -26,7 +26,7 @@ describe('resource schedule', () => { test('create: required and optional params', async () => { const response = await client.speed.schedule.create('example.com', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - region: 'asia-east1', + region: 'us-central1', }); }); @@ -46,7 +46,7 @@ describe('resource schedule', () => { test('delete: required and optional params', async () => { const response = await client.speed.schedule.delete('example.com', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - region: 'asia-east1', + region: 'us-central1', }); }); @@ -66,7 +66,7 @@ describe('resource schedule', () => { test('get: required and optional params', async () => { const response = await client.speed.schedule.get('example.com', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - region: 'asia-east1', + region: 'us-central1', }); }); }); diff --git a/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts b/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts index 7414ce0ffe..ce54844c79 100644 --- a/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts +++ b/tests/api-resources/ssl/certificate-packs/certificate-packs.test.ts @@ -13,7 +13,7 @@ describe('resource certificatePacks', () => { test('create: only required params', async () => { const responsePromise = client.ssl.certificatePacks.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - certificate_authority: 'google', + certificate_authority: 'lets_encrypt', hosts: ['example.com', '*.example.com', 'www.example.com'], type: 'advanced', validation_method: 'txt', @@ -31,7 +31,7 @@ describe('resource certificatePacks', () => { test('create: required and optional params', async () => { const response = await client.ssl.certificatePacks.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - certificate_authority: 'google', + certificate_authority: 'lets_encrypt', hosts: ['example.com', '*.example.com', 'www.example.com'], type: 'advanced', validation_method: 'txt', diff --git a/tests/api-resources/ssl/verification.test.ts b/tests/api-resources/ssl/verification.test.ts index a7681299b1..6669fdc04b 100644 --- a/tests/api-resources/ssl/verification.test.ts +++ b/tests/api-resources/ssl/verification.test.ts @@ -13,7 +13,7 @@ describe('resource verification', () => { test('edit: only required params', async () => { const responsePromise = client.ssl.verification.edit('a77f8bd7-3b47-46b4-a6f1-75cf98109948', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - validation_method: 'http', + validation_method: 'txt', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -27,7 +27,7 @@ describe('resource verification', () => { test('edit: required and optional params', async () => { const response = await client.ssl.verification.edit('a77f8bd7-3b47-46b4-a6f1-75cf98109948', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353', - validation_method: 'http', + validation_method: 'txt', }); }); diff --git a/tests/api-resources/stream/stream.test.ts b/tests/api-resources/stream/stream.test.ts index 05f6443f3a..1559b01649 100644 --- a/tests/api-resources/stream/stream.test.ts +++ b/tests/api-resources/stream/stream.test.ts @@ -61,7 +61,7 @@ describe('resource stream', () => { include_counts: true, search: 'puppy.mp4', start: '2014-01-02T02:20:00Z', - status: 'pendingupload', + status: 'inprogress', type: 'live', }); }); diff --git a/tests/api-resources/stream/token.test.ts b/tests/api-resources/stream/token.test.ts index 2eeb9d4b4d..9e6739b341 100644 --- a/tests/api-resources/stream/token.test.ts +++ b/tests/api-resources/stream/token.test.ts @@ -28,9 +28,9 @@ describe('resource token', () => { account_id: '023e105f4ecef8ad9ca31a8372d0c353', id: 'ab0d4ef71g4425f8dcba9041231813000', accessRules: [ - { action: 'allow', country: ['US', 'MX'], ip: ['string'], type: 'any' }, - { action: 'allow', country: ['string'], ip: ['93.184.216.0/24', '2400:cb00::/32'], type: 'any' }, - { action: 'allow', country: ['string'], ip: ['string'], type: 'any' }, + { action: 'block', country: ['US', 'MX'], ip: ['string'], type: 'ip.geoip.country' }, + { action: 'allow', country: ['string'], ip: ['93.184.216.0/24', '2400:cb00::/32'], type: 'ip.src' }, + { action: 'block', country: ['string'], ip: ['string'], type: 'any' }, ], downloadable: true, exp: 0, diff --git a/tests/api-resources/turnstile/widgets.test.ts b/tests/api-resources/turnstile/widgets.test.ts index 4956642d55..e468ace3b8 100644 --- a/tests/api-resources/turnstile/widgets.test.ts +++ b/tests/api-resources/turnstile/widgets.test.ts @@ -14,7 +14,7 @@ describe('resource widgets', () => { const responsePromise = client.turnstile.widgets.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'], - mode: 'non-interactive', + mode: 'invisible', name: 'blog.cloudflare.com login form', }); const rawResponse = await responsePromise.asResponse(); @@ -30,14 +30,14 @@ describe('resource widgets', () => { const response = await client.turnstile.widgets.create({ account_id: '023e105f4ecef8ad9ca31a8372d0c353', domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'], - mode: 'non-interactive', + mode: 'invisible', name: 'blog.cloudflare.com login form', direction: 'asc', order: 'id', page: 1, per_page: 5, bot_fight_mode: false, - clearance_level: 'no_clearance', + clearance_level: 'interactive', ephemeral_id: false, offlabel: false, region: 'world', @@ -48,7 +48,7 @@ describe('resource widgets', () => { const responsePromise = client.turnstile.widgets.update('0x4AAF00AAAABn0R22HWm-YUc', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'], - mode: 'non-interactive', + mode: 'invisible', name: 'blog.cloudflare.com login form', }); const rawResponse = await responsePromise.asResponse(); @@ -64,10 +64,10 @@ describe('resource widgets', () => { const response = await client.turnstile.widgets.update('0x4AAF00AAAABn0R22HWm-YUc', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', domains: ['203.0.113.1', 'cloudflare.com', 'blog.example.com'], - mode: 'non-interactive', + mode: 'invisible', name: 'blog.cloudflare.com login form', bot_fight_mode: false, - clearance_level: 'no_clearance', + clearance_level: 'interactive', ephemeral_id: false, offlabel: false, }); diff --git a/tests/api-resources/user/billing/history.test.ts b/tests/api-resources/user/billing/history.test.ts index ca5ac5a635..f5c3c7ec4a 100644 --- a/tests/api-resources/user/billing/history.test.ts +++ b/tests/api-resources/user/billing/history.test.ts @@ -35,7 +35,7 @@ describe('resource history', () => { { action: 'subscription', occurred_at: '2014-03-01T12:21:59.3456Z', - order: 'type', + order: 'occurred_at', page: 1, per_page: 5, type: 'charge', diff --git a/tests/api-resources/user/organizations.test.ts b/tests/api-resources/user/organizations.test.ts index 01c9b6e9ee..26494ae49a 100644 --- a/tests/api-resources/user/organizations.test.ts +++ b/tests/api-resources/user/organizations.test.ts @@ -33,10 +33,10 @@ describe('resource organizations', () => { await expect( client.user.organizations.list( { - direction: 'asc', + direction: 'desc', match: 'any', name: 'Cloudflare, Inc.', - order: 'id', + order: 'status', page: 1, per_page: 5, status: 'member', diff --git a/tests/api-resources/user/tokens/tokens.test.ts b/tests/api-resources/user/tokens/tokens.test.ts index 83b1e1e964..700a927eac 100644 --- a/tests/api-resources/user/tokens/tokens.test.ts +++ b/tests/api-resources/user/tokens/tokens.test.ts @@ -147,7 +147,7 @@ describe('resource tokens', () => { // ensure the request options are being passed correctly by passing an invalid HTTP method in order to cause an error await expect( client.user.tokens.list( - { direction: 'asc', page: 1, per_page: 5 }, + { direction: 'desc', page: 1, per_page: 5 }, { path: '/_stainless_unknown_path' }, ), ).rejects.toThrow(Cloudflare.NotFoundError); diff --git a/tests/api-resources/waiting-rooms/waiting-rooms.test.ts b/tests/api-resources/waiting-rooms/waiting-rooms.test.ts index f1496d7bcc..b7f7177f26 100644 --- a/tests/api-resources/waiting-rooms/waiting-rooms.test.ts +++ b/tests/api-resources/waiting-rooms/waiting-rooms.test.ts @@ -39,7 +39,7 @@ describe('resource waitingRooms', () => { cookie_suffix: 'abcd', custom_page_html: '{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}', - default_template_language: 'en-US', + default_template_language: 'es-ES', description: 'Production - DO NOT MODIFY', disable_session_renewal: false, enabled_origin_commands: ['revoke'], @@ -47,7 +47,7 @@ describe('resource waitingRooms', () => { path: '/shop/checkout', queue_all: true, queueing_method: 'fifo', - queueing_status_code: 200, + queueing_status_code: 202, session_duration: 1, suspended: true, turnstile_action: 'log', @@ -84,7 +84,7 @@ describe('resource waitingRooms', () => { cookie_suffix: 'abcd', custom_page_html: '{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}', - default_template_language: 'en-US', + default_template_language: 'es-ES', description: 'Production - DO NOT MODIFY', disable_session_renewal: false, enabled_origin_commands: ['revoke'], @@ -92,7 +92,7 @@ describe('resource waitingRooms', () => { path: '/shop/checkout', queue_all: true, queueing_method: 'fifo', - queueing_status_code: 200, + queueing_status_code: 202, session_duration: 1, suspended: true, turnstile_action: 'log', @@ -159,7 +159,7 @@ describe('resource waitingRooms', () => { cookie_suffix: 'abcd', custom_page_html: '{{#waitTimeKnown}} {{waitTime}} mins {{/waitTimeKnown}} {{^waitTimeKnown}} Queue all enabled {{/waitTimeKnown}}', - default_template_language: 'en-US', + default_template_language: 'es-ES', description: 'Production - DO NOT MODIFY', disable_session_renewal: false, enabled_origin_commands: ['revoke'], @@ -167,7 +167,7 @@ describe('resource waitingRooms', () => { path: '/shop/checkout', queue_all: true, queueing_method: 'fifo', - queueing_status_code: 200, + queueing_status_code: 202, session_duration: 1, suspended: true, turnstile_action: 'log', diff --git a/tests/api-resources/web3/hostnames/hostnames.test.ts b/tests/api-resources/web3/hostnames/hostnames.test.ts index 04f3b52be6..4d2602b9c3 100644 --- a/tests/api-resources/web3/hostnames/hostnames.test.ts +++ b/tests/api-resources/web3/hostnames/hostnames.test.ts @@ -14,7 +14,7 @@ describe('resource hostnames', () => { const responsePromise = client.web3.hostnames.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', name: 'gateway.example.com', - target: 'ethereum', + target: 'ipfs', }); const rawResponse = await responsePromise.asResponse(); expect(rawResponse).toBeInstanceOf(Response); @@ -29,7 +29,7 @@ describe('resource hostnames', () => { const response = await client.web3.hostnames.create({ zone_id: '023e105f4ecef8ad9ca31a8372d0c353', name: 'gateway.example.com', - target: 'ethereum', + target: 'ipfs', description: 'This is my IPFS gateway.', dnslink: '/ipns/onboarding.ipfs.cloudflare.com', }); diff --git a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts index 2ec93c0ebd..fb9fa2c63e 100644 --- a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts +++ b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/scripts.test.ts @@ -39,13 +39,13 @@ describe('resource scripts', () => { _headers: '/dashboard/*\nX-Frame-Options: DENY\n\n/static/*\nAccess-Control-Allow-Origin: *', _redirects: '/foo /bar 301\n/news/* /blog/:splat', html_handling: 'auto-trailing-slash', - not_found_handling: 'none', + not_found_handling: '404-page', run_worker_first: false, serve_directly: true, }, jwt: 'jwt', }, - bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }], + bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }], body_part: 'worker.js', compatibility_date: '2021-01-01', compatibility_flags: ['nodejs_compat'], diff --git a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts index 1cf321d40c..f44af08fa0 100644 --- a/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts +++ b/tests/api-resources/workers-for-platforms/dispatch/namespaces/scripts/settings.test.ts @@ -34,7 +34,7 @@ describe('resource settings', () => { { account_id: '023e105f4ecef8ad9ca31a8372d0c353', settings: { - bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }], + bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }], compatibility_date: '2021-01-01', compatibility_flags: ['nodejs_compat'], limits: { cpu_ms: 50 }, diff --git a/tests/api-resources/workers/scripts/script-and-version-settings.test.ts b/tests/api-resources/workers/scripts/script-and-version-settings.test.ts index acfbb2a4ec..ed2c081d22 100644 --- a/tests/api-resources/workers/scripts/script-and-version-settings.test.ts +++ b/tests/api-resources/workers/scripts/script-and-version-settings.test.ts @@ -27,7 +27,7 @@ describe('resource scriptAndVersionSettings', () => { const response = await client.workers.scripts.scriptAndVersionSettings.edit('this-is_my_script-01', { account_id: '023e105f4ecef8ad9ca31a8372d0c353', settings: { - bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }], + bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }], compatibility_date: '2021-01-01', compatibility_flags: ['nodejs_compat'], limits: { cpu_ms: 50 }, diff --git a/tests/api-resources/workers/scripts/scripts.test.ts b/tests/api-resources/workers/scripts/scripts.test.ts index 46c4dd4ebc..7f79b7c986 100644 --- a/tests/api-resources/workers/scripts/scripts.test.ts +++ b/tests/api-resources/workers/scripts/scripts.test.ts @@ -35,13 +35,13 @@ describe('resource scripts', () => { _headers: '/dashboard/*\nX-Frame-Options: DENY\n\n/static/*\nAccess-Control-Allow-Origin: *', _redirects: '/foo /bar 301\n/news/* /blog/:splat', html_handling: 'auto-trailing-slash', - not_found_handling: 'none', + not_found_handling: '404-page', run_worker_first: false, serve_directly: true, }, jwt: 'jwt', }, - bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }], + bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }], body_part: 'worker.js', compatibility_date: '2021-01-01', compatibility_flags: ['nodejs_compat'], diff --git a/tests/api-resources/workers/scripts/versions.test.ts b/tests/api-resources/workers/scripts/versions.test.ts index 2676bd7ff2..c12c104fa3 100644 --- a/tests/api-resources/workers/scripts/versions.test.ts +++ b/tests/api-resources/workers/scripts/versions.test.ts @@ -32,7 +32,7 @@ describe('resource versions', () => { metadata: { main_module: 'worker.js', annotations: { 'workers/message': 'Fixed worker code.', 'workers/tag': 'workers/tag' }, - bindings: [{ name: 'MY_ENV_VAR', type: 'ai' }], + bindings: [{ name: 'MY_ENV_VAR', type: 'plain_text' }], compatibility_date: '2021-01-01', compatibility_flags: ['nodejs_compat'], keep_bindings: ['string'], diff --git a/tests/api-resources/zero-trust/devices/posture/posture.test.ts b/tests/api-resources/zero-trust/devices/posture/posture.test.ts index 3421b8bd79..b596a78407 100644 --- a/tests/api-resources/zero-trust/devices/posture/posture.test.ts +++ b/tests/api-resources/zero-trust/devices/posture/posture.test.ts @@ -33,7 +33,7 @@ describe('resource posture', () => { description: 'The rule for admin serial numbers', expiration: '1h', input: { - operating_system: 'windows', + operating_system: 'linux', path: '/bin/cat', exists: true, sha256: 'https://api.us-2.crowdstrike.com', @@ -67,7 +67,7 @@ describe('resource posture', () => { description: 'The rule for admin serial numbers', expiration: '1h', input: { - operating_system: 'windows', + operating_system: 'linux', path: '/bin/cat', exists: true, sha256: 'https://api.us-2.crowdstrike.com', diff --git a/tests/api-resources/zero-trust/gateway/rules.test.ts b/tests/api-resources/zero-trust/gateway/rules.test.ts index b4333f046a..d1c3b76866 100644 --- a/tests/api-resources/zero-trust/gateway/rules.test.ts +++ b/tests/api-resources/zero-trust/gateway/rules.test.ts @@ -13,7 +13,7 @@ describe('resource rules', () => { test('create: only required params', async () => { const responsePromise = client.zeroTrust.gateway.rules.create({ account_id: '699d98642c564d2e855e9661899b7252', - action: 'on', + action: 'allow', name: 'block bad websites', }); const rawResponse = await responsePromise.asResponse(); @@ -28,7 +28,7 @@ describe('resource rules', () => { test('create: required and optional params', async () => { const response = await client.zeroTrust.gateway.rules.create({ account_id: '699d98642c564d2e855e9661899b7252', - action: 'on', + action: 'allow', name: 'block bad websites', description: 'Block bad websites based on their host name.', device_posture: 'any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})', @@ -42,7 +42,7 @@ describe('resource rules', () => { allow_child_bypass: false, audit_ssh: { command_logging: false }, biso_admin_controls: { - copy: 'enabled', + copy: 'remote_only', dcp: false, dd: false, dk: false, @@ -91,7 +91,7 @@ describe('resource rules', () => { redirect: { target_uri: 'https://example.com', preserve_path_and_query: true }, resolve_dns_internally: { fallback: 'none', view_id: 'view_id' }, resolve_dns_through_cloudflare: true, - untrusted_cert: { action: 'pass_through' }, + untrusted_cert: { action: 'error' }, }, schedule: { fri: '08:00-12:30,13:30-17:00', @@ -111,7 +111,7 @@ describe('resource rules', () => { test('update: only required params', async () => { const responsePromise = client.zeroTrust.gateway.rules.update('f174e90a-fafe-4643-bbbc-4a0ed4fc8415', { account_id: '699d98642c564d2e855e9661899b7252', - action: 'on', + action: 'allow', name: 'block bad websites', }); const rawResponse = await responsePromise.asResponse(); @@ -126,7 +126,7 @@ describe('resource rules', () => { test('update: required and optional params', async () => { const response = await client.zeroTrust.gateway.rules.update('f174e90a-fafe-4643-bbbc-4a0ed4fc8415', { account_id: '699d98642c564d2e855e9661899b7252', - action: 'on', + action: 'allow', name: 'block bad websites', description: 'Block bad websites based on their host name.', device_posture: 'any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})', @@ -140,7 +140,7 @@ describe('resource rules', () => { allow_child_bypass: false, audit_ssh: { command_logging: false }, biso_admin_controls: { - copy: 'enabled', + copy: 'remote_only', dcp: false, dd: false, dk: false, @@ -189,7 +189,7 @@ describe('resource rules', () => { redirect: { target_uri: 'https://example.com', preserve_path_and_query: true }, resolve_dns_internally: { fallback: 'none', view_id: 'view_id' }, resolve_dns_through_cloudflare: true, - untrusted_cert: { action: 'pass_through' }, + untrusted_cert: { action: 'error' }, }, schedule: { fri: '08:00-12:30,13:30-17:00', diff --git a/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts b/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts index 7edcc8041e..0ccd9e8e69 100644 --- a/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts +++ b/tests/api-resources/zero-trust/tunnels/cloudflared/cloudflared.test.ts @@ -28,7 +28,7 @@ describe('resource cloudflared', () => { const response = await client.zeroTrust.tunnels.cloudflared.create({ account_id: '699d98642c564d2e855e9661899b7252', name: 'blog', - config_src: 'local', + config_src: 'cloudflare', tunnel_secret: 'AQIDBAUGBwgBAgMEBQYHCAECAwQFBgcIAQIDBAUGBwg=', }); }); @@ -56,7 +56,7 @@ describe('resource cloudflared', () => { name: 'blog', page: 1, per_page: 1, - status: 'inactive', + status: 'healthy', uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415', was_active_at: '2009-11-10T23:00:00Z', was_inactive_at: '2009-11-10T23:00:00Z', diff --git a/tests/api-resources/zero-trust/tunnels/tunnels.test.ts b/tests/api-resources/zero-trust/tunnels/tunnels.test.ts index e69ee503e1..40ebec2e05 100644 --- a/tests/api-resources/zero-trust/tunnels/tunnels.test.ts +++ b/tests/api-resources/zero-trust/tunnels/tunnels.test.ts @@ -31,7 +31,7 @@ describe('resource tunnels', () => { name: 'blog', page: 1, per_page: 1, - status: 'inactive', + status: 'healthy', tun_types: ['cfd_tunnel'], uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415', was_active_at: '2009-11-10T23:00:00Z', diff --git a/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts b/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts index cf48e7afa5..684883cc20 100644 --- a/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts +++ b/tests/api-resources/zero-trust/tunnels/warp-connector/warp-connector.test.ts @@ -54,7 +54,7 @@ describe('resource warpConnector', () => { name: 'blog', page: 1, per_page: 1, - status: 'inactive', + status: 'healthy', uuid: 'f70ff985-a4ef-4643-bbbc-4a0ed4fc8415', was_active_at: '2009-11-10T23:00:00Z', was_inactive_at: '2009-11-10T23:00:00Z', diff --git a/tests/api-resources/zones/zones.test.ts b/tests/api-resources/zones/zones.test.ts index 3ab76e7340..369a82634c 100644 --- a/tests/api-resources/zones/zones.test.ts +++ b/tests/api-resources/zones/zones.test.ts @@ -53,10 +53,10 @@ describe('resource zones', () => { client.zones.list( { account: { id: 'id', name: 'name' }, - direction: 'asc', + direction: 'desc', match: 'any', name: 'name', - order: 'name', + order: 'status', page: 1, per_page: 5, status: 'initializing',