Skip to content

Commit 3ebfbb2

Browse files
feat: chore(abuse_report): unsupported auth scheme
* chore(zero_trust_gateway_proxy_endpoint): unsupported auth scheme * chore(abuse_report): unsupported auth scheme
1 parent a9c3932 commit 3ebfbb2

File tree

3 files changed

+13
-7
lines changed

3 files changed

+13
-7
lines changed

.stats.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 1924
22
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-6183ef87f1b8eea6ad4bae542bfde2ec23a5526ae2b7bacdf6c6a4c48d990995.yml
33
openapi_spec_hash: 9c8ac3d56571ebf1e170d993b71ccb4d
4-
config_hash: 745cc9ff3958fe0add73c24590ca0864
4+
config_hash: aaacea52b646facd5527d7b1e928123d

tests/api-resources/abuse-reports/mitigations.test.ts

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ const client = new Cloudflare({
1010
});
1111

1212
describe('resource mitigations', () => {
13-
test('list: only required params', async () => {
13+
// TODO: support api token auth scheme
14+
test.skip('list: only required params', async () => {
1415
const responsePromise = client.abuseReports.mitigations.list('report_id', {
1516
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
1617
});
@@ -23,7 +24,8 @@ describe('resource mitigations', () => {
2324
expect(dataAndResponse.response).toBe(rawResponse);
2425
});
2526

26-
test('list: required and optional params', async () => {
27+
// TODO: support api token auth scheme
28+
test.skip('list: required and optional params', async () => {
2729
const response = await client.abuseReports.mitigations.list('report_id', {
2830
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
2931
effective_after: '2009-11-10T23:00:00Z',
@@ -37,7 +39,8 @@ describe('resource mitigations', () => {
3739
});
3840
});
3941

40-
test('review: only required params', async () => {
42+
// TODO: support api token auth scheme
43+
test.skip('review: only required params', async () => {
4144
const responsePromise = client.abuseReports.mitigations.review('report_id', {
4245
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
4346
appeals: [{ id: 'id', reason: 'misclassified' }],
@@ -51,7 +54,8 @@ describe('resource mitigations', () => {
5154
expect(dataAndResponse.response).toBe(rawResponse);
5255
});
5356

54-
test('review: required and optional params', async () => {
57+
// TODO: support api token auth scheme
58+
test.skip('review: required and optional params', async () => {
5559
const response = await client.abuseReports.mitigations.review('report_id', {
5660
account_id: '023e105f4ecef8ad9ca31a8372d0c353',
5761
appeals: [{ id: 'id', reason: 'misclassified' }],

tests/api-resources/zero-trust/gateway/proxy-endpoints.test.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ const client = new Cloudflare({
1010
});
1111

1212
describe('resource proxyEndpoints', () => {
13-
test('create: only required params', async () => {
13+
// TODO: 422 Unprocessable Entity error
14+
test.skip('create: only required params', async () => {
1415
const responsePromise = client.zeroTrust.gateway.proxyEndpoints.create({
1516
account_id: '699d98642c564d2e855e9661899b7252',
1617
name: 'Devops team',
@@ -24,7 +25,8 @@ describe('resource proxyEndpoints', () => {
2425
expect(dataAndResponse.response).toBe(rawResponse);
2526
});
2627

27-
test('create: required and optional params', async () => {
28+
// TODO: 422 Unprocessable Entity error
29+
test.skip('create: required and optional params', async () => {
2830
const response = await client.zeroTrust.gateway.proxyEndpoints.create({
2931
account_id: '699d98642c564d2e855e9661899b7252',
3032
name: 'Devops team',

0 commit comments

Comments
 (0)