Skip to content

Commit

Permalink
chore(internal): codegen related update (#4950)
Browse files Browse the repository at this point in the history
  • Loading branch information
stainless-app[bot] committed Jan 28, 2025
1 parent 36be47b commit d0e7513
Show file tree
Hide file tree
Showing 16 changed files with 3 additions and 33 deletions.
5 changes: 0 additions & 5 deletions examples/resources/cloudflare_account_token/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,22 +2,17 @@ resource "cloudflare_account_token" "example_account_token" {
account_id = "eb78d65290b24279ba6f44721b3ea3c4"
name = "readonly token"
policies = [{
id = "f267e341f3dd4697bd3b9f71dd96247f"
effect = "allow"
permission_groups = [{
id = "c8fed203ed3043cba015a93ad1616f1f"
meta = {
key = "key"
value = "value"
}
name = "Zone Read"
}, {
id = "82e64a83756745bbbb1c9c2701bf816b"
meta = {
key = "key"
value = "value"
}
name = "Magic Network Monitoring"
}]
resources = {
"com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*"
Expand Down
2 changes: 0 additions & 2 deletions examples/resources/cloudflare_address_map/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,6 @@ resource "cloudflare_address_map" "example_address_map" {
enabled = true
ips = ["192.0.2.1"]
memberships = [{
can_delete = true
created_at = "2014-01-01T05:20:00.12345Z"
identifier = "023e105f4ecef8ad9ca31a8372d0c353"
kind = "zone"
}]
Expand Down
5 changes: 0 additions & 5 deletions examples/resources/cloudflare_api_token/resource.tf
Original file line number Diff line number Diff line change
@@ -1,22 +1,17 @@
resource "cloudflare_api_token" "example_api_token" {
name = "readonly token"
policies = [{
id = "f267e341f3dd4697bd3b9f71dd96247f"
effect = "allow"
permission_groups = [{
id = "c8fed203ed3043cba015a93ad1616f1f"
meta = {
key = "key"
value = "value"
}
name = "Zone Read"
}, {
id = "82e64a83756745bbbb1c9c2701bf816b"
meta = {
key = "key"
value = "value"
}
name = "Magic Network Monitoring"
}]
resources = {
"com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*"
Expand Down
1 change: 0 additions & 1 deletion examples/resources/cloudflare_firewall_rule/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ resource "cloudflare_firewall_rule" "example_firewall_rule" {
timeout = 86400
}
filter = {
id = "372e67954025e0ba6aaa6d586b9e0b61"
description = "Restrict access from these browsers on this address range."
expression = "(http.request.uri.path ~ \".*wp-login.php\" or http.request.uri.path ~ \".*xmlrpc.php\") and ip.addr ne 172.16.22.155"
paused = false
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ resource "cloudflare_hyperdrive_config" "example_hyperdrive_config" {
origin = {
database = "postgres"
host = "database.example.com"
password = "password"
port = 5432
scheme = "postgres"
user = "postgres"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ resource "cloudflare_load_balancer_pool" "example_load_balancer_pool" {
name = "primary-dc-1"
origins = [{
address = "0.0.0.0"
disabled_at = "2019-12-27T18:11:19.117Z"
enabled = true
header = {
host = ["example.com"]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ resource "cloudflare_magic_wan_ipsec_tunnel" "example_magic_wan_ipsec_tunnel" {
enabled = true
rate = "low"
target = {
effective = "203.0.113.1"
saved = "203.0.113.1"
}
type = "reply"
Expand Down
4 changes: 0 additions & 4 deletions examples/resources/cloudflare_managed_transforms/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,9 @@ resource "cloudflare_managed_transforms" "example_managed_transforms" {
managed_request_headers = [{
id = "add_bot_protection_headers"
enabled = true
has_conflict = false
conflicts_with = ["add_true_client_ip_headers"]
}]
managed_response_headers = [{
id = "add_security_headers"
enabled = true
has_conflict = false
conflicts_with = ["add_true_client_ip_headers"]
}]
}
4 changes: 2 additions & 2 deletions examples/resources/cloudflare_notification_policy/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,10 +7,10 @@ resource "cloudflare_notification_policy" "example_notification_policy" {
id = "[email protected]"
}]
pagerduty = [{
id = "e8133a15-00a4-4d69-aec1-32f70c51f6e5"

}]
webhooks = [{
id = "14cc1190-5d2b-4b98-a696-c424cb2ad05f"

}]
}
name = "SSL Notification Event Policy"
Expand Down
1 change: 0 additions & 1 deletion examples/resources/cloudflare_ruleset/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,6 @@ resource "cloudflare_ruleset" "example_ruleset" {
status_code = 400
}
}
categories = ["directory-traversal", "header"]
description = "Block when the IP address is not 1.1.1.1"
enabled = true
exposed_credential_check = {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,6 @@ resource "cloudflare_workers_cron_trigger" "example_workers_cron_trigger" {
account_id = "023e105f4ecef8ad9ca31a8372d0c353"
script_name = "this-is_my_script-01"
body = [{
created_on = "created_on"
cron = "*/30 * * * *"
modified_on = "modified_on"
}]
}
1 change: 0 additions & 1 deletion examples/resources/cloudflare_workers_script/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,6 @@ resource "cloudflare_workers_script" "example_workers_script" {
}
placement = {
mode = "smart"
status = "SUCCESS"
}
tags = ["string"]
tail_consumers = [{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,9 +15,7 @@ resource "cloudflare_zero_trust_access_identity_provider" "example_zero_trust_ac
scim_config = {
enabled = true
identity_update_behavior = "automatic"
scim_base_url = "scim_base_url"
seat_deprovision = true
secret = "secret"
user_deprovision = true
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -38,8 +38,6 @@ resource "cloudflare_zero_trust_gateway_settings" "example_zero_trust_gateway_se
custom_certificate = {
enabled = true
id = "d1b364c5-1311-466e-a194-f0e943e0799f"
binding_status = "pending_deployment"
updated_at = "2019-12-27T18:11:19.117Z"
}
extended_email_matching = {
enabled = true
Expand Down
1 change: 0 additions & 1 deletion examples/resources/cloudflare_zero_trust_list/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ resource "cloudflare_zero_trust_list" "example_zero_trust_list" {
type = "SERIAL"
description = "The serial numbers for administrators"
items = [{
created_at = "2014-01-01T05:20:00.12345Z"
description = "Austin office IP"
value = "8GE8721REF"
}]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,8 +47,5 @@ resource "cloudflare_zero_trust_tunnel_cloudflared_config" "example_zero_trust_t
tcp_keep_alive = 0
tls_timeout = 0
}
warp_routing = {
enabled = true
}
}
}

0 comments on commit d0e7513

Please sign in to comment.