Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 197c3de

Browse files
committedMar 13, 2025
feat(api): api update (#3974)
1 parent 3d59c7d commit 197c3de

6 files changed

+1
-31
lines changed
 

‎.stats.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
configured_endpoints: 1570
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-a35cfe958a64e907e1dfa4e6c46c03749184d496bf62e1a38ef50dbfec6c2a3c.yml
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-cd4dda55299c2042f689d06bde060733f0a9717108a62f816b50af11a450225b.yml

‎zero_trust/devicepolicy.go

-5
Original file line numberDiff line numberDiff line change
@@ -101,10 +101,6 @@ type SettingsPolicy struct {
101101
// fall back to a best guess of the default/system DNS resolvers unless this policy
102102
// option is set to `true`.
103103
DisableAutoFallback bool `json:"disable_auto_fallback"`
104-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
105-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
106-
// DoH connection operates outside of the WARP tunnel.
107-
DOHInTunnel bool `json:"doh_in_tunnel"`
108104
// Whether the policy will be applied to matching devices.
109105
Enabled bool `json:"enabled"`
110106
Exclude []SplitTunnelExclude `json:"exclude"`
@@ -154,7 +150,6 @@ type settingsPolicyJSON struct {
154150
Default apijson.Field
155151
Description apijson.Field
156152
DisableAutoFallback apijson.Field
157-
DOHInTunnel apijson.Field
158153
Enabled apijson.Field
159154
Exclude apijson.Field
160155
ExcludeOfficeIPs apijson.Field

‎zero_trust/devicepolicycustom.go

-8
Original file line numberDiff line numberDiff line change
@@ -187,10 +187,6 @@ type DevicePolicyCustomNewParams struct {
187187
// fall back to a best guess of the default/system DNS resolvers unless this policy
188188
// option is set to `true`.
189189
DisableAutoFallback param.Field[bool] `json:"disable_auto_fallback"`
190-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
191-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
192-
// DoH connection operates outside of the WARP tunnel.
193-
DOHInTunnel param.Field[bool] `json:"doh_in_tunnel"`
194190
// Whether the policy will be applied to matching devices.
195191
Enabled param.Field[bool] `json:"enabled"`
196192
// Whether to add Microsoft IPs to Split Tunnel exclusions.
@@ -300,10 +296,6 @@ type DevicePolicyCustomEditParams struct {
300296
// fall back to a best guess of the default/system DNS resolvers unless this policy
301297
// option is set to `true`.
302298
DisableAutoFallback param.Field[bool] `json:"disable_auto_fallback"`
303-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
304-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
305-
// DoH connection operates outside of the WARP tunnel.
306-
DOHInTunnel param.Field[bool] `json:"doh_in_tunnel"`
307299
// Whether the policy will be applied to matching devices.
308300
Enabled param.Field[bool] `json:"enabled"`
309301
// Whether to add Microsoft IPs to Split Tunnel exclusions.

‎zero_trust/devicepolicycustom_test.go

-2
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@ func TestDevicePolicyCustomNewWithOptionalParams(t *testing.T) {
4040
CaptivePortal: cloudflare.F(180.000000),
4141
Description: cloudflare.F("Policy for test teams."),
4242
DisableAutoFallback: cloudflare.F(true),
43-
DOHInTunnel: cloudflare.F(true),
4443
Enabled: cloudflare.F(true),
4544
ExcludeOfficeIPs: cloudflare.F(true),
4645
LANAllowMinutes: cloudflare.F(30.000000),
@@ -143,7 +142,6 @@ func TestDevicePolicyCustomEditWithOptionalParams(t *testing.T) {
143142
CaptivePortal: cloudflare.F(180.000000),
144143
Description: cloudflare.F("Policy for test teams."),
145144
DisableAutoFallback: cloudflare.F(true),
146-
DOHInTunnel: cloudflare.F(true),
147145
Enabled: cloudflare.F(true),
148146
ExcludeOfficeIPs: cloudflare.F(true),
149147
Match: cloudflare.F(`user.identity == "test@cloudflare.com"`),

‎zero_trust/devicepolicydefault.go

-14
Original file line numberDiff line numberDiff line change
@@ -94,10 +94,6 @@ type DevicePolicyDefaultEditResponse struct {
9494
// fall back to a best guess of the default/system DNS resolvers unless this policy
9595
// option is set to `true`.
9696
DisableAutoFallback bool `json:"disable_auto_fallback"`
97-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
98-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
99-
// DoH connection operates outside of the WARP tunnel.
100-
DOHInTunnel bool `json:"doh_in_tunnel"`
10197
// Whether the policy will be applied to matching devices.
10298
Enabled bool `json:"enabled"`
10399
Exclude []SplitTunnelExclude `json:"exclude"`
@@ -129,7 +125,6 @@ type devicePolicyDefaultEditResponseJSON struct {
129125
CaptivePortal apijson.Field
130126
Default apijson.Field
131127
DisableAutoFallback apijson.Field
132-
DOHInTunnel apijson.Field
133128
Enabled apijson.Field
134129
Exclude apijson.Field
135130
ExcludeOfficeIPs apijson.Field
@@ -196,10 +191,6 @@ type DevicePolicyDefaultGetResponse struct {
196191
// fall back to a best guess of the default/system DNS resolvers unless this policy
197192
// option is set to `true`.
198193
DisableAutoFallback bool `json:"disable_auto_fallback"`
199-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
200-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
201-
// DoH connection operates outside of the WARP tunnel.
202-
DOHInTunnel bool `json:"doh_in_tunnel"`
203194
// Whether the policy will be applied to matching devices.
204195
Enabled bool `json:"enabled"`
205196
Exclude []SplitTunnelExclude `json:"exclude"`
@@ -231,7 +222,6 @@ type devicePolicyDefaultGetResponseJSON struct {
231222
CaptivePortal apijson.Field
232223
Default apijson.Field
233224
DisableAutoFallback apijson.Field
234-
DOHInTunnel apijson.Field
235225
Enabled apijson.Field
236226
Exclude apijson.Field
237227
ExcludeOfficeIPs apijson.Field
@@ -297,10 +287,6 @@ type DevicePolicyDefaultEditParams struct {
297287
// fall back to a best guess of the default/system DNS resolvers unless this policy
298288
// option is set to `true`.
299289
DisableAutoFallback param.Field[bool] `json:"disable_auto_fallback"`
300-
// Determines how the WARP client sends DNS requests to Cloudflare Gateway. When
301-
// `true`, DNS traffic is sent over DoH inside the WARP tunnel. When `false`, the
302-
// DoH connection operates outside of the WARP tunnel.
303-
DOHInTunnel param.Field[bool] `json:"doh_in_tunnel"`
304290
// Whether to add Microsoft IPs to Split Tunnel exclusions.
305291
ExcludeOfficeIPs param.Field[bool] `json:"exclude_office_ips"`
306292
// Determines if the operating system will register WARP's local interface IP with

‎zero_trust/devicepolicydefault_test.go

-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ func TestDevicePolicyDefaultEditWithOptionalParams(t *testing.T) {
3535
AutoConnect: cloudflare.F(0.000000),
3636
CaptivePortal: cloudflare.F(180.000000),
3737
DisableAutoFallback: cloudflare.F(true),
38-
DOHInTunnel: cloudflare.F(true),
3938
ExcludeOfficeIPs: cloudflare.F(true),
4039
RegisterInterfaceIPWithDNS: cloudflare.F(true),
4140
ServiceModeV2: cloudflare.F(zero_trust.DevicePolicyDefaultEditParamsServiceModeV2{

0 commit comments

Comments
 (0)
Please sign in to comment.