couchbasecloud / terraform-provider-couchbase-capella

Terraform Couchbase Capella Provider: Deploy, update, and manage Couchbase Capella infrastructure as code through HashiCorp Terraform
Apache License 2.0
32 stars 4 forks source link

[AV-78493] overwrite API response times with plan values #199

Closed l0n3star closed 2 months ago

l0n3star commented 5 months ago

Jira

Description

When creating an audit log export request, if zulu format is used for the start/end times this results in a state mismatch because API server returns time with offsets.

Type of Change

Manual Testing Approach

How was this change tested and do you have evidence? (REQUIRED: Select at least 1)

Testing

validate zulu format

audit_log_export = {
    start = "2024-06-10T19:09:11Z"
    end = "2024-06-10T21:09:11Z"
}
terraform apply
╷
│ Warning: Provider development overrides are in effect
│
│ The following provider development overrides are set in the CLI configuration:
│  - couchbasecloud/couchbase-capella in /Users/$USER/GolandProjects/terraform-provider-couchbase-capella/bin
│
│ The behavior may therefore not match any released version of the provider and applying changes may cause the state to become incompatible with published releases.
╵
data.couchbase-capella_audit_log_export.existing_auditlogexport: Reading...
data.couchbase-capella_audit_log_export.existing_auditlogexport: Read complete after 0s

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # couchbase-capella_audit_log_export.new_auditlogexport will be created
  + resource "couchbase-capella_audit_log_export" "new_auditlogexport" {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T21:09:11Z"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T19:09:11Z"
      + status                 = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + existing_auditlogexport = {
      + cluster_id      = "ffffffff-aaaa-1414-eeee-000000000000"
      + data            = [
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:16:50.415705947 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 21:16:54.37230845 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 22:51:31.526799392 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 22:51:35.664051802 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:15.896348051 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:50.081716726 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:12:19.656434023 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:14:28.070136553 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
        ]
      + organization_id = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id      = "ffffffff-aaaa-1414-eeee-000000000000"
    }
  + new_auditlogexport      = {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T21:09:11Z"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T19:09:11Z"
      + status                 = (known after apply)
    }

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

couchbase-capella_audit_log_export.new_auditlogexport: Creating...
couchbase-capella_audit_log_export.new_auditlogexport: Creation complete after 1s [id=ffffffff-aaaa-1414-eeee-000000000000]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

Outputs:

existing_auditlogexport = {
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "data" = toset([
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:16:50.415705947 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 21:16:54.37230845 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 22:51:31.526799392 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 22:51:35.664051802 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:15.896348051 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:50.081716726 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:12:19.656434023 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:14:28.070136553 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
  ])
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
}
new_auditlogexport = {
  "audit_log_download_url" = tostring(null)
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "created_at" = "2024-06-10 22:57:40.510329399 +0000 UTC"
  "end" = "2024-06-10T21:09:11Z"
  "expiration" = tostring(null)
  "id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "start" = "2024-06-10T19:09:11Z"
  "status" = tostring(null)
}

validate UTC time zone

audit_log_export = {
    start = "2024-06-10T19:09:11+00:00"
    end = "2024-06-10T21:09:11+00:00"
}
terraform apply
╷
│ Warning: Provider development overrides are in effect
│
│ The following provider development overrides are set in the CLI configuration:
│  - couchbasecloud/couchbase-capella in /Users/$USER/GolandProjects/terraform-provider-couchbase-capella/bin
│
│ The behavior may therefore not match any released version of the provider and applying changes may cause the state to become incompatible with published releases.
╵
data.couchbase-capella_audit_log_export.existing_auditlogexport: Reading...
data.couchbase-capella_audit_log_export.existing_auditlogexport: Read complete after 0s

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # couchbase-capella_audit_log_export.new_auditlogexport will be created
  + resource "couchbase-capella_audit_log_export" "new_auditlogexport" {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T21:09:11+00:00"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T19:09:11+00:00"
      + status                 = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + existing_auditlogexport = {
      + cluster_id      = "ffffffff-aaaa-1414-eeee-000000000000"
      + data            = [
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:16:50.415705947 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 21:16:54.37230845 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 22:51:31.526799392 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 22:51:35.664051802 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 22:57:40.510329399 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 22:57:44.271446866 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:15.896348051 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:50.081716726 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:12:19.656434023 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:14:28.070136553 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
        ]
      + organization_id = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id      = "ffffffff-aaaa-1414-eeee-000000000000"
    }
  + new_auditlogexport      = {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T21:09:11+00:00"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T19:09:11+00:00"
      + status                 = (known after apply)
    }

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

couchbase-capella_audit_log_export.new_auditlogexport: Creating...
couchbase-capella_audit_log_export.new_auditlogexport: Creation complete after 0s [id=ffffffff-aaaa-1414-eeee-000000000000]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

Outputs:

existing_auditlogexport = {
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "data" = toset([
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:16:50.415705947 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 21:16:54.37230845 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 22:51:31.526799392 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 22:51:35.664051802 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 22:57:40.510329399 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 22:57:44.271446866 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:15.896348051 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:50.081716726 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:12:19.656434023 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:14:28.070136553 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
  ])
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
}
new_auditlogexport = {
  "audit_log_download_url" = tostring(null)
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "created_at" = "2024-06-10 23:08:34.759743452 +0000 UTC"
  "end" = "2024-06-10T21:09:11+00:00"
  "expiration" = tostring(null)
  "id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "start" = "2024-06-10T19:09:11+00:00"
  "status" = tostring(null)
}

validate pacific time zone:

audit_log_export = {
    start = "2024-06-10T12:09:11-07:00"
    end = "2024-06-10T13:09:11-07:00"
}
terraform apply
╷
│ Warning: Provider development overrides are in effect
│
│ The following provider development overrides are set in the CLI configuration:
│  - couchbasecloud/couchbase-capella in /Users/$USER/GolandProjects/terraform-provider-couchbase-capella/bin
│
│ The behavior may therefore not match any released version of the provider and applying changes may cause the state to become incompatible with published releases.
╵
data.couchbase-capella_audit_log_export.existing_auditlogexport: Reading...
data.couchbase-capella_audit_log_export.existing_auditlogexport: Read complete after 0s

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # couchbase-capella_audit_log_export.new_auditlogexport will be created
  + resource "couchbase-capella_audit_log_export" "new_auditlogexport" {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T13:09:11-07:00"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T12:09:11-07:00"
      + status                 = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + existing_auditlogexport = {
      + cluster_id      = "ffffffff-aaaa-1414-eeee-000000000000"
      + data            = [
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:16:50.415705947 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 21:16:54.37230845 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 22:51:31.526799392 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 22:51:35.664051802 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 22:57:40.510329399 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 22:57:44.271446866 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 23:08:34.759743452 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = "2024-06-13 23:08:38.8155741 +0000 UTC"
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 19:09:11 +0000 UTC"
              + status                 = "Completed"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:15.896348051 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:03:50.081716726 +0000 UTC"
              + end                    = "2024-05-28 21:52:38 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-05-28 18:52:38 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:12:19.656434023 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "23b12e1a-d84d-48b6-8d09-4df2e5e6b4a7"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
          + {
              + audit_log_download_url = null
              + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + created_at             = "2024-06-10 21:14:28.070136553 +0000 UTC"
              + end                    = "2024-06-10 21:09:11 +0000 UTC"
              + expiration             = null
              + id                     = "ffffffff-aaaa-1414-eeee-000000000000"
              + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
              + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
              + start                  = "2024-06-10 20:09:11 +0000 UTC"
              + status                 = "no audit log files exist within the requested time frame"
            },
        ]
      + organization_id = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id      = "ffffffff-aaaa-1414-eeee-000000000000"
    }
  + new_auditlogexport      = {
      + audit_log_download_url = (known after apply)
      + cluster_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + created_at             = (known after apply)
      + end                    = "2024-06-10T13:09:11-07:00"
      + expiration             = (known after apply)
      + id                     = (known after apply)
      + organization_id        = "ffffffff-aaaa-1414-eeee-000000000000"
      + project_id             = "ffffffff-aaaa-1414-eeee-000000000000"
      + start                  = "2024-06-10T12:09:11-07:00"
      + status                 = (known after apply)
    }

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

couchbase-capella_audit_log_export.new_auditlogexport: Creating...
couchbase-capella_audit_log_export.new_auditlogexport: Creation complete after 0s [id=ffffffff-aaaa-1414-eeee-000000000000]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

Outputs:

existing_auditlogexport = {
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "data" = toset([
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:16:50.415705947 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 21:16:54.37230845 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "created_at" = "2024-06-10 22:51:31.526799392 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 22:51:35.664051802 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "created_at" = "2024-06-10 22:57:40.510329399 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 22:57:44.271446866 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = "https://cb-audit-logs-1234.s3.amazonaws.com/export/cluster-audit-logs-5678-from-2000-01-01-to-2000-01-02.tar.gz?X-Amz-Algorithm=X&X-Amz-Credential=XXX&X-Amz-Date=1999&X-Amz-Expires=1&X-Amz-Security-Token=XXX&X-Amz-SignedHeaders=host&X-Amz-Signature=XXX"
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 23:08:34.759743452 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = "2024-06-13 23:08:38.8155741 +0000 UTC"
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 19:09:11 +0000 UTC"
      "status" = "Completed"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:15.896348051 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:03:50.081716726 +0000 UTC"
      "end" = "2024-05-28 21:52:38 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-05-28 18:52:38 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:12:19.656434023 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "23b12e1a-d84d-48b6-8d09-4df2e5e6b4a7"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
    {
      "audit_log_download_url" = tostring(null)
      "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "created_at" = "2024-06-10 21:14:28.070136553 +0000 UTC"
      "end" = "2024-06-10 21:09:11 +0000 UTC"
      "expiration" = tostring(null)
      "id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
      "start" = "2024-06-10 20:09:11 +0000 UTC"
      "status" = "no audit log files exist within the requested time frame"
    },
  ])
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
}
new_auditlogexport = {
  "audit_log_download_url" = tostring(null)
  "cluster_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "created_at" = "2024-06-10 16:19:14.82496754 -0700 PDT"
  "end" = "2024-06-10T13:09:11-07:00"
  "expiration" = tostring(null)
  "id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "organization_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "project_id" = "ffffffff-aaaa-1414-eeee-000000000000"
  "start" = "2024-06-10T12:09:11-07:00"
  "status" = tostring(null)
}

Required Checklist:

Further comments

aniket-Kumar-c commented 5 months ago

Hi @l0n3star I have a few questions regarding the above PR. Are we not validating whether the response from the API matches what is provided in the config file? It seems we are directly returning what is in the request. It would be better if we first validate whether the request and response times are the same despite having different formats. If they are the same, we should return what is being sent in the request; otherwise, we should return an error.

aniket-Kumar-c commented 5 months ago

Also, do you remember our discussion about handling errors when resource creation fails? In such cases, Terraform marks the resource as tainted, and any subsequent terraform apply attempts to delete the resource. However, the deletion fails because the delete operation is not supported. We concluded that keeping the delete function of the resource empty would allow the resource to be removed from the state file.

What is your point of view on this issue? Should we incorporate that bug fix into this ticket, or should we create a new ticket for it?

aniket-Kumar-c commented 5 months ago

Can you please also provide the validation proof for all the formats that we can pass and that return a successful response? We currently have only one case included in the validation proof

l0n3star commented 5 months ago

Also, do you remember our discussion about handling errors when resource creation fails? In such cases, Terraform marks the resource as tainted, and any subsequent terraform apply attempts to delete the resource. However, the deletion fails because the delete operation is not supported. We concluded that keeping the delete function of the resource empty would allow the resource to be removed from the state file.

What is your point of view on this issue? Should we incorporate that bug fix into this ticket, or should we create a new ticket for it?

I have separate PR for this: https://github.com/couchbasecloud/terraform-provider-couchbase-capella/pull/203

l0n3star commented 5 months ago

Hi @l0n3star I have a few questions regarding the above PR. Are we not validating whether the response from the API matches what is provided in the config file? It seems we are directly returning what is in the request. It would be better if we first validate whether the request and response times are the same despite having different formats. If they are the same, we should return what is being sent in the request; otherwise, we should return an error.

Good point. Addressed in https://github.com/couchbasecloud/terraform-provider-couchbase-capella/pull/199/commits/1c7bc529cdd7bbfc7222269d52b42dae676df2cb

l0n3star commented 5 months ago

Can you please also provide the validation proof for all the formats that we can pass and that return a successful response? We currently have only one case included in the validation proof

Sure. Updated PR with more validation.

Talina06 commented 2 months ago

closing as stale, please reopen whenever we are ready for a review. thanks