Some checks are pending
Cloudflare Registry Validation / validate-registry (push) Waiting to run
2.7 KiB
2.7 KiB
Assurance Run — 2025-12-18
- Commit:
7f2e60e1c5 - Tooling:
terraform v1.5.7,python3 3.14.2
| Check | Status | Notes |
|---|---|---|
terraform fmt -recursive |
✅ | Ran from repo root; terraform rewrote any files that diverged from canonical formatting (see git status for changes, if any). |
terraform validate |
⚠️ | After terraform init, validation succeeded but emitted deprecation warnings (cloudflare_access_application and cloudflare_record.value usage). No fixes applied. |
python3 -m py_compile layer0/security_classifier.py scripts/*.py |
✅ | All Layer0 + scripts modules compiled. |
Additional context:
terraform initwas executed to downloadcloudflare/cloudflare v4.52.5so that validation could run;.terraform/and.terraform.lock.hclwere created/updated.- No other files were modified manually during this pass.
Canonical Gates (CI / Audit)
These are the operator-safe, auditor-grade checks expected to pass on every sweep.
1) WAF Intel regression + CLI sanity
From vm-cloudflare/:
# Install dev deps (once)
python3 -m pip install -r requirements-dev.txt
# Full test suite
python3 -m pytest -q
# Analyzer regression only
python3 -m pytest -q tests/test_waf_intelligence_analyzer.py
# WAF Intel CLI (must not emit false "no managed WAF" warnings)
python3 -m mcp.waf_intelligence --file terraform/waf.tf --format json --limit 5 | python3 -m json.tool
Acceptance:
- Exit code 0
- JSON parses
insightsis[](or informational-only; no false"No managed WAF rules detected"warning)
2) Terraform hardening correctness (empty-list safety + plan gates)
From vm-cloudflare/terraform/:
terraform fmt -recursive
terraform init
terraform validate
# Free-plan path (managed WAF + bot mgmt must be gated off even if flags are true)
terraform plan -refresh=false -var-file=assurance_free.tfvars
# Paid-plan path (managed WAF + bot mgmt appear when flags are true)
terraform plan -refresh=false -var-file=assurance_pro.tfvars
Acceptance:
- Both plans succeed (no
{}expression errors) - Paid-plan run includes
cloudflare_ruleset.managed_waf/cloudflare_bot_management.domains - Free-plan run does not include those resources
One-shot (runs all gates + JSON-plan assertions):
bash scripts/waf-and-plan-invariants.sh
Notes for sandboxed runs
Some sandboxed execution environments block Terraform provider plugins from binding unix sockets, which surfaces as:
Unrecognized remote plugin message
...
listen unix ...: bind: operation not permitted
Run Terraform with the necessary OS permissions (or outside the sandbox) in that case.