Skip to content

Commit b129315

Browse files
chore(api): update composite API spec
1 parent a269190 commit b129315

9 files changed

Lines changed: 81 additions & 217 deletions

File tree

.stats.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 1802
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-9deae24d13b0c6ab1dee39ca28bfcc3075482843b369d47510976bd2e7c33172.yml
3-
openapi_spec_hash: b494277f0af559cde1530dde36a00371
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-e581e5f97f2de43098da4d30544af20d8a4bcd418981435b48ee862c14317273.yml
3+
openapi_spec_hash: 04daf40bd8b3e63b6caa81de24e765dc
44
config_hash: 7f7d0989caf43ee0fc1a934907e4db8a

src/cloudflare/resources/zero_trust/gateway/rules.py

Lines changed: 16 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ def create(
109109
110110
expiration: Defines the expiration time stamp and default duration of a DNS policy. Takes
111111
precedence over the policy's `schedule` configuration, if any. This does not
112-
apply to HTTP or network policies. Settable only for `dns` rules.
112+
apply to HTTP or network policies.
113113
114114
filters: Specify the protocol or layer to evaluate the traffic, identity, and device
115115
posture expressions.
@@ -125,15 +125,10 @@ def create(
125125
[Order of enforcement](http://developers.cloudflare.com/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#manage-precedence-with-terraform)
126126
to manage precedence via Terraform.
127127
128-
rule_settings: Set settings related to this rule. Each setting is only valid for specific rule
129-
types and can only be used with the appropriate selectors. If Terraform drift is
130-
observed in these setting values, verify that the setting is supported for the
131-
given rule type and that the API response reflects the requested value. If the
132-
API response returns sanitized or modified values that differ from the request,
133-
use the API-provided values in Terraform to ensure consistency.
128+
rule_settings: Set settings related to this rule.
134129
135-
schedule: Defines the schedule for activating DNS policies. Settable only for `dns` and
136-
`dns_resolver` rules.
130+
schedule: Defines the schedule for activating DNS policies. (HTTP/Egress or L4
131+
unsupported).
137132
138133
traffic: Specify the wirefilter expression used for traffic matching. The API
139134
automatically formats and sanitizes expressions before storing them. To prevent
@@ -242,7 +237,7 @@ def update(
242237
243238
expiration: Defines the expiration time stamp and default duration of a DNS policy. Takes
244239
precedence over the policy's `schedule` configuration, if any. This does not
245-
apply to HTTP or network policies. Settable only for `dns` rules.
240+
apply to HTTP or network policies.
246241
247242
filters: Specify the protocol or layer to evaluate the traffic, identity, and device
248243
posture expressions.
@@ -258,15 +253,10 @@ def update(
258253
[Order of enforcement](http://developers.cloudflare.com/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#manage-precedence-with-terraform)
259254
to manage precedence via Terraform.
260255
261-
rule_settings: Set settings related to this rule. Each setting is only valid for specific rule
262-
types and can only be used with the appropriate selectors. If Terraform drift is
263-
observed in these setting values, verify that the setting is supported for the
264-
given rule type and that the API response reflects the requested value. If the
265-
API response returns sanitized or modified values that differ from the request,
266-
use the API-provided values in Terraform to ensure consistency.
256+
rule_settings: Set settings related to this rule.
267257
268-
schedule: Defines the schedule for activating DNS policies. Settable only for `dns` and
269-
`dns_resolver` rules.
258+
schedule: Defines the schedule for activating DNS policies. (HTTP/Egress or L4
259+
unsupported).
270260
271261
traffic: Specify the wirefilter expression used for traffic matching. The API
272262
automatically formats and sanitizes expressions before storing them. To prevent
@@ -557,7 +547,7 @@ async def create(
557547
558548
expiration: Defines the expiration time stamp and default duration of a DNS policy. Takes
559549
precedence over the policy's `schedule` configuration, if any. This does not
560-
apply to HTTP or network policies. Settable only for `dns` rules.
550+
apply to HTTP or network policies.
561551
562552
filters: Specify the protocol or layer to evaluate the traffic, identity, and device
563553
posture expressions.
@@ -573,15 +563,10 @@ async def create(
573563
[Order of enforcement](http://developers.cloudflare.com/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#manage-precedence-with-terraform)
574564
to manage precedence via Terraform.
575565
576-
rule_settings: Set settings related to this rule. Each setting is only valid for specific rule
577-
types and can only be used with the appropriate selectors. If Terraform drift is
578-
observed in these setting values, verify that the setting is supported for the
579-
given rule type and that the API response reflects the requested value. If the
580-
API response returns sanitized or modified values that differ from the request,
581-
use the API-provided values in Terraform to ensure consistency.
566+
rule_settings: Set settings related to this rule.
582567
583-
schedule: Defines the schedule for activating DNS policies. Settable only for `dns` and
584-
`dns_resolver` rules.
568+
schedule: Defines the schedule for activating DNS policies. (HTTP/Egress or L4
569+
unsupported).
585570
586571
traffic: Specify the wirefilter expression used for traffic matching. The API
587572
automatically formats and sanitizes expressions before storing them. To prevent
@@ -690,7 +675,7 @@ async def update(
690675
691676
expiration: Defines the expiration time stamp and default duration of a DNS policy. Takes
692677
precedence over the policy's `schedule` configuration, if any. This does not
693-
apply to HTTP or network policies. Settable only for `dns` rules.
678+
apply to HTTP or network policies.
694679
695680
filters: Specify the protocol or layer to evaluate the traffic, identity, and device
696681
posture expressions.
@@ -706,15 +691,10 @@ async def update(
706691
[Order of enforcement](http://developers.cloudflare.com/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#manage-precedence-with-terraform)
707692
to manage precedence via Terraform.
708693
709-
rule_settings: Set settings related to this rule. Each setting is only valid for specific rule
710-
types and can only be used with the appropriate selectors. If Terraform drift is
711-
observed in these setting values, verify that the setting is supported for the
712-
given rule type and that the API response reflects the requested value. If the
713-
API response returns sanitized or modified values that differ from the request,
714-
use the API-provided values in Terraform to ensure consistency.
694+
rule_settings: Set settings related to this rule.
715695
716-
schedule: Defines the schedule for activating DNS policies. Settable only for `dns` and
717-
`dns_resolver` rules.
696+
schedule: Defines the schedule for activating DNS policies. (HTTP/Egress or L4
697+
unsupported).
718698
719699
traffic: Specify the wirefilter expression used for traffic matching. The API
720700
automatically formats and sanitizes expressions before storing them. To prevent

src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings.py

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -80,14 +80,7 @@ class GatewayConfigurationSettings(BaseModel):
8080
"""
8181

8282
extended_email_matching: Optional[ExtendedEmailMatching] = None
83-
"""Specify user email settings for the firewall policies.
84-
85-
When this is enabled, we standardize the email addresses in the identity part of
86-
the rule, so that they match the extended email variants in the firewall
87-
policies. When this setting is turned off, the email addresses in the identity
88-
part of the rule will be matched exactly as provided. If your email has `.` or
89-
`+` modifiers, you should enable this setting.
90-
"""
83+
"""Specify user emails settings for the firewall policies."""
9184

9285
fips: Optional[FipsSettings] = None
9386
"""Specify FIPS settings."""

src/cloudflare/types/zero_trust/gateway/gateway_configuration_settings_param.py

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -81,14 +81,7 @@ class GatewayConfigurationSettingsParam(TypedDict, total=False):
8181
"""
8282

8383
extended_email_matching: Optional[ExtendedEmailMatchingParam]
84-
"""Specify user email settings for the firewall policies.
85-
86-
When this is enabled, we standardize the email addresses in the identity part of
87-
the rule, so that they match the extended email variants in the firewall
88-
policies. When this setting is turned off, the email addresses in the identity
89-
part of the rule will be matched exactly as provided. If your email has `.` or
90-
`+` modifiers, you should enable this setting.
91-
"""
84+
"""Specify user emails settings for the firewall policies."""
9285

9386
fips: Optional[FipsSettingsParam]
9487
"""Specify FIPS settings."""

src/cloudflare/types/zero_trust/gateway/gateway_rule.py

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ class GatewayRule(BaseModel):
108108
"""Defines the expiration time stamp and default duration of a DNS policy.
109109
110110
Takes precedence over the policy's `schedule` configuration, if any. This does
111-
not apply to HTTP or network policies. Settable only for `dns` rules.
111+
not apply to HTTP or network policies.
112112
"""
113113

114114
identity: Optional[str] = None
@@ -123,20 +123,12 @@ class GatewayRule(BaseModel):
123123
"""Indicate that this rule is shared via the Orgs API and read only."""
124124

125125
rule_settings: Optional[RuleSetting] = None
126-
"""Set settings related to this rule.
127-
128-
Each setting is only valid for specific rule types and can only be used with the
129-
appropriate selectors. If Terraform drift is observed in these setting values,
130-
verify that the setting is supported for the given rule type and that the API
131-
response reflects the requested value. If the API response returns sanitized or
132-
modified values that differ from the request, use the API-provided values in
133-
Terraform to ensure consistency.
134-
"""
126+
"""Set settings related to this rule."""
135127

136128
schedule: Optional[Schedule] = None
137129
"""Defines the schedule for activating DNS policies.
138130
139-
Settable only for `dns` and `dns_resolver` rules.
131+
(HTTP/Egress or L4 unsupported).
140132
"""
141133

142134
sharable: Optional[bool] = None

src/cloudflare/types/zero_trust/gateway/rule_create_params.py

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ class RuleCreateParams(TypedDict, total=False):
6363
"""Defines the expiration time stamp and default duration of a DNS policy.
6464
6565
Takes precedence over the policy's `schedule` configuration, if any. This does
66-
not apply to HTTP or network policies. Settable only for `dns` rules.
66+
not apply to HTTP or network policies.
6767
"""
6868

6969
filters: List[GatewayFilter]
@@ -90,20 +90,12 @@ class RuleCreateParams(TypedDict, total=False):
9090
"""
9191

9292
rule_settings: RuleSettingParam
93-
"""Set settings related to this rule.
94-
95-
Each setting is only valid for specific rule types and can only be used with the
96-
appropriate selectors. If Terraform drift is observed in these setting values,
97-
verify that the setting is supported for the given rule type and that the API
98-
response reflects the requested value. If the API response returns sanitized or
99-
modified values that differ from the request, use the API-provided values in
100-
Terraform to ensure consistency.
101-
"""
93+
"""Set settings related to this rule."""
10294

10395
schedule: Optional[ScheduleParam]
10496
"""Defines the schedule for activating DNS policies.
10597
106-
Settable only for `dns` and `dns_resolver` rules.
98+
(HTTP/Egress or L4 unsupported).
10799
"""
108100

109101
traffic: str

0 commit comments

Comments
 (0)