Skip to content

Commit 9b98cb9

Browse files
author
Stainless Bot
committedNov 5, 2024
feat(api): api update (#3564)
1 parent 207114e commit 9b98cb9

8 files changed

+1554
-908
lines changed
 

‎.stats.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
configured_endpoints: 1397
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-bd17acae6e2c1649037abd197a2022c623adf77733008a901fc2481d28e5baf1.yml
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-011592842d973a3e62f468488f0f813dd511233ee29c6feab3516ce5b9475814.yml

‎api.md

-1
Original file line numberDiff line numberDiff line change
@@ -5020,7 +5020,6 @@ Params Types:
50205020

50215021
Response Types:
50225022

5023-
- <a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust">zero_trust</a>.<a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust#ApprovalGroup">ApprovalGroup</a>
50245023
- <a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust">zero_trust</a>.<a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust#AccessPolicyNewResponse">AccessPolicyNewResponse</a>
50255024
- <a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust">zero_trust</a>.<a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust#AccessPolicyUpdateResponse">AccessPolicyUpdateResponse</a>
50265025
- <a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust">zero_trust</a>.<a href="https://pkg.go.dev/github.com/cloudflare/cloudflare-go/v3/zero_trust#AccessPolicyListResponse">AccessPolicyListResponse</a>

‎zero_trust/accessapplication.go

+1,474-453
Large diffs are not rendered by default.

‎zero_trust/accessapplicationpolicy.go

-26
Original file line numberDiff line numberDiff line change
@@ -263,13 +263,6 @@ func (r accessApplicationPolicyDeleteResponseJSON) RawJSON() string {
263263
}
264264

265265
type AccessApplicationPolicyNewParams struct {
266-
// The action Access will take if a user matches this policy.
267-
Decision param.Field[Decision] `json:"decision,required"`
268-
// Rules evaluated with an OR logical operator. A user needs to meet only one of
269-
// the Include rules.
270-
Include param.Field[[]AccessRuleUnionParam] `json:"include,required"`
271-
// The name of the Access policy.
272-
Name param.Field[string] `json:"name,required"`
273266
// The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
274267
AccountID param.Field[string] `path:"account_id"`
275268
// The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
@@ -279,9 +272,6 @@ type AccessApplicationPolicyNewParams struct {
279272
// Requires the user to request access from an administrator at the start of each
280273
// session.
281274
ApprovalRequired param.Field[bool] `json:"approval_required"`
282-
// Rules evaluated with a NOT logical operator. To match the policy, a user cannot
283-
// meet any of the Exclude rules.
284-
Exclude param.Field[[]AccessRuleUnionParam] `json:"exclude"`
285275
// Require this application to be served in an isolated browser for users matching
286276
// this policy. 'Client Web Isolation' must be on for the account in order to use
287277
// this feature.
@@ -293,9 +283,6 @@ type AccessApplicationPolicyNewParams struct {
293283
PurposeJustificationPrompt param.Field[string] `json:"purpose_justification_prompt"`
294284
// Require users to enter a justification when they log in to the application.
295285
PurposeJustificationRequired param.Field[bool] `json:"purpose_justification_required"`
296-
// Rules evaluated with an AND logical operator. To match the policy, a user must
297-
// meet all of the Require rules.
298-
Require param.Field[[]AccessRuleUnionParam] `json:"require"`
299286
// The amount of time that tokens issued for the application will be valid. Must be
300287
// in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs), ms, s,
301288
// m, h.
@@ -350,13 +337,6 @@ func (r AccessApplicationPolicyNewResponseEnvelopeSuccess) IsKnown() bool {
350337
}
351338

352339
type AccessApplicationPolicyUpdateParams struct {
353-
// The action Access will take if a user matches this policy.
354-
Decision param.Field[Decision] `json:"decision,required"`
355-
// Rules evaluated with an OR logical operator. A user needs to meet only one of
356-
// the Include rules.
357-
Include param.Field[[]AccessRuleUnionParam] `json:"include,required"`
358-
// The name of the Access policy.
359-
Name param.Field[string] `json:"name,required"`
360340
// The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
361341
AccountID param.Field[string] `path:"account_id"`
362342
// The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
@@ -366,9 +346,6 @@ type AccessApplicationPolicyUpdateParams struct {
366346
// Requires the user to request access from an administrator at the start of each
367347
// session.
368348
ApprovalRequired param.Field[bool] `json:"approval_required"`
369-
// Rules evaluated with a NOT logical operator. To match the policy, a user cannot
370-
// meet any of the Exclude rules.
371-
Exclude param.Field[[]AccessRuleUnionParam] `json:"exclude"`
372349
// Require this application to be served in an isolated browser for users matching
373350
// this policy. 'Client Web Isolation' must be on for the account in order to use
374351
// this feature.
@@ -380,9 +357,6 @@ type AccessApplicationPolicyUpdateParams struct {
380357
PurposeJustificationPrompt param.Field[string] `json:"purpose_justification_prompt"`
381358
// Require users to enter a justification when they log in to the application.
382359
PurposeJustificationRequired param.Field[bool] `json:"purpose_justification_required"`
383-
// Rules evaluated with an AND logical operator. To match the policy, a user must
384-
// meet all of the Require rules.
385-
Require param.Field[[]AccessRuleUnionParam] `json:"require"`
386360
// The amount of time that tokens issued for the application will be valid. Must be
387361
// in the format `300ms` or `2h45m`. Valid time units are: ns, us (or µs), ms, s,
388362
// m, h.

‎zero_trust/accessapplicationpolicy_test.go

+4-86
Original file line numberDiff line numberDiff line change
@@ -32,21 +32,6 @@ func TestAccessApplicationPolicyNewWithOptionalParams(t *testing.T) {
3232
context.TODO(),
3333
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
3434
zero_trust.AccessApplicationPolicyNewParams{
35-
Decision: cloudflare.F(zero_trust.DecisionAllow),
36-
Include: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
37-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
38-
Email: cloudflare.F("test@example.com"),
39-
}),
40-
}, zero_trust.EmailRuleParam{
41-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
42-
Email: cloudflare.F("test@example.com"),
43-
}),
44-
}, zero_trust.EmailRuleParam{
45-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
46-
Email: cloudflare.F("test@example.com"),
47-
}),
48-
}}),
49-
Name: cloudflare.F("Allow devs"),
5035
AccountID: cloudflare.F("account_id"),
5136
ApprovalGroups: cloudflare.F([]zero_trust.ApprovalGroupParam{{
5237
ApprovalsNeeded: cloudflare.F(1.000000),
@@ -57,38 +42,12 @@ func TestAccessApplicationPolicyNewWithOptionalParams(t *testing.T) {
5742
EmailAddresses: cloudflare.F([]string{"test@cloudflare.com", "test2@cloudflare.com"}),
5843
EmailListUUID: cloudflare.F("597147a1-976b-4ef2-9af0-81d5d007fc34"),
5944
}}),
60-
ApprovalRequired: cloudflare.F(true),
61-
Exclude: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
62-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
63-
Email: cloudflare.F("test@example.com"),
64-
}),
65-
}, zero_trust.EmailRuleParam{
66-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
67-
Email: cloudflare.F("test@example.com"),
68-
}),
69-
}, zero_trust.EmailRuleParam{
70-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
71-
Email: cloudflare.F("test@example.com"),
72-
}),
73-
}}),
45+
ApprovalRequired: cloudflare.F(true),
7446
IsolationRequired: cloudflare.F(false),
7547
Precedence: cloudflare.F(int64(0)),
7648
PurposeJustificationPrompt: cloudflare.F("Please enter a justification for entering this protected domain."),
7749
PurposeJustificationRequired: cloudflare.F(true),
78-
Require: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
79-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
80-
Email: cloudflare.F("test@example.com"),
81-
}),
82-
}, zero_trust.EmailRuleParam{
83-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
84-
Email: cloudflare.F("test@example.com"),
85-
}),
86-
}, zero_trust.EmailRuleParam{
87-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
88-
Email: cloudflare.F("test@example.com"),
89-
}),
90-
}}),
91-
SessionDuration: cloudflare.F("24h"),
50+
SessionDuration: cloudflare.F("24h"),
9251
},
9352
)
9453
if err != nil {
@@ -119,21 +78,6 @@ func TestAccessApplicationPolicyUpdateWithOptionalParams(t *testing.T) {
11978
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
12079
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
12180
zero_trust.AccessApplicationPolicyUpdateParams{
122-
Decision: cloudflare.F(zero_trust.DecisionAllow),
123-
Include: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
124-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
125-
Email: cloudflare.F("test@example.com"),
126-
}),
127-
}, zero_trust.EmailRuleParam{
128-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
129-
Email: cloudflare.F("test@example.com"),
130-
}),
131-
}, zero_trust.EmailRuleParam{
132-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
133-
Email: cloudflare.F("test@example.com"),
134-
}),
135-
}}),
136-
Name: cloudflare.F("Allow devs"),
13781
AccountID: cloudflare.F("account_id"),
13882
ApprovalGroups: cloudflare.F([]zero_trust.ApprovalGroupParam{{
13983
ApprovalsNeeded: cloudflare.F(1.000000),
@@ -144,38 +88,12 @@ func TestAccessApplicationPolicyUpdateWithOptionalParams(t *testing.T) {
14488
EmailAddresses: cloudflare.F([]string{"test@cloudflare.com", "test2@cloudflare.com"}),
14589
EmailListUUID: cloudflare.F("597147a1-976b-4ef2-9af0-81d5d007fc34"),
14690
}}),
147-
ApprovalRequired: cloudflare.F(true),
148-
Exclude: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
149-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
150-
Email: cloudflare.F("test@example.com"),
151-
}),
152-
}, zero_trust.EmailRuleParam{
153-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
154-
Email: cloudflare.F("test@example.com"),
155-
}),
156-
}, zero_trust.EmailRuleParam{
157-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
158-
Email: cloudflare.F("test@example.com"),
159-
}),
160-
}}),
91+
ApprovalRequired: cloudflare.F(true),
16192
IsolationRequired: cloudflare.F(false),
16293
Precedence: cloudflare.F(int64(0)),
16394
PurposeJustificationPrompt: cloudflare.F("Please enter a justification for entering this protected domain."),
16495
PurposeJustificationRequired: cloudflare.F(true),
165-
Require: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
166-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
167-
Email: cloudflare.F("test@example.com"),
168-
}),
169-
}, zero_trust.EmailRuleParam{
170-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
171-
Email: cloudflare.F("test@example.com"),
172-
}),
173-
}, zero_trust.EmailRuleParam{
174-
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
175-
Email: cloudflare.F("test@example.com"),
176-
}),
177-
}}),
178-
SessionDuration: cloudflare.F("24h"),
96+
SessionDuration: cloudflare.F("24h"),
17997
},
18098
)
18199
if err != nil {

‎zero_trust/accessapplicationpolicytest_test.go

+3-17
Original file line numberDiff line numberDiff line change
@@ -30,18 +30,8 @@ func TestAccessApplicationPolicyTestNewWithOptionalParams(t *testing.T) {
3030
_, err := client.ZeroTrust.Access.Applications.PolicyTests.New(context.TODO(), zero_trust.AccessApplicationPolicyTestNewParams{
3131
AccountID: cloudflare.F("023e105f4ecef8ad9ca31a8372d0c353"),
3232
ApplicationPolicy: zero_trust.ApplicationPolicyParam{
33-
ID: cloudflare.F("f174e90a-fafe-4643-bbbc-4a0ed4fc8415"),
34-
ApprovalGroups: cloudflare.F([]zero_trust.ApprovalGroupParam{{
35-
ApprovalsNeeded: cloudflare.F(1.000000),
36-
EmailAddresses: cloudflare.F([]string{"test1@cloudflare.com", "test2@cloudflare.com"}),
37-
EmailListUUID: cloudflare.F("email_list_uuid"),
38-
}, {
39-
ApprovalsNeeded: cloudflare.F(3.000000),
40-
EmailAddresses: cloudflare.F([]string{"test@cloudflare.com", "test2@cloudflare.com"}),
41-
EmailListUUID: cloudflare.F("597147a1-976b-4ef2-9af0-81d5d007fc34"),
42-
}}),
43-
ApprovalRequired: cloudflare.F(true),
44-
Decision: cloudflare.F(zero_trust.DecisionAllow),
33+
ID: cloudflare.F("f174e90a-fafe-4643-bbbc-4a0ed4fc8415"),
34+
Decision: cloudflare.F(zero_trust.DecisionAllow),
4535
Exclude: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
4636
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
4737
Email: cloudflare.F("test@example.com"),
@@ -68,10 +58,7 @@ func TestAccessApplicationPolicyTestNewWithOptionalParams(t *testing.T) {
6858
Email: cloudflare.F("test@example.com"),
6959
}),
7060
}}),
71-
IsolationRequired: cloudflare.F(false),
72-
Name: cloudflare.F("Allow devs"),
73-
PurposeJustificationPrompt: cloudflare.F("Please enter a justification for entering this protected domain."),
74-
PurposeJustificationRequired: cloudflare.F(true),
61+
Name: cloudflare.F("Allow devs"),
7562
Require: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
7663
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
7764
Email: cloudflare.F("test@example.com"),
@@ -85,7 +72,6 @@ func TestAccessApplicationPolicyTestNewWithOptionalParams(t *testing.T) {
8572
Email: cloudflare.F("test@example.com"),
8673
}),
8774
}}),
88-
SessionDuration: cloudflare.F("24h"),
8975
},
9076
})
9177
if err != nil {

‎zero_trust/accesspolicy.go

+72-296
Large diffs are not rendered by default.

‎zero_trust/accesspolicy_test.go

-28
Original file line numberDiff line numberDiff line change
@@ -44,16 +44,6 @@ func TestAccessPolicyNewWithOptionalParams(t *testing.T) {
4444
}),
4545
}}),
4646
Name: cloudflare.F("Allow devs"),
47-
ApprovalGroups: cloudflare.F([]zero_trust.ApprovalGroupParam{{
48-
ApprovalsNeeded: cloudflare.F(1.000000),
49-
EmailAddresses: cloudflare.F([]string{"test1@cloudflare.com", "test2@cloudflare.com"}),
50-
EmailListUUID: cloudflare.F("email_list_uuid"),
51-
}, {
52-
ApprovalsNeeded: cloudflare.F(3.000000),
53-
EmailAddresses: cloudflare.F([]string{"test@cloudflare.com", "test2@cloudflare.com"}),
54-
EmailListUUID: cloudflare.F("597147a1-976b-4ef2-9af0-81d5d007fc34"),
55-
}}),
56-
ApprovalRequired: cloudflare.F(true),
5747
Exclude: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
5848
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
5949
Email: cloudflare.F("test@example.com"),
@@ -67,9 +57,6 @@ func TestAccessPolicyNewWithOptionalParams(t *testing.T) {
6757
Email: cloudflare.F("test@example.com"),
6858
}),
6959
}}),
70-
IsolationRequired: cloudflare.F(false),
71-
PurposeJustificationPrompt: cloudflare.F("Please enter a justification for entering this protected domain."),
72-
PurposeJustificationRequired: cloudflare.F(true),
7360
Require: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
7461
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
7562
Email: cloudflare.F("test@example.com"),
@@ -83,7 +70,6 @@ func TestAccessPolicyNewWithOptionalParams(t *testing.T) {
8370
Email: cloudflare.F("test@example.com"),
8471
}),
8572
}}),
86-
SessionDuration: cloudflare.F("24h"),
8773
})
8874
if err != nil {
8975
var apierr *cloudflare.Error
@@ -127,16 +113,6 @@ func TestAccessPolicyUpdateWithOptionalParams(t *testing.T) {
127113
}),
128114
}}),
129115
Name: cloudflare.F("Allow devs"),
130-
ApprovalGroups: cloudflare.F([]zero_trust.ApprovalGroupParam{{
131-
ApprovalsNeeded: cloudflare.F(1.000000),
132-
EmailAddresses: cloudflare.F([]string{"test1@cloudflare.com", "test2@cloudflare.com"}),
133-
EmailListUUID: cloudflare.F("email_list_uuid"),
134-
}, {
135-
ApprovalsNeeded: cloudflare.F(3.000000),
136-
EmailAddresses: cloudflare.F([]string{"test@cloudflare.com", "test2@cloudflare.com"}),
137-
EmailListUUID: cloudflare.F("597147a1-976b-4ef2-9af0-81d5d007fc34"),
138-
}}),
139-
ApprovalRequired: cloudflare.F(true),
140116
Exclude: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
141117
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
142118
Email: cloudflare.F("test@example.com"),
@@ -150,9 +126,6 @@ func TestAccessPolicyUpdateWithOptionalParams(t *testing.T) {
150126
Email: cloudflare.F("test@example.com"),
151127
}),
152128
}}),
153-
IsolationRequired: cloudflare.F(false),
154-
PurposeJustificationPrompt: cloudflare.F("Please enter a justification for entering this protected domain."),
155-
PurposeJustificationRequired: cloudflare.F(true),
156129
Require: cloudflare.F([]zero_trust.AccessRuleUnionParam{zero_trust.EmailRuleParam{
157130
Email: cloudflare.F(zero_trust.EmailRuleEmailParam{
158131
Email: cloudflare.F("test@example.com"),
@@ -166,7 +139,6 @@ func TestAccessPolicyUpdateWithOptionalParams(t *testing.T) {
166139
Email: cloudflare.F("test@example.com"),
167140
}),
168141
}}),
169-
SessionDuration: cloudflare.F("24h"),
170142
},
171143
)
172144
if err != nil {

0 commit comments

Comments
 (0)
Please sign in to comment.