You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-`client_security` (Attributes) Configure origin URLs which Sentry should accept events from. This is used for communication with clients like [sentry-javascript](https://github.com/getsentry/sentry-javascript). (see [below for nested schema](#nestedatt--client_security))
61
62
-`default_key` (Boolean) Whether to create a default key. By default, Sentry will create a key for you. If you wish to manage keys manually, set this to false and create keys using the `sentry_key` resource.
62
63
-`default_rules` (Boolean) Whether to create a default issue alert. Defaults to true where the behavior is to alert the user on every new issue.
63
64
-`digests_max_delay` (Number) The maximum amount of time (in seconds) to wait between scheduling digests for delivery.
MarkdownDescription: "Configure origin URLs which Sentry should accept events from. This is used for communication with clients like [sentry-javascript](https://github.com/getsentry/sentry-javascript).",
364
+
Optional: true,
365
+
Computed: true,
366
+
Attributes: map[string]schema.Attribute{
367
+
"allowed_domains": schema.SetAttribute{
368
+
MarkdownDescription: "A list of allowed domains. Examples: https://example.com, *, *.example.com, *:80.",
369
+
ElementType: types.StringType,
370
+
Optional: true,
371
+
Computed: true,
372
+
Validators: []validator.Set{
373
+
setvalidator.SizeAtLeast(1),
374
+
},
375
+
PlanModifiers: []planmodifier.Set{
376
+
setplanmodifier.UseStateForUnknown(),
377
+
},
378
+
},
379
+
"scrape_javascript": schema.BoolAttribute{
380
+
MarkdownDescription: "Enable JavaScript source fetching. Allow Sentry to scrape missing JavaScript source context when possible.",
381
+
Optional: true,
382
+
Computed: true,
383
+
PlanModifiers: []planmodifier.Bool{
384
+
boolplanmodifier.UseStateForUnknown(),
385
+
},
386
+
},
387
+
"security_token": schema.StringAttribute{
388
+
MarkdownDescription: "Security Token. Outbound requests matching Allowed Domains will have the header \"{security_token_header}: {security_token}\" appended.",
389
+
Optional: true,
390
+
Computed: true,
391
+
PlanModifiers: []planmodifier.String{
392
+
stringplanmodifier.UseStateForUnknown(),
393
+
},
394
+
},
395
+
"security_token_header": schema.StringAttribute{
396
+
MarkdownDescription: "Security Token Header. Outbound requests matching Allowed Domains will have the header \"{security_token_header}: {security_token}\" appended.",
397
+
Optional: true,
398
+
Computed: true,
399
+
Validators: []validator.String{
400
+
stringvalidator.LengthAtMost(20),
401
+
},
402
+
PlanModifiers: []planmodifier.String{
403
+
stringplanmodifier.UseStateForUnknown(),
404
+
},
405
+
},
406
+
"verify_tls_ssl": schema.BoolAttribute{
407
+
MarkdownDescription: "Verify TLS/SSL. Outbound requests will verify TLS (sometimes known as SSL) connections.",
0 commit comments