diff --git a/docs/data-sources/infrastructure_access_targets.md b/docs/data-sources/infrastructure_access_targets.md index 93a2b6366b..ae4edfb631 100644 --- a/docs/data-sources/infrastructure_access_targets.md +++ b/docs/data-sources/infrastructure_access_targets.md @@ -13,15 +13,14 @@ Use this data source to retrieve all Infrastructure Access Targets. ```terraform data "cloudflare_infrastructure_access_targets" "example" { - account_id = "f037e56e89293a057740de681ac9abbe" - # Query parameters - hostname_contains = "example" - ipv4 = "210.26.29.230" + account_id = "f037e56e89293a057740de681ac9abbe" + hostname_contains = "example" + ipv4 = "210.26.29.230" } # output the list of targets the data source contains output "targets" { - value = data.cloudflare_infrastructure_access_targets.example.targets + value = data.cloudflare_infrastructure_access_targets.example.targets } ``` diff --git a/docs/resources/access_application.md b/docs/resources/access_application.md index 242baf96aa..073d8c8da4 100644 --- a/docs/resources/access_application.md +++ b/docs/resources/access_application.md @@ -29,9 +29,9 @@ resource "cloudflare_access_application" "staging_app" { type = "self_hosted" session_duration = "24h" auto_redirect_to_identity = false - policies = [ - cloudflare_access_policy.example_1.id, - cloudflare_access_policy.example_2.id + policies = [ + cloudflare_access_policy.example_1.id, + cloudflare_access_policy.example_2.id ] } @@ -42,9 +42,9 @@ resource "cloudflare_access_application" "staging_app" { domain = "staging.example.com" type = "self_hosted" session_duration = "24h" - policies = [ - cloudflare_access_policy.example_1.id, - cloudflare_access_policy.example_2.id + policies = [ + cloudflare_access_policy.example_1.id, + cloudflare_access_policy.example_2.id ] cors_headers { allowed_methods = ["GET", "POST", "OPTIONS"] @@ -59,12 +59,12 @@ resource "cloudflare_zero_trust_access_application" "infra-app-example" { account_id = "0da42c8d2132a9ddaf714f9e7c920711" name = "infra-app" type = "infrastructure" - + target_criteria { port = 22 protocol = "SSH" target_attributes { - name = "hostname" + name = "hostname" values = ["tfgo-tests-useast", "tfgo-tests-uswest"] } } diff --git a/docs/resources/access_policy.md b/docs/resources/access_policy.md index 0f18a01034..cadab6add9 100644 --- a/docs/resources/access_policy.md +++ b/docs/resources/access_policy.md @@ -26,9 +26,9 @@ a particular resource. ```terraform # Allowing access to `test@example.com` email address only resource "cloudflare_access_policy" "test_policy" { - account_id = "f037e56e89293a057740de681ac9abbe" - name = "staging policy" - decision = "allow" + account_id = "f037e56e89293a057740de681ac9abbe" + name = "staging policy" + decision = "allow" include { email = ["test@example.com"] @@ -42,9 +42,9 @@ resource "cloudflare_access_policy" "test_policy" { # Allowing `test@example.com` to access but only when coming from a # specific IP. resource "cloudflare_access_policy" "test_policy" { - account_id = "f037e56e89293a057740de681ac9abbe" - name = "staging policy" - decision = "allow" + account_id = "f037e56e89293a057740de681ac9abbe" + name = "staging policy" + decision = "allow" include { email = ["test@example.com"] @@ -58,10 +58,10 @@ resource "cloudflare_access_policy" "test_policy" { # Access policy for an infrastructure application resource "cloudflare_access_policy" "infra-app-example-allow" { application_id = cloudflare_zero_trust_access_application.infra-app-example.id - account_id = "0da42c8d2132a9ddaf714f9e7c920711" - name = "infra-app-example-allow" - decision = "allow" - precedence = 1 + account_id = "0da42c8d2132a9ddaf714f9e7c920711" + name = "infra-app-example-allow" + decision = "allow" + precedence = 1 include { email = ["devuser@gmail.com"] @@ -79,12 +79,12 @@ resource "cloudflare_zero_trust_access_application" "infra-app-example" { account_id = "0da42c8d2132a9ddaf714f9e7c920711" name = "infra-app" type = "infrastructure" - + target_criteria { port = 22 protocol = "SSH" target_attributes { - name = "hostname" + name = "hostname" values = ["tfgo-tests-useast", "tfgo-tests-uswest"] } } diff --git a/docs/resources/healthcheck.md b/docs/resources/healthcheck.md index d1408c185f..1be5152adc 100644 --- a/docs/resources/healthcheck.md +++ b/docs/resources/healthcheck.md @@ -16,55 +16,55 @@ without needing a Cloudflare Load Balancer. ```terraform # HTTPS Healthcheck resource "cloudflare_healthcheck" "http_health_check" { - zone_id = var.cloudflare_zone_id - name = "http-health-check" + zone_id = var.cloudflare_zone_id + name = "http-health-check" description = "example http health check" - address = "example.com" - suspended = false + address = "example.com" + suspended = false check_regions = [ "WEU", "EEU" ] - type = "HTTPS" - port = 443 - method = "GET" - path = "/health" + type = "HTTPS" + port = 443 + method = "GET" + path = "/health" expected_body = "alive" expected_codes = [ "2xx", "301" ] follow_redirects = true - allow_insecure = false + allow_insecure = false header { header = "Host" values = ["example.com"] } - timeout = 10 - retries = 2 - interval = 60 - consecutive_fails = 3 + timeout = 10 + retries = 2 + interval = 60 + consecutive_fails = 3 consecutive_successes = 2 } # TCP Healthcheck resource "cloudflare_healthcheck" "tcp_health_check" { - zone_id = var.cloudflare_zone_id - name = "tcp-health-check" + zone_id = var.cloudflare_zone_id + name = "tcp-health-check" description = "example tcp health check" - address = "example.com" - suspended = false + address = "example.com" + suspended = false check_regions = [ "WEU", "EEU" ] - type = "TCP" - port = 22 - method = "connection_established" - timeout = 10 - retries = 2 - interval = 60 - consecutive_fails = 3 + type = "TCP" + port = 22 + method = "connection_established" + timeout = 10 + retries = 2 + interval = 60 + consecutive_fails = 3 consecutive_successes = 2 } ``` diff --git a/docs/resources/infrastructure_access_target.md b/docs/resources/infrastructure_access_target.md index 916bc42b73..6c617e1631 100644 --- a/docs/resources/infrastructure_access_target.md +++ b/docs/resources/infrastructure_access_target.md @@ -14,28 +14,28 @@ The [Infrastructure Access Target](https://developers.cloudflare.com/cloudflare- ```terraform resource "cloudflare_infrastructure_access_target" "example" { account_id = "f037e56e89293a057740de681ac9abbe" - hostname = "example-target" - ip = { - ipv4 = { - ip_addr = "210.26.29.230" - virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" - } - ipv6 = { - ip_addr = "24c0:64e8:f0b4:8dbf:7104:72b0:ef8f:f5e0" - virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" - } - } + hostname = "example-target" + ip = { + ipv4 = { + ip_addr = "210.26.29.230" + virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" + } + ipv6 = { + ip_addr = "24c0:64e8:f0b4:8dbf:7104:72b0:ef8f:f5e0" + virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" + } + } } resource "cloudflare_infrastructure_access_target" "ipv4_only_example" { account_id = "f037e56e89293a057740de681ac9abbe" - hostname = "example-ipv4-only" - ip = { - ipv4 = { - ip_addr = "210.26.29.230" - virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" - } - } + hostname = "example-ipv4-only" + ip = { + ipv4 = { + ip_addr = "210.26.29.230" + virtual_network_id = "238dccd1-149b-463d-8228-560ab83a54fd" + } + } } ``` diff --git a/docs/resources/list.md b/docs/resources/list.md index 7de102d91b..9b78eb8e4c 100644 --- a/docs/resources/list.md +++ b/docs/resources/list.md @@ -91,7 +91,7 @@ resource "cloudflare_list" "example" { item { value { - asn = 989 + asn = 989 } comment = "two" } diff --git a/docs/resources/list_item.md b/docs/resources/list_item.md index 1f547f6755..1dd6ec529b 100644 --- a/docs/resources/list_item.md +++ b/docs/resources/list_item.md @@ -63,7 +63,7 @@ resource "cloudflare_list_item" "example_asn_item" { account_id = "f037e56e89293a057740de681ac9abbe" list_id = cloudflare_list.example_asn_list.id comment = "List Item Comment" - asn = 6789 + asn = 6789 } # Hostname List diff --git a/docs/resources/observatory_scheduled_test.md b/docs/resources/observatory_scheduled_test.md index d30ccf6173..d32213545d 100644 --- a/docs/resources/observatory_scheduled_test.md +++ b/docs/resources/observatory_scheduled_test.md @@ -13,9 +13,9 @@ Provides a Cloudflare Observatory Scheduled Test resource. ```terraform resource "cloudflare_observatory_scheduled_test" "example" { - zone_id = "0da42c8d2132a9ddaf714f9e7c920711" - url = "example.com" - region = "us-central1" + zone_id = "0da42c8d2132a9ddaf714f9e7c920711" + url = "example.com" + region = "us-central1" frequency = "WEEKLY" } ``` diff --git a/docs/resources/ruleset.md b/docs/resources/ruleset.md index ea4fc61be5..46ffbadcfb 100644 --- a/docs/resources/ruleset.md +++ b/docs/resources/ruleset.md @@ -300,7 +300,7 @@ resource "cloudflare_ruleset" "cache_settings_example" { include = ["habc", "hdef"] check_presence = ["habc_t", "hdef_t"] exclude_origin = true - contains = { + contains = { "accept" = ["image/webp", "image/png"] "accept-encoding" = ["br", "zstd"] "some-header" = ["some-value", "some-other-value"] @@ -320,7 +320,7 @@ resource "cloudflare_ruleset" "cache_settings_example" { } } cache_reserve = { - eligible = true + eligible = true minimum_file_size = 100000 } origin_error_page_passthru = false diff --git a/docs/resources/teams_account.md b/docs/resources/teams_account.md index 509364dadc..cfe024a4d6 100644 --- a/docs/resources/teams_account.md +++ b/docs/resources/teams_account.md @@ -46,10 +46,10 @@ resource "cloudflare_teams_account" "example" { } proxy { - tcp = true - udp = true - root_ca = true - virtual_ip = false + tcp = true + udp = true + root_ca = true + virtual_ip = false disable_for_time = 3600 } diff --git a/docs/resources/tunnel_virtual_network.md b/docs/resources/tunnel_virtual_network.md index 883ba4cd45..234da99428 100644 --- a/docs/resources/tunnel_virtual_network.md +++ b/docs/resources/tunnel_virtual_network.md @@ -20,8 +20,8 @@ private IPs in your origins. ```terraform resource "cloudflare_tunnel_virtual_network" "example" { account_id = "f037e56e89293a057740de681ac9abbe" - name = "vnet-for-documentation" - comment = "New tunnel virtual network for documentation" + name = "vnet-for-documentation" + comment = "New tunnel virtual network for documentation" } ``` diff --git a/docs/resources/waiting_room.md b/docs/resources/waiting_room.md index e0e1198495..fab3e26c8b 100644 --- a/docs/resources/waiting_room.md +++ b/docs/resources/waiting_room.md @@ -31,7 +31,7 @@ resource "cloudflare_waiting_room" "example" { host = "shop2.example.com" } - queueing_status_code = 200 + queueing_status_code = 200 enabled_origin_commands = ["revoke"] } diff --git a/docs/resources/waiting_room_event.md b/docs/resources/waiting_room_event.md index 9e14c7728b..0505e1c9ba 100644 --- a/docs/resources/waiting_room_event.md +++ b/docs/resources/waiting_room_event.md @@ -14,11 +14,11 @@ Provides a Cloudflare Waiting Room Event resource. ```terraform # Waiting Room Event resource "cloudflare_waiting_room_event" "example" { - zone_id = "0da42c8d2132a9ddaf714f9e7c920711" - waiting_room_id = "d41d8cd98f00b204e9800998ecf8427e" - name = "foo" - event_start_time = "2006-01-02T15:04:05Z" - event_end_time = "2006-01-02T20:04:05Z" + zone_id = "0da42c8d2132a9ddaf714f9e7c920711" + waiting_room_id = "d41d8cd98f00b204e9800998ecf8427e" + name = "foo" + event_start_time = "2006-01-02T15:04:05Z" + event_end_time = "2006-01-02T20:04:05Z" } ``` diff --git a/docs/resources/zero_trust_access_application.md b/docs/resources/zero_trust_access_application.md index 5881ef450f..c49dbe1dfe 100644 --- a/docs/resources/zero_trust_access_application.md +++ b/docs/resources/zero_trust_access_application.md @@ -29,9 +29,9 @@ resource "cloudflare_zero_trust_access_application" "staging_app" { type = "self_hosted" session_duration = "24h" auto_redirect_to_identity = false - policies = [ - cloudflare_access_policy.example_1.id, - cloudflare_access_policy.example_2.id + policies = [ + cloudflare_access_policy.example_1.id, + cloudflare_access_policy.example_2.id ] } @@ -42,9 +42,9 @@ resource "cloudflare_zero_trust_access_application" "staging_app" { domain = "staging.example.com" type = "self_hosted" session_duration = "24h" - policies = [ - cloudflare_access_policy.example_1.id, - cloudflare_access_policy.example_2.id + policies = [ + cloudflare_access_policy.example_1.id, + cloudflare_access_policy.example_2.id ] cors_headers { allowed_methods = ["GET", "POST", "OPTIONS"] diff --git a/docs/resources/zero_trust_access_policy.md b/docs/resources/zero_trust_access_policy.md index fb5bc7efc4..24ae5dc177 100644 --- a/docs/resources/zero_trust_access_policy.md +++ b/docs/resources/zero_trust_access_policy.md @@ -26,9 +26,9 @@ a particular resource. ```terraform # Allowing access to `test@example.com` email address only resource "cloudflare_zero_trust_access_policy" "test_policy" { - account_id = "f037e56e89293a057740de681ac9abbe" - name = "staging policy" - decision = "allow" + account_id = "f037e56e89293a057740de681ac9abbe" + name = "staging policy" + decision = "allow" include { email = ["test@example.com"] @@ -42,9 +42,9 @@ resource "cloudflare_zero_trust_access_policy" "test_policy" { # Allowing `test@example.com` to access but only when coming from a # specific IP. resource "cloudflare_zero_trust_access_policy" "test_policy" { - account_id = "f037e56e89293a057740de681ac9abbe" - name = "staging policy" - decision = "allow" + account_id = "f037e56e89293a057740de681ac9abbe" + name = "staging policy" + decision = "allow" include { email = ["test@example.com"] diff --git a/docs/resources/zero_trust_gateway_settings.md b/docs/resources/zero_trust_gateway_settings.md index 363a489a87..9ce69ae81f 100644 --- a/docs/resources/zero_trust_gateway_settings.md +++ b/docs/resources/zero_trust_gateway_settings.md @@ -46,10 +46,10 @@ resource "cloudflare_zero_trust_gateway_settings" "example" { } proxy { - tcp = true - udp = true - root_ca = true - virtual_ip = false + tcp = true + udp = true + root_ca = true + virtual_ip = false disable_for_time = 3600 } diff --git a/docs/resources/zero_trust_tunnel_virtual_network.md b/docs/resources/zero_trust_tunnel_virtual_network.md index b0a5ac6efb..4d8290d5a5 100644 --- a/docs/resources/zero_trust_tunnel_virtual_network.md +++ b/docs/resources/zero_trust_tunnel_virtual_network.md @@ -20,8 +20,8 @@ private IPs in your origins. ```terraform resource "cloudflare_zero_trust_tunnel_virtual_network" "example" { account_id = "f037e56e89293a057740de681ac9abbe" - name = "vnet-for-documentation" - comment = "New tunnel virtual network for documentation" + name = "vnet-for-documentation" + comment = "New tunnel virtual network for documentation" } ```