diff --git a/docs/resources/account_token.md b/docs/resources/account_token.md index 2e317d2103..ecb9429988 100644 --- a/docs/resources/account_token.md +++ b/docs/resources/account_token.md @@ -16,22 +16,17 @@ resource "cloudflare_account_token" "example_account_token" { account_id = "eb78d65290b24279ba6f44721b3ea3c4" name = "readonly token" policies = [{ - id = "f267e341f3dd4697bd3b9f71dd96247f" effect = "allow" permission_groups = [{ - id = "c8fed203ed3043cba015a93ad1616f1f" meta = { key = "key" value = "value" } - name = "Zone Read" }, { - id = "82e64a83756745bbbb1c9c2701bf816b" meta = { key = "key" value = "value" } - name = "Magic Network Monitoring" }] resources = { "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*" diff --git a/docs/resources/address_map.md b/docs/resources/address_map.md index 9201f80564..a63408d3c6 100644 --- a/docs/resources/address_map.md +++ b/docs/resources/address_map.md @@ -18,8 +18,6 @@ resource "cloudflare_address_map" "example_address_map" { enabled = true ips = ["192.0.2.1"] memberships = [{ - can_delete = true - created_at = "2014-01-01T05:20:00.12345Z" identifier = "023e105f4ecef8ad9ca31a8372d0c353" kind = "zone" }] diff --git a/docs/resources/api_token.md b/docs/resources/api_token.md index 26ba0c242b..af91a4dcd0 100644 --- a/docs/resources/api_token.md +++ b/docs/resources/api_token.md @@ -15,22 +15,17 @@ description: |- resource "cloudflare_api_token" "example_api_token" { name = "readonly token" policies = [{ - id = "f267e341f3dd4697bd3b9f71dd96247f" effect = "allow" permission_groups = [{ - id = "c8fed203ed3043cba015a93ad1616f1f" meta = { key = "key" value = "value" } - name = "Zone Read" }, { - id = "82e64a83756745bbbb1c9c2701bf816b" meta = { key = "key" value = "value" } - name = "Magic Network Monitoring" }] resources = { "com.cloudflare.api.account.zone.22b1de5f1c0e4b3ea97bb1e963b06a43" = "*" diff --git a/docs/resources/firewall_rule.md b/docs/resources/firewall_rule.md index 1e23524589..cd85791528 100644 --- a/docs/resources/firewall_rule.md +++ b/docs/resources/firewall_rule.md @@ -29,7 +29,6 @@ resource "cloudflare_firewall_rule" "example_firewall_rule" { timeout = 86400 } filter = { - id = "372e67954025e0ba6aaa6d586b9e0b61" description = "Restrict access from these browsers on this address range." expression = "(http.request.uri.path ~ \".*wp-login.php\" or http.request.uri.path ~ \".*xmlrpc.php\") and ip.addr ne 172.16.22.155" paused = false diff --git a/docs/resources/hyperdrive_config.md b/docs/resources/hyperdrive_config.md index 1efa2c817b..5ef080820a 100644 --- a/docs/resources/hyperdrive_config.md +++ b/docs/resources/hyperdrive_config.md @@ -18,6 +18,7 @@ resource "cloudflare_hyperdrive_config" "example_hyperdrive_config" { origin = { database = "postgres" host = "database.example.com" + password = "password" port = 5432 scheme = "postgres" user = "postgres" @@ -40,7 +41,6 @@ resource "cloudflare_hyperdrive_config" "example_hyperdrive_config" { ### Optional - `caching` (Attributes) (see [below for nested schema](#nestedatt--caching)) -- `hyperdrive_id` (String) Identifier ### Read-Only diff --git a/docs/resources/load_balancer_pool.md b/docs/resources/load_balancer_pool.md index 51dadebbf9..f1b489e251 100644 --- a/docs/resources/load_balancer_pool.md +++ b/docs/resources/load_balancer_pool.md @@ -17,7 +17,6 @@ resource "cloudflare_load_balancer_pool" "example_load_balancer_pool" { name = "primary-dc-1" origins = [{ address = "0.0.0.0" - disabled_at = "2019-12-27T18:11:19.117Z" enabled = true header = { host = ["example.com"] diff --git a/docs/resources/magic_wan_ipsec_tunnel.md b/docs/resources/magic_wan_ipsec_tunnel.md index dfae9eb768..ad468e8645 100644 --- a/docs/resources/magic_wan_ipsec_tunnel.md +++ b/docs/resources/magic_wan_ipsec_tunnel.md @@ -24,7 +24,6 @@ resource "cloudflare_magic_wan_ipsec_tunnel" "example_magic_wan_ipsec_tunnel" { enabled = true rate = "low" target = { - effective = "203.0.113.1" saved = "203.0.113.1" } type = "reply" diff --git a/docs/resources/managed_transforms.md b/docs/resources/managed_transforms.md index f1b9af8b6f..8824c71cac 100644 --- a/docs/resources/managed_transforms.md +++ b/docs/resources/managed_transforms.md @@ -17,14 +17,10 @@ resource "cloudflare_managed_transforms" "example_managed_transforms" { managed_request_headers = [{ id = "add_bot_protection_headers" enabled = true - has_conflict = false - conflicts_with = ["add_true_client_ip_headers"] }] managed_response_headers = [{ id = "add_security_headers" enabled = true - has_conflict = false - conflicts_with = ["add_true_client_ip_headers"] }] } ``` diff --git a/docs/resources/notification_policy.md b/docs/resources/notification_policy.md index adb23e1400..4f812f7de6 100644 --- a/docs/resources/notification_policy.md +++ b/docs/resources/notification_policy.md @@ -21,10 +21,10 @@ resource "cloudflare_notification_policy" "example_notification_policy" { id = "test@example.com" }] pagerduty = [{ - id = "e8133a15-00a4-4d69-aec1-32f70c51f6e5" + }] webhooks = [{ - id = "14cc1190-5d2b-4b98-a696-c424cb2ad05f" + }] } name = "SSL Notification Event Policy" diff --git a/docs/resources/ruleset.md b/docs/resources/ruleset.md index 6f8ad8a55d..ad535dc778 100644 --- a/docs/resources/ruleset.md +++ b/docs/resources/ruleset.md @@ -31,7 +31,6 @@ resource "cloudflare_ruleset" "example_ruleset" { status_code = 400 } } - categories = ["directory-traversal", "header"] description = "Block when the IP address is not 1.1.1.1" enabled = true exposed_credential_check = { diff --git a/docs/resources/workers_cron_trigger.md b/docs/resources/workers_cron_trigger.md index 7215caaf61..95d3959185 100644 --- a/docs/resources/workers_cron_trigger.md +++ b/docs/resources/workers_cron_trigger.md @@ -16,9 +16,7 @@ resource "cloudflare_workers_cron_trigger" "example_workers_cron_trigger" { account_id = "023e105f4ecef8ad9ca31a8372d0c353" script_name = "this-is_my_script-01" body = [{ - created_on = "created_on" cron = "*/30 * * * *" - modified_on = "modified_on" }] } ``` diff --git a/docs/resources/workers_script.md b/docs/resources/workers_script.md index a6f4613a56..f8635feada 100644 --- a/docs/resources/workers_script.md +++ b/docs/resources/workers_script.md @@ -58,7 +58,6 @@ resource "cloudflare_workers_script" "example_workers_script" { } placement = { mode = "smart" - status = "SUCCESS" } tags = ["string"] tail_consumers = [{ diff --git a/docs/resources/zero_trust_access_identity_provider.md b/docs/resources/zero_trust_access_identity_provider.md index 1ce28d7e07..4e82082386 100644 --- a/docs/resources/zero_trust_access_identity_provider.md +++ b/docs/resources/zero_trust_access_identity_provider.md @@ -29,9 +29,7 @@ resource "cloudflare_zero_trust_access_identity_provider" "example_zero_trust_ac scim_config = { enabled = true identity_update_behavior = "automatic" - scim_base_url = "scim_base_url" seat_deprovision = true - secret = "secret" user_deprovision = true } } diff --git a/docs/resources/zero_trust_gateway_settings.md b/docs/resources/zero_trust_gateway_settings.md index fa1249cf2f..a648093356 100644 --- a/docs/resources/zero_trust_gateway_settings.md +++ b/docs/resources/zero_trust_gateway_settings.md @@ -52,8 +52,6 @@ resource "cloudflare_zero_trust_gateway_settings" "example_zero_trust_gateway_se custom_certificate = { enabled = true id = "d1b364c5-1311-466e-a194-f0e943e0799f" - binding_status = "pending_deployment" - updated_at = "2019-12-27T18:11:19.117Z" } extended_email_matching = { enabled = true diff --git a/docs/resources/zero_trust_list.md b/docs/resources/zero_trust_list.md index 341cd609f9..8e2649f925 100644 --- a/docs/resources/zero_trust_list.md +++ b/docs/resources/zero_trust_list.md @@ -18,7 +18,6 @@ resource "cloudflare_zero_trust_list" "example_zero_trust_list" { type = "SERIAL" description = "The serial numbers for administrators" items = [{ - created_at = "2014-01-01T05:20:00.12345Z" description = "Austin office IP" value = "8GE8721REF" }] diff --git a/docs/resources/zero_trust_tunnel_cloudflared_config.md b/docs/resources/zero_trust_tunnel_cloudflared_config.md index a729ec5d82..ffbf53cea7 100644 --- a/docs/resources/zero_trust_tunnel_cloudflared_config.md +++ b/docs/resources/zero_trust_tunnel_cloudflared_config.md @@ -61,9 +61,6 @@ resource "cloudflare_zero_trust_tunnel_cloudflared_config" "example_zero_trust_t tcp_keep_alive = 0 tls_timeout = 0 } - warp_routing = { - enabled = true - } } } ```