Skip to content

Conversation

@rexscaria
Copy link
Contributor

Going to clean this up so we can provide accurate picture what's drifting in gateway policies. Our customers has been having lot of issues here, this should help

vaishakdinesh and others added 30 commits September 25, 2025 17:30
* fix(migrate): page rules status

* chore(resource): migration tests
…te case in R2 bucket resource (cloudflare#6211)

* feat: add case-insensitive location handling for R2 bucket resources

* handle case-insensitive location comparison and preserve state case in R2 bucket resource
…lures (cloudflare#6222)

- Fix workers_script schema: add Computed: true to version_id attribute with default
  value
  - Fix worker_version schema: remove WriteOnly: true from jwt attribute under Computed
  assets
  - Add missing VersionID field to WorkersScriptMetadataBindingsModel (26→27 attributes)
  - Fix R2 bucket creation_date refresh drift with UseStateForUnknown() plan modifier
  - Add locationNormalizePlanModifier for case-insensitive location handling
  - Update R2 bucket test expectations to match actual case-preservation behavior

  Resolves schema validation panics in migration tests introduced by commits:
  - d57ee84 (feat: api update)
  - 45fef7a (chore: update composite API spec)
… drift (cloudflare#6224)

- Add UseStateForUnknown() plan modifiers to created_at/updated_at in
  zero_trust_access_application schema
  - Add UseStateForUnknown() plan modifiers to created_at/updated_at/app_count in
  zero_trust_access_custom_page schema
  - Change app_count from Optional to Computed in zero_trust_access_custom_page to match
  API behavior

  Resolves refresh plan drift where timestamp and count attributes were causing non-empty
   plans during test refreshes, leading to test failures across the zero trust access
  test suites.

  Tests now passing:
  - TestAccCloudflareAccessApplication_BasicAccount/BasicZone
  - TestAccCloudflareAccessApplicationDataSource_AccountName
  - TestAccCloudflareAccessCustomPage_IdentityDenied/Forbidden
stainless-app bot and others added 20 commits September 30, 2025 17:42
* fix(api): RAG-286: Add to_markdown subresource to AI resource
…codegen in access_application

* chore(zero_trust_access_application): fix config for disabling codegen in access_application
* bug: skip source_url validation if value is missing

* chore: add list_item acceptance test for locals validation

---------

Co-authored-by: Brad Swenson <[email protected]>
* fix(ai): rename duplicate parameter in the to_markdown subresource
* fix(build): sync SHA for Go SDK dependency with latest commit on 'next'

* fix(build): add zero_trust_access_application back
…loudflare#6274)

- Modernize all tests to use ConfigStateChecks with
  statecheck.ExpectKnownValue
  - Replace legacy resource.ComposeTestCheckFunc patterns with modern testing
  - Add comprehensive test coverage with 5 new test cases:
    * Update lifecycle tests (add/remove optional attributes)
    * Full configuration test covering all deployment bindings
    * Environment variable type validation (plain_text/secret_text)
    * Preview deployment setting enum tests (all/none/custom)
  - Add TestMain and sweeper for automated resource cleanup
  - Create destroy verification function with proper API integration
  - Add import verification steps to all test cases
  - Fix schema access patterns for SingleNestedAttribute fields
  - Handle API default values with ExpectNonEmptyPlan for refresh plan diffs
  - Add comprehensive ImportStateVerifyIgnore for computed/sensitive fields
  - Enable 4 tests to run with default account (44% improvement)
  - Add modern ConfigPlanChecks for update scenario validation

  Tests now cover all optional attributes, enum values, lifecycle operations,
  and deployment binding types with modern Terraform testing patterns.
* TUN-9814: Update virtual network resource

* remove acc check
* TUN-9813: Update cloudflared config resource

* remove acc check
* fix: fix bot_management and list_item acceptance tests

* fix: disable cloudflare_workflow acceptance tests
@rexscaria rexscaria force-pushed the rex/improve-error-reporting-at-gateway-policies branch from dbcb74a to 9cd7488 Compare October 1, 2025 17:21
@rexscaria rexscaria force-pushed the rex/improve-error-reporting-at-gateway-policies branch from 9cd7488 to 502612c Compare October 2, 2025 17:43
@vaishakdinesh
Copy link
Member

@rexscaria do we still need this? might be better to create a new one.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.