Skip to content

Commit

Permalink
Merge pull request #4955 from cloudflare/generate-release-docs
Browse files Browse the repository at this point in the history
  • Loading branch information
jacobbednarz authored Jan 29, 2025
2 parents e6caa22 + 76ac80a commit 70de33d
Show file tree
Hide file tree
Showing 16 changed files with 3 additions and 34 deletions.
5 changes: 0 additions & 5 deletions docs/resources/account_token.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,22 +16,17 @@ resource "cloudflare_account_token" "example_account_token" {
account_id = "eb78d65290b24279ba6f44721b3ea3c4"
name = "readonly token"
policies = [{
id = "f267e341f3dd4697bd3b9f71dd96247f"
effect = "allow"
permission_groups = [{
id = "c8fed203ed3043cba015a93ad1616f1f"
meta = {
key = "key"
value = "value"
}
name = "Zone Read"
}, {
id = "82e64a83756745bbbb1c9c2701bf816b"
meta = {
key = "key"
value = "value"
}
name = "Magic Network Monitoring"
}]
resources = {
"com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*"
Expand Down
2 changes: 0 additions & 2 deletions docs/resources/address_map.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,6 @@ resource "cloudflare_address_map" "example_address_map" {
enabled = true
ips = ["192.0.2.1"]
memberships = [{
can_delete = true
created_at = "2014-01-01T05:20:00.12345Z"
identifier = "023e105f4ecef8ad9ca31a8372d0c353"
kind = "zone"
}]
Expand Down
5 changes: 0 additions & 5 deletions docs/resources/api_token.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,22 +15,17 @@ description: |-
resource "cloudflare_api_token" "example_api_token" {
name = "readonly token"
policies = [{
id = "f267e341f3dd4697bd3b9f71dd96247f"
effect = "allow"
permission_groups = [{
id = "c8fed203ed3043cba015a93ad1616f1f"
meta = {
key = "key"
value = "value"
}
name = "Zone Read"
}, {
id = "82e64a83756745bbbb1c9c2701bf816b"
meta = {
key = "key"
value = "value"
}
name = "Magic Network Monitoring"
}]
resources = {
"com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*"
Expand Down
1 change: 0 additions & 1 deletion docs/resources/firewall_rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,6 @@ resource "cloudflare_firewall_rule" "example_firewall_rule" {
timeout = 86400
}
filter = {
id = "372e67954025e0ba6aaa6d586b9e0b61"
description = "Restrict access from these browsers on this address range."
expression = "(http.request.uri.path ~ \".*wp-login.php\" or http.request.uri.path ~ \".*xmlrpc.php\") and ip.addr ne 172.16.22.155"
paused = false
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/hyperdrive_config.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ resource "cloudflare_hyperdrive_config" "example_hyperdrive_config" {
origin = {
database = "postgres"
host = "database.example.com"
password = "password"
port = 5432
scheme = "postgres"
user = "postgres"
Expand All @@ -40,7 +41,6 @@ resource "cloudflare_hyperdrive_config" "example_hyperdrive_config" {
### Optional

- `caching` (Attributes) (see [below for nested schema](#nestedatt--caching))
- `hyperdrive_id` (String) Identifier

### Read-Only

Expand Down
1 change: 0 additions & 1 deletion docs/resources/load_balancer_pool.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,6 @@ resource "cloudflare_load_balancer_pool" "example_load_balancer_pool" {
name = "primary-dc-1"
origins = [{
address = "0.0.0.0"
disabled_at = "2019-12-27T18:11:19.117Z"
enabled = true
header = {
host = ["example.com"]
Expand Down
1 change: 0 additions & 1 deletion docs/resources/magic_wan_ipsec_tunnel.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,6 @@ resource "cloudflare_magic_wan_ipsec_tunnel" "example_magic_wan_ipsec_tunnel" {
enabled = true
rate = "low"
target = {
effective = "203.0.113.1"
saved = "203.0.113.1"
}
type = "reply"
Expand Down
4 changes: 0 additions & 4 deletions docs/resources/managed_transforms.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,14 +17,10 @@ resource "cloudflare_managed_transforms" "example_managed_transforms" {
managed_request_headers = [{
id = "add_bot_protection_headers"
enabled = true
has_conflict = false
conflicts_with = ["add_true_client_ip_headers"]
}]
managed_response_headers = [{
id = "add_security_headers"
enabled = true
has_conflict = false
conflicts_with = ["add_true_client_ip_headers"]
}]
}
```
Expand Down
4 changes: 2 additions & 2 deletions docs/resources/notification_policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,10 +21,10 @@ resource "cloudflare_notification_policy" "example_notification_policy" {
id = "[email protected]"
}]
pagerduty = [{
id = "e8133a15-00a4-4d69-aec1-32f70c51f6e5"
}]
webhooks = [{
id = "14cc1190-5d2b-4b98-a696-c424cb2ad05f"
}]
}
name = "SSL Notification Event Policy"
Expand Down
1 change: 0 additions & 1 deletion docs/resources/ruleset.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,6 @@ resource "cloudflare_ruleset" "example_ruleset" {
status_code = 400
}
}
categories = ["directory-traversal", "header"]
description = "Block when the IP address is not 1.1.1.1"
enabled = true
exposed_credential_check = {
Expand Down
2 changes: 0 additions & 2 deletions docs/resources/workers_cron_trigger.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,7 @@ resource "cloudflare_workers_cron_trigger" "example_workers_cron_trigger" {
account_id = "023e105f4ecef8ad9ca31a8372d0c353"
script_name = "this-is_my_script-01"
body = [{
created_on = "created_on"
cron = "*/30 * * * *"
modified_on = "modified_on"
}]
}
```
Expand Down
1 change: 0 additions & 1 deletion docs/resources/workers_script.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,6 @@ resource "cloudflare_workers_script" "example_workers_script" {
}
placement = {
mode = "smart"
status = "SUCCESS"
}
tags = ["string"]
tail_consumers = [{
Expand Down
2 changes: 0 additions & 2 deletions docs/resources/zero_trust_access_identity_provider.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,9 +29,7 @@ resource "cloudflare_zero_trust_access_identity_provider" "example_zero_trust_ac
scim_config = {
enabled = true
identity_update_behavior = "automatic"
scim_base_url = "scim_base_url"
seat_deprovision = true
secret = "secret"
user_deprovision = true
}
}
Expand Down
2 changes: 0 additions & 2 deletions docs/resources/zero_trust_gateway_settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,8 +52,6 @@ resource "cloudflare_zero_trust_gateway_settings" "example_zero_trust_gateway_se
custom_certificate = {
enabled = true
id = "d1b364c5-1311-466e-a194-f0e943e0799f"
binding_status = "pending_deployment"
updated_at = "2019-12-27T18:11:19.117Z"
}
extended_email_matching = {
enabled = true
Expand Down
1 change: 0 additions & 1 deletion docs/resources/zero_trust_list.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,6 @@ resource "cloudflare_zero_trust_list" "example_zero_trust_list" {
type = "SERIAL"
description = "The serial numbers for administrators"
items = [{
created_at = "2014-01-01T05:20:00.12345Z"
description = "Austin office IP"
value = "8GE8721REF"
}]
Expand Down
3 changes: 0 additions & 3 deletions docs/resources/zero_trust_tunnel_cloudflared_config.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,9 +61,6 @@ resource "cloudflare_zero_trust_tunnel_cloudflared_config" "example_zero_trust_t
tcp_keep_alive = 0
tls_timeout = 0
}
warp_routing = {
enabled = true
}
}
}
```
Expand Down

0 comments on commit 70de33d

Please sign in to comment.