Skip to content

Commit 9f0c410

Browse files
chore(api): update composite API spec
1 parent 3836b7d commit 9f0c410

File tree

4 files changed

+12
-2
lines changed

4 files changed

+12
-2
lines changed

.stats.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 1822
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-7016e83aabf7646a81ac5ee22178d062ad96ad78cba4d0051dbe5962154b3df8.yml
3-
openapi_spec_hash: cfaf36e9bd5a4d71172862f4c24a9474
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-b617f9718d3ccc35e9466e0b4c12e206c9d4340dbdb9a7cbb713251a98515298.yml
3+
openapi_spec_hash: d787bb73f0ed8c3ac73aa92921564b52
44
config_hash: 107e0f1f8a98b007260b319226b88b3c

src/cloudflare/types/alerting/policy_filter.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,9 @@ class PolicyFilter(BaseModel):
135135
tunnel_name: Optional[List[str]] = None
136136
"""Usage depends on specific alert type"""
137137

138+
type: Optional[List[str]] = None
139+
"""Usage depends on specific alert type"""
140+
138141
where: Optional[List[str]] = None
139142
"""Usage depends on specific alert type"""
140143

src/cloudflare/types/alerting/policy_filter_param.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,9 @@ class PolicyFilterParam(TypedDict, total=False):
133133
tunnel_name: SequenceNotStr[str]
134134
"""Usage depends on specific alert type"""
135135

136+
type: SequenceNotStr[str]
137+
"""Usage depends on specific alert type"""
138+
136139
where: SequenceNotStr[str]
137140
"""Usage depends on specific alert type"""
138141

tests/api_resources/alerting/test_policies.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None:
9595
"traffic_exclusions": ["security_events"],
9696
"tunnel_id": ["string"],
9797
"tunnel_name": ["string"],
98+
"type": ["string"],
9899
"where": ["string"],
99100
"zones": ["string"],
100101
},
@@ -217,6 +218,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None:
217218
"traffic_exclusions": ["security_events"],
218219
"tunnel_id": ["string"],
219220
"tunnel_name": ["string"],
221+
"type": ["string"],
220222
"where": ["string"],
221223
"zones": ["string"],
222224
},
@@ -502,6 +504,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare
502504
"traffic_exclusions": ["security_events"],
503505
"tunnel_id": ["string"],
504506
"tunnel_name": ["string"],
507+
"type": ["string"],
505508
"where": ["string"],
506509
"zones": ["string"],
507510
},
@@ -624,6 +627,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare
624627
"traffic_exclusions": ["security_events"],
625628
"tunnel_id": ["string"],
626629
"tunnel_name": ["string"],
630+
"type": ["string"],
627631
"where": ["string"],
628632
"zones": ["string"],
629633
},

0 commit comments

Comments
 (0)