Skip to content

release: 6.0.0-beta.2#2715

Closed
stainless-app[bot] wants to merge 8 commits intomainfrom
release-please--branches--main--changes--next--components--cloudflare
Closed

release: 6.0.0-beta.2#2715
stainless-app[bot] wants to merge 8 commits intomainfrom
release-please--branches--main--changes--next--components--cloudflare

Conversation

@stainless-app
Copy link
Contributor

@stainless-app stainless-app bot commented Jan 26, 2026

Automated Release PR

6.0.0-beta.2 (2026-01-26)

Full Changelog: v6.0.0-beta.1...v6.0.0-beta.2

Features

  • feat(fraud): public docs for fraud API (dac4aa5)
  • refactor(terraform): restructure origin_tls_client_auth to peer subresources (89f79e9)

Bug Fixes

Chores

  • api: update composite API spec (ffa2c6c)
  • internal: codegen related update (cb76fc9)

This pull request is managed by Stainless's GitHub App.

The semver version number is based on included commit messages. Alternatively, you can manually set the version number in the title of this pull request.

For a better experience, it is recommended to use either rebase-merge or squash-merge when merging this pull request.

🔗 Stainless website
📚 Read the docs
🙋 Reach out for help or questions

* feat(fraud): public docs for fraud API
… subresources

* fix: add backward-compatible methods for origin_tls_client_auth

Adds deprecated parent-level methods (list, get, create, delete) to maintain
backward compatibility with existing SDK users while preserving the clean
cache-style resource structure.

Changes:
- Add 4 deprecated methods at parent level pointing to zone cert endpoints
- Methods generate client.OriginTLSClientAuth.New/List/Get/Delete() paths
- Deprecation messages guide users to zone_certificates.* subresource
- Zero breaking changes - existing SDK code continues to work
- New explicit paths available at ZoneCertificates.* and HostnameCertificates.*

This follows the proven KV namespace dual-path pattern (lines 2730-2752)
where the same endpoint generates methods at both parent and child levels.

Related: SECENG-12971

* refactor(terraform): restructure origin_tls_client_auth to peer subresources

Restructure origin_tls_client_auth to have all 4 terraform resources as sibling subresources:
- zone_certificates → authenticated_origin_pulls_certificate
- hostnames → authenticated_origin_pulls
- hostname_certificates → authenticated_origin_pulls_hostname_certificate
- settings → authenticated_origin_pulls_settings

Add id_property annotations to all CRUD methods.

Closes SECENG-12971, SECENG-12970, SECENG-13210
Comment on lines +10 to +36
runs-on: 'ubuntu-latest'
name: detect-breaking-changes
if: github.repository == 'cloudflare/cloudflare-typescript'
steps:
- name: Calculate fetch-depth
run: |
echo "FETCH_DEPTH=$(expr ${{ github.event.pull_request.commits }} + 1)" >> $GITHUB_ENV

- uses: actions/checkout@v6
with:
# Ensure we can check out the pull request base in the script below.
fetch-depth: ${{ env.FETCH_DEPTH }}

- name: Set up Node
uses: actions/setup-node@v3
with:
node-version: '20'
- name: Install dependencies
run: |
yarn install

- name: Detect breaking changes
run: |
# Try to check out previous versions of the breaking change detection script. This ensures that
# we still detect breaking changes when entire files and their tests are removed.
git checkout "${{ github.event.pull_request.base.sha }}" -- ./scripts/detect-breaking-changes 2>/dev/null || true
./scripts/detect-breaking-changes ${{ github.event.pull_request.base.sha }}

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI about 1 month ago

At a high level, the fix is to add an explicit permissions block to the workflow or to the specific job, limiting the GITHUB_TOKEN to the minimal scopes needed. For this job, based on the shown steps (checkout, install, run a detection script using local git history), the minimal safe starting point is contents: read. This aligns with GitHub’s recommendation and the CodeQL suggestion.

The best fix with minimal behavior change is to add a job-level permissions section under detect_breaking_changes, right alongside runs-on and name. That way, only this job is affected, and other jobs (if any, not shown) remain unchanged. We will set:

permissions:
  contents: read

No other changes to steps, actions versions, or logic are required. Concretely, in .github/workflows/detect-breaking-changes.yml, between line 10 (runs-on: 'ubuntu-latest') and line 11 (name: detect-breaking-changes), we will insert the permissions block indented two spaces to align with other job keys. No imports or additional methods are needed since this is a YAML configuration change only.

Suggested changeset 1
.github/workflows/detect-breaking-changes.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/detect-breaking-changes.yml b/.github/workflows/detect-breaking-changes.yml
--- a/.github/workflows/detect-breaking-changes.yml
+++ b/.github/workflows/detect-breaking-changes.yml
@@ -8,6 +8,8 @@
 jobs:
   detect_breaking_changes:
     runs-on: 'ubuntu-latest'
+    permissions:
+      contents: read
     name: detect-breaking-changes
     if: github.repository == 'cloudflare/cloudflare-typescript'
     steps:
EOF
@@ -8,6 +8,8 @@
jobs:
detect_breaking_changes:
runs-on: 'ubuntu-latest'
permissions:
contents: read
name: detect-breaking-changes
if: github.repository == 'cloudflare/cloudflare-typescript'
steps:
Copilot is powered by AI and may make mistakes. Always verify output.
@stainless-app stainless-app bot closed this Jan 26, 2026
@stainless-app stainless-app bot deleted the release-please--branches--main--changes--next--components--cloudflare branch January 26, 2026 22:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants