Skip to content

Commit 146459d

Browse files
chore(api): update composite API spec
1 parent 1e9c242 commit 146459d

12 files changed

Lines changed: 165 additions & 34 deletions

File tree

.stats.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 2020
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-2b935132316d46fe098e11238cf09f7861e29754870e6775c31d53108b357a35.yml
3-
openapi_spec_hash: 3c786e10f8e2cea0b76e820dbd848eab
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-3bcd5973c2baae10ef49b19c7928b0a5c762f4a6e755f56c2d62c26b54083398.yml
3+
openapi_spec_hash: df51921c4c4f3e4a9797751252db0538
44
config_hash: a4197f3e022bd501a828d1252b76e06e

src/cloudflare/resources/magic_cloud_networking/on_ramps/on_ramps.py

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -112,11 +112,10 @@ def create(
112112
Create a new On-ramp (Closed Beta).
113113
114114
Args:
115-
dynamic_routing: if set to true, install_routes_in_cloud and install_routes_in_magic_wan should
116-
be set to false
115+
dynamic_routing: Enables BGP routing. When enabling this feature, set both
116+
install_routes_in_cloud and install_routes_in_magic_wan to false.
117117
118-
cloud_asn: the ASN to use on the cloud side. If unset or zero, the cloud's default will be
119-
used.
118+
cloud_asn: Sets the cloud-side ASN. If unset or zero, the cloud's default ASN takes effect.
120119
121120
extra_headers: Send extra headers
122121
@@ -608,11 +607,10 @@ async def create(
608607
Create a new On-ramp (Closed Beta).
609608
610609
Args:
611-
dynamic_routing: if set to true, install_routes_in_cloud and install_routes_in_magic_wan should
612-
be set to false
610+
dynamic_routing: Enables BGP routing. When enabling this feature, set both
611+
install_routes_in_cloud and install_routes_in_magic_wan to false.
613612
614-
cloud_asn: the ASN to use on the cloud side. If unset or zero, the cloud's default will be
615-
used.
613+
cloud_asn: Sets the cloud-side ASN. If unset or zero, the cloud's default ASN takes effect.
616614
617615
extra_headers: Send extra headers
618616

src/cloudflare/resources/origin_ca_certificates.py

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,14 @@ def create(
7171
Args:
7272
csr: The Certificate Signing Request (CSR). Must be newline-encoded.
7373
74-
hostnames: Array of hostnames or wildcard names (e.g., \\**.example.com) bound to the
75-
certificate.
74+
hostnames: Array of hostnames or wildcard names bound to the certificate. Hostnames must be
75+
fully qualified domain names (FQDNs) belonging to zones on your account (e.g.,
76+
`example.com` or `sub.example.com`). Wildcards are supported only as a `*.`
77+
prefix for a single level (e.g., `*.example.com`). Double wildcards
78+
(`*.*.example.com`) and interior wildcards (`foo.*.example.com`) are not
79+
allowed. The wildcard suffix must be a multi-label domain (`*.example.com` is
80+
valid, but `*.com` is not). Unicode/IDN hostnames are accepted and automatically
81+
converted to punycode.
7682
7783
request_type: Signature type desired on certificate ("origin-rsa" (rsa), "origin-ecc" (ecdsa),
7884
or "keyless-certificate" (for Keyless SSL servers).
@@ -299,8 +305,14 @@ async def create(
299305
Args:
300306
csr: The Certificate Signing Request (CSR). Must be newline-encoded.
301307
302-
hostnames: Array of hostnames or wildcard names (e.g., \\**.example.com) bound to the
303-
certificate.
308+
hostnames: Array of hostnames or wildcard names bound to the certificate. Hostnames must be
309+
fully qualified domain names (FQDNs) belonging to zones on your account (e.g.,
310+
`example.com` or `sub.example.com`). Wildcards are supported only as a `*.`
311+
prefix for a single level (e.g., `*.example.com`). Double wildcards
312+
(`*.*.example.com`) and interior wildcards (`foo.*.example.com`) are not
313+
allowed. The wildcard suffix must be a multi-label domain (`*.example.com` is
314+
valid, but `*.com` is not). Unicode/IDN hostnames are accepted and automatically
315+
converted to punycode.
304316
305317
request_type: Signature type desired on certificate ("origin-rsa" (rsa), "origin-ecc" (ecdsa),
306318
or "keyless-certificate" (for Keyless SSL servers).

src/cloudflare/resources/zero_trust/dlp/payload_logs.py

Lines changed: 57 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
from __future__ import annotations
44

55
from typing import Type, Optional, cast
6+
from typing_extensions import Literal
67

78
import httpx
89

@@ -49,6 +50,7 @@ def update(
4950
self,
5051
*,
5152
account_id: str,
53+
masking_level: Literal["full", "partial", "clear", "default"] | Omit = omit,
5254
public_key: Optional[str] | Omit = omit,
5355
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
5456
# The extra values given here take precedence over values defined on the client or passed to this method.
@@ -61,6 +63,27 @@ def update(
6163
Set payload log settings
6264
6365
Args:
66+
masking_level: Masking level for payload logs.
67+
68+
- `full`: The entire payload is masked.
69+
- `partial`: Only partial payload content is masked.
70+
- `clear`: No masking is applied to the payload content.
71+
- `default`: DLP uses its default masking behavior.
72+
73+
public_key: Base64-encoded public key for encrypting payload logs.
74+
75+
- Set to null or empty string to disable payload logging.
76+
- Set to a non-empty base64 string to enable payload logging with the given key.
77+
78+
For customers with configurable payload masking feature rolled out:
79+
80+
- If the field is missing, the existing setting will be kept. Note that this is
81+
different from setting to null or empty string.
82+
83+
For all other customers:
84+
85+
- If the field is missing, the existing setting will be cleared.
86+
6487
extra_headers: Send extra headers
6588
6689
extra_query: Add additional query parameters to the request
@@ -73,7 +96,13 @@ def update(
7396
raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}")
7497
return self._put(
7598
f"/accounts/{account_id}/dlp/payload_log",
76-
body=maybe_transform({"public_key": public_key}, payload_log_update_params.PayloadLogUpdateParams),
99+
body=maybe_transform(
100+
{
101+
"masking_level": masking_level,
102+
"public_key": public_key,
103+
},
104+
payload_log_update_params.PayloadLogUpdateParams,
105+
),
77106
options=make_request_options(
78107
extra_headers=extra_headers,
79108
extra_query=extra_query,
@@ -146,6 +175,7 @@ async def update(
146175
self,
147176
*,
148177
account_id: str,
178+
masking_level: Literal["full", "partial", "clear", "default"] | Omit = omit,
149179
public_key: Optional[str] | Omit = omit,
150180
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
151181
# The extra values given here take precedence over values defined on the client or passed to this method.
@@ -158,6 +188,27 @@ async def update(
158188
Set payload log settings
159189
160190
Args:
191+
masking_level: Masking level for payload logs.
192+
193+
- `full`: The entire payload is masked.
194+
- `partial`: Only partial payload content is masked.
195+
- `clear`: No masking is applied to the payload content.
196+
- `default`: DLP uses its default masking behavior.
197+
198+
public_key: Base64-encoded public key for encrypting payload logs.
199+
200+
- Set to null or empty string to disable payload logging.
201+
- Set to a non-empty base64 string to enable payload logging with the given key.
202+
203+
For customers with configurable payload masking feature rolled out:
204+
205+
- If the field is missing, the existing setting will be kept. Note that this is
206+
different from setting to null or empty string.
207+
208+
For all other customers:
209+
210+
- If the field is missing, the existing setting will be cleared.
211+
161212
extra_headers: Send extra headers
162213
163214
extra_query: Add additional query parameters to the request
@@ -171,7 +222,11 @@ async def update(
171222
return await self._put(
172223
f"/accounts/{account_id}/dlp/payload_log",
173224
body=await async_maybe_transform(
174-
{"public_key": public_key}, payload_log_update_params.PayloadLogUpdateParams
225+
{
226+
"masking_level": masking_level,
227+
"public_key": public_key,
228+
},
229+
payload_log_update_params.PayloadLogUpdateParams,
175230
),
176231
options=make_request_options(
177232
extra_headers=extra_headers,

src/cloudflare/types/magic_cloud_networking/on_ramp_create_params.py

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,10 @@ class OnRampCreateParams(TypedDict, total=False):
1515
cloud_type: Required[Literal["AWS", "AZURE", "GOOGLE"]]
1616

1717
dynamic_routing: Required[bool]
18-
"""
19-
if set to true, install_routes_in_cloud and install_routes_in_magic_wan should
20-
be set to false
18+
"""Enables BGP routing.
19+
20+
When enabling this feature, set both install_routes_in_cloud and
21+
install_routes_in_magic_wan to false.
2122
"""
2223

2324
install_routes_in_cloud: Required[bool]
@@ -35,9 +36,9 @@ class OnRampCreateParams(TypedDict, total=False):
3536
attached_vpcs: SequenceNotStr[str]
3637

3738
cloud_asn: int
38-
"""the ASN to use on the cloud side.
39+
"""Sets the cloud-side ASN.
3940
40-
If unset or zero, the cloud's default will be used.
41+
If unset or zero, the cloud's default ASN takes effect.
4142
"""
4243

4344
description: str

src/cloudflare/types/origin_ca_certificates/origin_ca_certificate.py

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,14 @@ class OriginCACertificate(BaseModel):
1515

1616
hostnames: List[str]
1717
"""
18-
Array of hostnames or wildcard names (e.g., \\**.example.com) bound to the
19-
certificate.
18+
Array of hostnames or wildcard names bound to the certificate. Hostnames must be
19+
fully qualified domain names (FQDNs) belonging to zones on your account (e.g.,
20+
`example.com` or `sub.example.com`). Wildcards are supported only as a `*.`
21+
prefix for a single level (e.g., `*.example.com`). Double wildcards
22+
(`*.*.example.com`) and interior wildcards (`foo.*.example.com`) are not
23+
allowed. The wildcard suffix must be a multi-label domain (`*.example.com` is
24+
valid, but `*.com` is not). Unicode/IDN hostnames are accepted and automatically
25+
converted to punycode.
2026
"""
2127

2228
request_type: CertificateRequestType

src/cloudflare/types/origin_ca_certificates/origin_ca_certificate_create_params.py

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,14 @@ class OriginCACertificateCreateParams(TypedDict, total=False):
1717

1818
hostnames: Required[SequenceNotStr[str]]
1919
"""
20-
Array of hostnames or wildcard names (e.g., \\**.example.com) bound to the
21-
certificate.
20+
Array of hostnames or wildcard names bound to the certificate. Hostnames must be
21+
fully qualified domain names (FQDNs) belonging to zones on your account (e.g.,
22+
`example.com` or `sub.example.com`). Wildcards are supported only as a `*.`
23+
prefix for a single level (e.g., `*.example.com`). Double wildcards
24+
(`*.*.example.com`) and interior wildcards (`foo.*.example.com`) are not
25+
allowed. The wildcard suffix must be a multi-label domain (`*.example.com` is
26+
valid, but `*.com` is not). Unicode/IDN hostnames are accepted and automatically
27+
converted to punycode.
2228
"""
2329

2430
request_type: Required[CertificateRequestType]

src/cloudflare/types/zero_trust/dlp/payload_log_get_response.py

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,27 @@
22

33
from typing import Optional
44
from datetime import datetime
5+
from typing_extensions import Literal
56

67
from ...._models import BaseModel
78

89
__all__ = ["PayloadLogGetResponse"]
910

1011

1112
class PayloadLogGetResponse(BaseModel):
13+
masking_level: Literal["full", "partial", "clear", "default"]
14+
"""Masking level for payload logs.
15+
16+
- `full`: The entire payload is masked.
17+
- `partial`: Only partial payload content is masked.
18+
- `clear`: No masking is applied to the payload content.
19+
- `default`: DLP uses its default masking behavior.
20+
"""
21+
1222
updated_at: datetime
1323

1424
public_key: Optional[str] = None
25+
"""Base64-encoded public key for encrypting payload logs.
26+
27+
Null when payload logging is disabled.
28+
"""

src/cloudflare/types/zero_trust/dlp/payload_log_update_params.py

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,35 @@
33
from __future__ import annotations
44

55
from typing import Optional
6-
from typing_extensions import Required, TypedDict
6+
from typing_extensions import Literal, Required, TypedDict
77

88
__all__ = ["PayloadLogUpdateParams"]
99

1010

1111
class PayloadLogUpdateParams(TypedDict, total=False):
1212
account_id: Required[str]
1313

14+
masking_level: Literal["full", "partial", "clear", "default"]
15+
"""Masking level for payload logs.
16+
17+
- `full`: The entire payload is masked.
18+
- `partial`: Only partial payload content is masked.
19+
- `clear`: No masking is applied to the payload content.
20+
- `default`: DLP uses its default masking behavior.
21+
"""
22+
1423
public_key: Optional[str]
24+
"""Base64-encoded public key for encrypting payload logs.
25+
26+
- Set to null or empty string to disable payload logging.
27+
- Set to a non-empty base64 string to enable payload logging with the given key.
28+
29+
For customers with configurable payload masking feature rolled out:
30+
31+
- If the field is missing, the existing setting will be kept. Note that this is
32+
different from setting to null or empty string.
33+
34+
For all other customers:
35+
36+
- If the field is missing, the existing setting will be cleared.
37+
"""

src/cloudflare/types/zero_trust/dlp/payload_log_update_response.py

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,27 @@
22

33
from typing import Optional
44
from datetime import datetime
5+
from typing_extensions import Literal
56

67
from ...._models import BaseModel
78

89
__all__ = ["PayloadLogUpdateResponse"]
910

1011

1112
class PayloadLogUpdateResponse(BaseModel):
13+
masking_level: Literal["full", "partial", "clear", "default"]
14+
"""Masking level for payload logs.
15+
16+
- `full`: The entire payload is masked.
17+
- `partial`: Only partial payload content is masked.
18+
- `clear`: No masking is applied to the payload content.
19+
- `default`: DLP uses its default masking behavior.
20+
"""
21+
1222
updated_at: datetime
1323

1424
public_key: Optional[str] = None
25+
"""Base64-encoded public key for encrypting payload logs.
26+
27+
Null when payload logging is disabled.
28+
"""

0 commit comments

Comments
 (0)