cloudflare / terraform-provider-cloudflare

Cloudflare Terraform Provider
https://registry.terraform.io/providers/cloudflare/cloudflare
Mozilla Public License 2.0
756 stars 579 forks source link

Unable to set "Allow WARP to WARP connection" from terraform #3723

Open james-boydell opened 3 weeks ago

james-boydell commented 3 weeks ago

Confirmation

Terraform and Cloudflare provider version

Terraform v1.9.5 on darwin_arm64

Affected resource(s)

cloudflare_zero_trust_gateway_settings (Or so I believe)

Terraform configuration files

resource "cloudflare_zero_trust_gateway_settings" "warp_gateway" {
  account_id = local.account_id

  proxy {
    root_ca    = false
    tcp        = true
    udp        = true
    virtual_ip = true
  }

  logging {
    redact_pii = false
    settings_by_rule_type {
      dns {
        log_all    = true
        log_blocks = false
      }
      http {
        log_all    = true
        log_blocks = false
      }
      l4 {
        log_all    = true
        log_blocks = false
      }
    }
  }
}

Link to debug output

N/A

Panic output

No response

Expected output

N/A

Actual output

N/A

Steps to reproduce

N/A

Additional factoids

I'm trying to toggle the "Allow WARP to WARP connection" setting in Zero Trust -> Settings -> Network

I figured this would be the virtual_ip flag, but it doesn't seem to set it and I can't find anywhere in the documentation that sets this.

References

No response

github-actions[bot] commented 3 weeks ago

Community Note

Voting for Prioritization

Volunteering to Work on This Issue

github-actions[bot] commented 3 weeks ago

Thank you for reporting this issue! For maintainers to dig into issues it is required that all issues include the entirety of TF_LOG=DEBUG output to be provided. The only parts that should be redacted are your user credentials in the X-Auth-Key, X-Auth-Email and Authorization HTTP headers. Details such as zone or account identifiers are not considered sensitive but can be redacted if you are very cautious. This log file provides additional context from Terraform, the provider and the Cloudflare API that helps in debugging issues. Without it, maintainers are very limited in what they can do and may hamper diagnosis efforts.

This issue has been marked with triage/needs-information and is unlikely to receive maintainer attention until the log file is provided making this a complete bug report.

josip-stanic commented 3 weeks ago

pull request for this timed out: https://github.com/cloudflare/terraform-provider-cloudflare/pull/3328, I'll reopen it