Created
April 16, 2025 12:35
-
-
Save PI-Victor/c25dec41d328e622544989001ed22e7a to your computer and use it in GitHub Desktop.
fallback_domains
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
➜ cloudflare-tf TF_LOG=DEBUG terraform apply | |
2025-04-16T14:31:45.764+0200 [INFO] Terraform version: 1.11.3 | |
2025-04-16T14:31:45.764+0200 [DEBUG] using github.com/hashicorp/go-tfe v1.70.0 | |
2025-04-16T14:31:45.764+0200 [DEBUG] using github.com/hashicorp/hcl/v2 v2.23.0 | |
2025-04-16T14:31:45.764+0200 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1 | |
2025-04-16T14:31:45.764+0200 [DEBUG] using github.com/zclconf/go-cty v1.16.0 | |
2025-04-16T14:31:45.764+0200 [INFO] Go runtime version: go1.24.1 | |
2025-04-16T14:31:45.764+0200 [INFO] CLI args: []string{"terraform", "apply"} | |
2025-04-16T14:31:45.764+0200 [DEBUG] Attempting to open CLI config file: /Users/vicp/.terraformrc | |
2025-04-16T14:31:45.764+0200 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2025-04-16T14:31:45.764+0200 [INFO] Loading CLI configuration from /Users/vicp/.terraform.d/credentials.tfrc.json | |
2025-04-16T14:31:45.764+0200 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2025-04-16T14:31:45.764+0200 [DEBUG] ignoring non-existing provider search directory /Users/vicp/.terraform.d/plugins | |
2025-04-16T14:31:45.764+0200 [DEBUG] ignoring non-existing provider search directory /Users/vicp/Library/Application Support/io.terraform/plugins | |
2025-04-16T14:31:45.764+0200 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2025-04-16T14:31:45.764+0200 [INFO] CLI command args: []string{"apply"} | |
2025-04-16T14:31:45.856+0200 [DEBUG] checking for provisioner in "." | |
2025-04-16T14:31:45.857+0200 [DEBUG] checking for provisioner in "/Users/vicp/.flox/run/aarch64-darwin.default.run/bin" | |
2025-04-16T14:31:45.857+0200 [INFO] backend/local: starting Apply operation | |
2025-04-16T14:31:45.858+0200 [DEBUG] created provider logger: level=debug | |
2025-04-16T14:31:45.858+0200 [INFO] provider: configuring client automatic mTLS | |
2025-04-16T14:31:45.865+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 args=[".terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0"] | |
2025-04-16T14:31:45.871+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 pid=52243 | |
2025-04-16T14:31:45.871+0200 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 | |
2025-04-16T14:31:45.893+0200 [INFO] provider.terraform-provider-cloudflare_v5.3.0: configuring server automatic mTLS: timestamp="2025-04-16T14:31:45.892+0200" | |
2025-04-16T14:31:45.899+0200 [DEBUG] provider: using plugin: version=6 | |
2025-04-16T14:31:45.899+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: plugin address: address=/var/folders/h9/hm3xj99138z9lg659bn8zbs80000gn/T/plugin2472547175 network=unix timestamp="2025-04-16T14:31:45.899+0200" | |
2025-04-16T14:31:45.949+0200 [DEBUG] No provider meta schema returned | |
2025-04-16T14:31:45.961+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2025-04-16T14:31:45.963+0200 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 id=52243 | |
2025-04-16T14:31:45.963+0200 [DEBUG] provider: plugin exited | |
2025-04-16T14:31:45.963+0200 [DEBUG] created provider logger: level=debug | |
2025-04-16T14:31:45.963+0200 [INFO] provider: configuring client automatic mTLS | |
2025-04-16T14:31:45.966+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/random/3.6.3/darwin_arm64/terraform-provider-random_v3.6.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/random/3.6.3/darwin_arm64/terraform-provider-random_v3.6.3_x5"] | |
2025-04-16T14:31:45.969+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/random/3.6.3/darwin_arm64/terraform-provider-random_v3.6.3_x5 pid=52247 | |
2025-04-16T14:31:45.969+0200 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/random/3.6.3/darwin_arm64/terraform-provider-random_v3.6.3_x5 | |
2025-04-16T14:31:45.976+0200 [INFO] provider.terraform-provider-random_v3.6.3_x5: configuring server automatic mTLS: timestamp="2025-04-16T14:31:45.976+0200" | |
2025-04-16T14:31:45.983+0200 [DEBUG] provider.terraform-provider-random_v3.6.3_x5: plugin address: address=/var/folders/h9/hm3xj99138z9lg659bn8zbs80000gn/T/plugin2815406128 network=unix timestamp="2025-04-16T14:31:45.983+0200" | |
2025-04-16T14:31:45.983+0200 [DEBUG] provider: using plugin: version=5 | |
2025-04-16T14:31:45.989+0200 [DEBUG] No provider meta schema returned | |
2025-04-16T14:31:45.989+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2025-04-16T14:31:45.990+0200 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/random/3.6.3/darwin_arm64/terraform-provider-random_v3.6.3_x5 id=52247 | |
2025-04-16T14:31:45.990+0200 [DEBUG] provider: plugin exited | |
2025-04-16T14:31:45.990+0200 [DEBUG] Building and walking validate graph | |
2025-04-16T14:31:45.990+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:45.990+0200 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/random"] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" references: [cloudflare_zero_trust_device_custom_profile.warp_profiles local.account_id (expand)] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "var.sit_api_token" references: [] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "local.api_token (expand)" references: [var.sit_api_token] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" references: [local.account_id (expand)] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "var.sit_account_id" references: [] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "var.sit_zone_id" references: [] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "local.dlp_entries (expand)" references: [] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "local.account_id (expand)" references: [var.sit_account_id] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "local.zone_id (expand)" references: [var.sit_zone_id] | |
2025-04-16T14:31:45.990+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/cloudflare/cloudflare\"]" references: [local.api_token (expand)] | |
2025-04-16T14:31:45.991+0200 [DEBUG] Starting graph walk: walkValidate | |
2025-04-16T14:31:45.991+0200 [DEBUG] created provider logger: level=debug | |
2025-04-16T14:31:45.991+0200 [INFO] provider: configuring client automatic mTLS | |
2025-04-16T14:31:45.994+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 args=[".terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0"] | |
2025-04-16T14:31:46.003+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 pid=52322 | |
2025-04-16T14:31:46.004+0200 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 | |
2025-04-16T14:31:46.030+0200 [INFO] provider.terraform-provider-cloudflare_v5.3.0: configuring server automatic mTLS: timestamp="2025-04-16T14:31:46.029+0200" | |
2025-04-16T14:31:46.036+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: plugin address: network=unix address=/var/folders/h9/hm3xj99138z9lg659bn8zbs80000gn/T/plugin2092029120 timestamp="2025-04-16T14:31:46.036+0200" | |
2025-04-16T14:31:46.036+0200 [DEBUG] provider: using plugin: version=6 | |
2025-04-16T14:31:46.042+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:46.046+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:46.047+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2025-04-16T14:31:46.049+0200 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 id=52322 | |
2025-04-16T14:31:46.049+0200 [DEBUG] provider: plugin exited | |
2025-04-16T14:31:46.049+0200 [INFO] backend/local: apply calling Plan | |
2025-04-16T14:31:46.049+0200 [DEBUG] Building and walking plan graph for NormalMode | |
2025-04-16T14:31:46.049+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.049+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.049+0200 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/random"] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "local.dlp_entries (expand)" references: [] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "local.account_id (expand)" references: [var.sit_account_id] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "local.zone_id (expand)" references: [var.sit_zone_id] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" references: [cloudflare_zero_trust_device_custom_profile.warp_profiles (expand) local.account_id (expand)] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "local.api_token (expand)" references: [var.sit_api_token] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/cloudflare/cloudflare\"]" references: [local.api_token (expand)] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" references: [local.account_id (expand)] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "var.sit_account_id" references: [] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "var.sit_zone_id" references: [] | |
2025-04-16T14:31:46.050+0200 [DEBUG] ReferenceTransformer: "var.sit_api_token" references: [] | |
2025-04-16T14:31:46.050+0200 [DEBUG] Starting graph walk: walkPlan | |
2025-04-16T14:31:46.050+0200 [DEBUG] created provider logger: level=debug | |
2025-04-16T14:31:46.050+0200 [INFO] provider: configuring client automatic mTLS | |
2025-04-16T14:31:46.053+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 args=[".terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0"] | |
2025-04-16T14:31:46.059+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 pid=52396 | |
2025-04-16T14:31:46.059+0200 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 | |
2025-04-16T14:31:46.081+0200 [INFO] provider.terraform-provider-cloudflare_v5.3.0: configuring server automatic mTLS: timestamp="2025-04-16T14:31:46.081+0200" | |
2025-04-16T14:31:46.088+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: plugin address: address=/var/folders/h9/hm3xj99138z9lg659bn8zbs80000gn/T/plugin3697163432 network=unix timestamp="2025-04-16T14:31:46.088+0200" | |
2025-04-16T14:31:46.088+0200 [DEBUG] provider: using plugin: version=6 | |
2025-04-16T14:31:46.095+0200 [DEBUG] Resource instance state not found for node "cloudflare_zero_trust_device_custom_profile.warp_profiles", instance cloudflare_zero_trust_device_custom_profile.warp_profiles | |
2025-04-16T14:31:46.095+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" references: [] | |
2025-04-16T14:31:46.095+0200 [DEBUG] refresh: cloudflare_zero_trust_device_custom_profile.warp_profiles: no state, so not refreshing | |
2025-04-16T14:31:46.095+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Marking Computed attributes with null configuration values as unknown (known after apply) in the plan to prevent potential Terraform errors: @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:229 tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 timestamp="2025-04-16T14:31:46.099+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_attribute_path="AttributeName(\"target_tests\")" tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_attribute_path="AttributeName(\"exclude\")" tf_resource_type=cloudflare_zero_trust_device_custom_profile @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @module=sdk.framework tf_attribute_path="AttributeName(\"policy_id\")" tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_rpc=PlanResourceChange tf_attribute_path="AttributeName(\"id\")" tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_attribute_path="AttributeName(\"default\")" tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_attribute_path="AttributeName(\"fallback_domains\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=PlanResourceChange @module=sdk.framework tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_attribute_path="AttributeName(\"include\")" tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_attribute_path="AttributeName(\"gateway_unique_id\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.100+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_attribute_path="AttributeName(\"service_mode_v2\")" tf_resource_type=cloudflare_zero_trust_device_custom_profile @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=63079f23-a842-87b7-73d8-48151660ec57 tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:46.100+0200" | |
2025-04-16T14:31:46.102+0200 [DEBUG] Resource instance state not found for node "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains", instance cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains | |
2025-04-16T14:31:46.102+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" references: [] | |
2025-04-16T14:31:46.102+0200 [DEBUG] refresh: cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains: no state, so not refreshing | |
2025-04-16T14:31:46.102+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:46.105+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Marking Computed attributes with null configuration values as unknown (known after apply) in the plan to prevent potential Terraform errors: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 @module=sdk.framework tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:229 timestamp="2025-04-16T14:31:46.105+0200" | |
2025-04-16T14:31:46.105+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_attribute_path="AttributeName(\"suffix\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework timestamp="2025-04-16T14:31:46.105+0200" | |
2025-04-16T14:31:46.105+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback @module=sdk.framework tf_attribute_path="AttributeName(\"description\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 timestamp="2025-04-16T14:31:46.105+0200" | |
2025-04-16T14:31:46.105+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @module=sdk.framework tf_attribute_path="AttributeName(\"dns_server\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:46.105+0200" | |
2025-04-16T14:31:46.105+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_attribute_path="AttributeName(\"id\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:46.105+0200" | |
2025-04-16T14:31:46.106+0200 [WARN] provider.terraform-provider-cloudflare_v5.3.0: Response contains warning diagnostic: diagnostic_severity=WARNING diagnostic_summary="Resource Destruction Considerations" tf_proto_version=6.8 tf_req_id=677a8b58-17a4-3d51-ee2b-15c00c6a4867 tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/tfprotov6/internal/diag/diagnostics.go:60 @module=sdk.proto diagnostic_detail="This resource cannot be destroyed from Terraform. If you create this resource, it will be present in the API until manually deleted." tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-04-16T14:31:46.106+0200" | |
2025-04-16T14:31:46.106+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2025-04-16T14:31:46.109+0200 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 id=52396 | |
2025-04-16T14:31:46.109+0200 [DEBUG] provider: plugin exited | |
2025-04-16T14:31:46.109+0200 [DEBUG] building apply graph to check for errors | |
2025-04-16T14:31:46.109+0200 [DEBUG] Resource state not found for node "cloudflare_zero_trust_device_custom_profile.warp_profiles", instance cloudflare_zero_trust_device_custom_profile.warp_profiles | |
2025-04-16T14:31:46.109+0200 [DEBUG] Resource state not found for node "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains", instance cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains | |
2025-04-16T14:31:46.109+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:46.109+0200 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/random"] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/cloudflare/cloudflare\"]" references: [local.api_token (expand)] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" references: [local.account_id (expand)] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "var.sit_zone_id" references: [] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "var.sit_account_id" references: [] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "local.zone_id (expand)" references: [var.sit_zone_id] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "local.account_id (expand)" references: [var.sit_account_id] | |
2025-04-16T14:31:46.109+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" references: [local.account_id (expand)] | |
2025-04-16T14:31:46.110+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" references: [local.account_id (expand) cloudflare_zero_trust_device_custom_profile.warp_profiles (expand) cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles] | |
2025-04-16T14:31:46.110+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" references: [cloudflare_zero_trust_device_custom_profile.warp_profiles (expand) cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles local.account_id (expand)] | |
2025-04-16T14:31:46.110+0200 [DEBUG] ReferenceTransformer: "var.sit_api_token" references: [] | |
2025-04-16T14:31:46.110+0200 [DEBUG] ReferenceTransformer: "local.api_token (expand)" references: [var.sit_api_token] | |
2025-04-16T14:31:46.110+0200 [DEBUG] ReferenceTransformer: "local.dlp_entries (expand)" references: [] | |
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
# cloudflare_zero_trust_device_custom_profile.warp_profiles will be created | |
+ resource "cloudflare_zero_trust_device_custom_profile" "warp_profiles" { | |
+ account_id = "redacted" | |
+ default = (known after apply) | |
+ exclude = (known after apply) | |
+ fallback_domains = (known after apply) | |
+ gateway_unique_id = (known after apply) | |
+ id = (known after apply) | |
+ include = (known after apply) | |
+ match = "os.name in {\"windows\" \"mac\"}" | |
+ name = "test-profile" | |
+ policy_id = (known after apply) | |
+ precedence = 255 | |
+ service_mode_v2 = (known after apply) | |
+ target_tests = (known after apply) | |
} | |
# cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains will be created | |
+ resource "cloudflare_zero_trust_device_custom_profile_local_domain_fallback" "fallback_domains" { | |
+ account_id = "redacted" | |
+ description = (known after apply) | |
+ dns_server = (known after apply) | |
+ domains = [ | |
+ { | |
+ description = "Example domain" | |
+ dns_server = [ | |
+ "1.1.1.1", | |
] | |
+ suffix = "example.com" | |
}, | |
] | |
+ id = (known after apply) | |
+ policy_id = (known after apply) | |
+ suffix = (known after apply) | |
} | |
Plan: 2 to add, 0 to change, 0 to destroy. | |
╷ | |
│ Warning: Resource Destruction Considerations | |
│ | |
│ with cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains, | |
│ on fallback_domains.tf line 2, in resource "cloudflare_zero_trust_device_custom_profile_local_domain_fallback" "fallback_domains": | |
│ 2: resource "cloudflare_zero_trust_device_custom_profile_local_domain_fallback" "fallback_domains" { | |
│ | |
│ This resource cannot be destroyed from Terraform. If you create this resource, it will be present in the API until manually deleted. | |
╵ | |
2025-04-16T14:31:46.113+0200 [DEBUG] command: asking for input: "\nDo you want to perform these actions?" | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
2025-04-16T14:31:47.210+0200 [INFO] backend/local: apply calling Apply | |
2025-04-16T14:31:47.210+0200 [DEBUG] Building and walking apply graph for NormalMode plan | |
2025-04-16T14:31:47.211+0200 [DEBUG] Resource state not found for node "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains", instance cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains | |
2025-04-16T14:31:47.211+0200 [DEBUG] Resource state not found for node "cloudflare_zero_trust_device_custom_profile.warp_profiles", instance cloudflare_zero_trust_device_custom_profile.warp_profiles | |
2025-04-16T14:31:47.211+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:47.211+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:47.212+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:47.212+0200 [DEBUG] ProviderTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/cloudflare/cloudflare"] | |
2025-04-16T14:31:47.212+0200 [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/random"] | |
2025-04-16T14:31:47.212+0200 [DEBUG] ReferenceTransformer: "var.sit_zone_id" references: [] | |
2025-04-16T14:31:47.212+0200 [DEBUG] ReferenceTransformer: "local.api_token (expand)" references: [var.sit_api_token] | |
2025-04-16T14:31:47.212+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles" references: [local.account_id (expand)] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile.warp_profiles (expand)" references: [local.account_id (expand)] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "var.sit_api_token" references: [] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "var.sit_account_id" references: [] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "local.dlp_entries (expand)" references: [] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "local.account_id (expand)" references: [var.sit_account_id] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "local.zone_id (expand)" references: [var.sit_zone_id] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" references: [cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles (expand) local.account_id (expand)] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/cloudflare/cloudflare\"]" references: [local.api_token (expand)] | |
2025-04-16T14:31:47.213+0200 [DEBUG] ReferenceTransformer: "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains (expand)" references: [cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles cloudflare_zero_trust_device_custom_profile.warp_profiles (expand) local.account_id (expand)] | |
2025-04-16T14:31:47.215+0200 [DEBUG] Starting graph walk: walkApply | |
2025-04-16T14:31:47.216+0200 [DEBUG] created provider logger: level=debug | |
2025-04-16T14:31:47.216+0200 [INFO] provider: configuring client automatic mTLS | |
2025-04-16T14:31:47.223+0200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 args=[".terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0"] | |
2025-04-16T14:31:47.232+0200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 pid=52426 | |
2025-04-16T14:31:47.232+0200 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 | |
2025-04-16T14:31:47.256+0200 [INFO] provider.terraform-provider-cloudflare_v5.3.0: configuring server automatic mTLS: timestamp="2025-04-16T14:31:47.255+0200" | |
2025-04-16T14:31:47.262+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: plugin address: address=/var/folders/h9/hm3xj99138z9lg659bn8zbs80000gn/T/plugin3208656455 network=unix timestamp="2025-04-16T14:31:47.262+0200" | |
2025-04-16T14:31:47.262+0200 [DEBUG] provider: using plugin: version=6 | |
2025-04-16T14:31:47.268+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:47.273+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Marking Computed attributes with null configuration values as unknown (known after apply) in the plan to prevent potential Terraform errors: tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:229 timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.273+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @module=sdk.framework tf_attribute_path="AttributeName(\"policy_id\")" tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.273+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_attribute_path="AttributeName(\"include\")" @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.273+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_rpc=PlanResourceChange tf_attribute_path="AttributeName(\"default\")" tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.273+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_attribute_path="AttributeName(\"id\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.274+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=sdk.framework tf_attribute_path="AttributeName(\"service_mode_v2\")" tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_rpc=PlanResourceChange timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.274+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_rpc=PlanResourceChange tf_attribute_path="AttributeName(\"fallback_domains\")" tf_resource_type=cloudflare_zero_trust_device_custom_profile @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework timestamp="2025-04-16T14:31:47.273+0200" | |
2025-04-16T14:31:47.274+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @module=sdk.framework tf_attribute_path="AttributeName(\"exclude\")" tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:47.274+0200" | |
2025-04-16T14:31:47.274+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=sdk.framework tf_attribute_path="AttributeName(\"target_tests\")" timestamp="2025-04-16T14:31:47.274+0200" | |
2025-04-16T14:31:47.274+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=a4c0b458-4ff7-0efc-47e7-0c4077290a71 tf_rpc=PlanResourceChange tf_attribute_path="AttributeName(\"gateway_unique_id\")" tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:47.274+0200" | |
cloudflare_zero_trust_device_custom_profile.warp_profiles: Creating... | |
2025-04-16T14:31:47.275+0200 [INFO] Starting apply for cloudflare_zero_trust_device_custom_profile.warp_profiles | |
2025-04-16T14:31:47.276+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:47.276+0200 [DEBUG] cloudflare_zero_trust_device_custom_profile.warp_profiles: applying the planned Create change | |
2025-04-16T14:31:47.277+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: | |
POST /client/v4/accounts/redacted/devices/policy HTTP/1.1 | |
> x-stainless-arch: arm64 | |
> accept: application/json | |
> x-stainless-lang: Terraform | |
> x-stainless-runtime-version: 1.14.1 | |
> user-agent: terraform-provider-cloudflare/5.3.0 terraform-plugin-framework/1.14.1 terraform/1.11.3 | |
> x-stainless-package-version: 5.3.0 | |
> x-stainless-runtime: terraform-plugin-framework | |
> authorization: [redacted] | |
> content-type: application/json | |
> x-auth-email: [redacted] | |
> x-stainless-retry-count: 0 | |
> x-stainless-os: MacOS | |
> | |
{"match":"os.name in {\"windows\" \"mac\"}","name":"test-profile","precedence":255} | |
: @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=cloudflare tf_rpc=ApplyResourceChange timestamp="2025-04-16T14:31:47.277+0200" | |
2025-04-16T14:31:48.317+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: | |
< HTTP/2.0 200 OK | |
< cf-cache-status: DYNAMIC | |
< api-version: 2025-04-16 | |
< content-type: application/json; charset=utf-8 | |
< server: cloudflare | |
< date: Wed, 16 Apr 2025 12:31:48 GMT | |
< vary: Accept-Encoding | |
< nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} | |
< cf-ray: 9313b3a0d97cbc6b-ZRH | |
< cf-auditlog-id: 01963e95-8099-71ae-aea6-7becc3f2efd1 | |
< report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=H7lZ1d12VRQCvIg7r%2Fte%2B31ZvDvvYClWtTc8qcr%2BVxcby6wHgkeMgsUtfX95vOftfzILiL5zE%2FnmSXsNAzzjzP1KjvQl1zwdsp7zA57gAc8BteduuANQRXRSta9F6O5qb93qxjAJkcz%2FNCG7fHB3ADvpZlObr6FoRDwhq8jM"}],"group":"cf-nel","max_age":604800} | |
< set-cookie: __cf_bm=HOUX6XqKBCUU7iK00NaZbaGVzIhmCXB5FuCqW8xI4n0-1744806708-1.0.1.1-b.j3XaQDq4ix.4TXL1OhMsjYle8w1v.VJ0S2msiecsj4qDzOabLnL3nUiE4doncvX9tO0JoCmqSEXT_FsAs_xQpdIwLfgx1vN5.S2GWb7Vw; path=/; expires=Wed, 16-Apr-25 13:01:48 GMT; domain=.cloudflareclient.com; HttpOnly; Secure; SameSite=None | |
< set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuPJKssxf8P97; SameSite=Lax; path=/; expires=Wed, 16-Apr-25 15:01:49 GMT; HttpOnly | |
< set-cookie: __cf_bm=xKtWHOIHYiFMJasMu_UuwSa_P25S_tBiUv30S5b6nSA-1744806708-1.0.1.1-bgx.eCQtdBBDgRrZ0IWHo.2kNSqIEV7YUIwm8uuiP5jcsjg1cv2kP9DaRVhdpWmdI5vmzK1rlViuiAgJicD4pF4nsgT7IDFtu2IBBfQYGos; path=/; expires=Wed, 16-Apr-25 13:01:48 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
< set-cookie: _cfuvid=lg1jQflX_mc0iTLLLj2gqIWvTHyq4ix5.InpTvEJXcw-1744806708233-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
< | |
{"result":{"policy_id":"d4cec026-7765-42b2-9090-8845f02b1c30","name":"test-profile","description":"","default":false,"enabled":true,"match":"os.name in {\"windows\" \"mac\"}","precedence":255,"allow_mode_switch":false,"allow_updates":false,"allowed_to_leave":true,"auto_connect":0,"captive_portal":180,"disable_auto_fallback":false,"service_mode_v2":{"mode":"warp"},"gateway_unique_id":"redacted","support_url":"","switch_locked":false,"exclude":[{"address":"10.0.0.0/8"},{"address":"100.64.0.0/10"},{"address":"169.254.0.0/16","description":"DHCP Unspecified"},{"address":"172.16.0.0/12"},{"address":"192.0.0.0/24"},{"address":"192.168.0.0/16"},{"address":"224.0.0.0/24"},{"address":"240.0.0.0/4"},{"address":"255.255.255.255/32","description":"DHCP Broadcast"},{"address":"fe80::/10","description":"IPv6 Link Local"},{"address":"fd00::/8"},{"address":"ff01::/16"},{"address":"ff02::/16"},{"address":"ff03::/16"},{"address":"ff04::/16"},{"address":"ff05::/16"}],"always_include":[{"ip":"162.159.197.4"},{"ip":"2606:4700:102::4"}],"always_exclude":[{"ip":"162.159.197.3"},{"ip":"2606:4700:102::3"}],"exclude_office_ips":false,"fallback_domains":[{"suffix":"home.arpa"},{"suffix":"intranet"},{"suffix":"internal"},{"suffix":"private"},{"suffix":"localdomain"},{"suffix":"domain"},{"suffix":"lan"},{"suffix":"home"},{"suffix":"host"},{"suffix":"corp"},{"suffix":"local"},{"suffix":"localhost"},{"suffix":"invalid"},{"suffix":"test"}],"register_interface_ip_with_dns":true,"tunnel_protocol":""},"success":true,"errors":[],"messages":[]} | |
: tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_rpc=ApplyResourceChange tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 @module=cloudflare timestamp="2025-04-16T14:31:48.317+0200" | |
2025-04-16T14:31:48.321+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=ApplyResourceChange tf_provider_addr=registry.terraform.io/cloudflare/cloudflare @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 @module=sdk.framework tf_attribute_path=match timestamp="2025-04-16T14:31:48.321+0200" | |
2025-04-16T14:31:48.322+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_attribute_path=precedence tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_resource_type=cloudflare_zero_trust_device_custom_profile tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 timestamp="2025-04-16T14:31:48.322+0200" | |
2025-04-16T14:31:48.322+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_attribute_path=account_id tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_resource_type=cloudflare_zero_trust_device_custom_profile @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 timestamp="2025-04-16T14:31:48.322+0200" | |
2025-04-16T14:31:48.322+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=27ea1519-80c7-4d98-f63e-1da2da6cf11e tf_rpc=ApplyResourceChange tf_attribute_path=name tf_resource_type=cloudflare_zero_trust_device_custom_profile timestamp="2025-04-16T14:31:48.322+0200" | |
cloudflare_zero_trust_device_custom_profile.warp_profiles: Creation complete after 1s [id=d4cec026-7765-42b2-9090-8845f02b1c30] | |
2025-04-16T14:31:48.332+0200 [DEBUG] State storage *statemgr.Filesystem declined to persist a state snapshot | |
2025-04-16T14:31:48.333+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:48.336+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Marking Computed attributes with null configuration values as unknown (known after apply) in the plan to prevent potential Terraform errors: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f @module=sdk.framework tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:229 timestamp="2025-04-16T14:31:48.336+0200" | |
2025-04-16T14:31:48.336+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_attribute_path="AttributeName(\"id\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback @module=sdk.framework tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 timestamp="2025-04-16T14:31:48.336+0200" | |
2025-04-16T14:31:48.336+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 tf_attribute_path="AttributeName(\"suffix\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare @module=sdk.framework tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f timestamp="2025-04-16T14:31:48.336+0200" | |
2025-04-16T14:31:48.336+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 @module=sdk.framework tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=PlanResourceChange tf_attribute_path="AttributeName(\"description\")" timestamp="2025-04-16T14:31:48.336+0200" | |
2025-04-16T14:31:48.336+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: marking computed attribute that is null in the config as unknown: @module=sdk.framework tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_attribute_path="AttributeName(\"dns_server\")" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f tf_rpc=PlanResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwserver/server_planresourcechange.go:480 timestamp="2025-04-16T14:31:48.336+0200" | |
2025-04-16T14:31:48.337+0200 [WARN] provider.terraform-provider-cloudflare_v5.3.0: Response contains warning diagnostic: diagnostic_summary="Resource Destruction Considerations" tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=b59ff3ae-1c23-4a5a-c77c-aaf4e0355a8f tf_rpc=PlanResourceChange @module=sdk.proto diagnostic_severity=WARNING tf_proto_version=6.8 tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback @caller=github.com/hashicorp/[email protected]/tfprotov6/internal/diag/diagnostics.go:60 diagnostic_detail="This resource cannot be destroyed from Terraform. If you create this resource, it will be present in the API until manually deleted." timestamp="2025-04-16T14:31:48.337+0200" | |
cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains: Creating... | |
2025-04-16T14:31:48.337+0200 [INFO] Starting apply for cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains | |
2025-04-16T14:31:48.338+0200 [DEBUG] skipping FixUpBlockAttrs | |
2025-04-16T14:31:48.338+0200 [DEBUG] cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains: applying the planned Create change | |
2025-04-16T14:31:48.339+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: | |
PUT /client/v4/accounts/redacted/devices/policy/d4cec026-7765-42b2-9090-8845f02b1c30/fallback_domains HTTP/1.1 | |
> user-agent: terraform-provider-cloudflare/5.3.0 terraform-plugin-framework/1.14.1 terraform/1.11.3 | |
> x-stainless-runtime: terraform-plugin-framework | |
> x-stainless-retry-count: 0 | |
> x-stainless-lang: Terraform | |
> x-stainless-package-version: 5.3.0 | |
> content-type: application/json | |
> x-stainless-arch: arm64 | |
> authorization: [redacted] | |
> x-stainless-os: MacOS | |
> accept: application/json | |
> x-stainless-runtime-version: 1.14.1 | |
> x-auth-email: [redacted] | |
> | |
[{"description":"Example domain","dns_server":["1.1.1.1"],"suffix":"example.com"}] | |
: @module=cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:64 timestamp="2025-04-16T14:31:48.339+0200" | |
2025-04-16T14:31:48.666+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: | |
< HTTP/2.0 200 OK | |
< date: Wed, 16 Apr 2025 12:31:48 GMT | |
< cf-ray: 9313b3a74d5bbc6b-ZRH | |
< cf-cache-status: DYNAMIC | |
< set-cookie: __cf_bm=Arw09DvOe8cEHJ.97bi1p1wygkvrYJsxs.ZT7rww2Ro-1744806708-1.0.1.1-1AqS7TfNZK8b_RwedheCurT8PK2ztrX9GI8BhdZmBpDCZ3LcF2kLdPAeehnu6hw_DbVm_ISrzP0H1Bjdr4yEcIOg.ACYAB_o09Cr1MZP6oU; path=/; expires=Wed, 16-Apr-25 13:01:48 GMT; domain=.cloudflareclient.com; HttpOnly; Secure; SameSite=None | |
< set-cookie: __cflb=0H28vgHxwvgAQtjUGU4yFBDJQfw1pfzuPU2YtmUczQd; SameSite=Lax; path=/; expires=Wed, 16-Apr-25 15:01:49 GMT; HttpOnly | |
< set-cookie: __cf_bm=ippjUyhIj9s.xzdZNSm_YhPlgCjlddkfAxL0ZqvVqqo-1744806708-1.0.1.1-p0pzC0PDe3dZGo2mJvMXe7mu7i07mSI_0l.8uGcYr2.xEEN6JEyAA9Geqf1Md4TH0caSSqXkKwenmYEdE8gmBBYgzu4195axf8Tq1tOFeg0; path=/; expires=Wed, 16-Apr-25 13:01:48 GMT; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
< set-cookie: _cfuvid=uROx8r1.Pluphk84df0b611rFUA6u_0tJXDbeUycWiw-1744806708681-0.0.1.1-604800000; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None | |
< nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} | |
< content-type: application/json; charset=utf-8 | |
< vary: Accept-Encoding | |
< cf-auditlog-id: 01963e95-8497-7d10-a4a3-0218e049e002 | |
< server: cloudflare | |
< api-version: 2025-04-16 | |
< report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HpkCaDElZlzuGhUmYzK2z4emVxcgHsesVe4zJPxmepQ9TNjqu0qDCCanaoppInYn%2FezDcTFAtY2m0idqyrJGnhFedtTJ%2Bn4PToJGRarz2W1jMpEY2kGDxPomXXOfAX4FUX%2Bs4AkA4ktQNgF4kkvVOQdKobna9YLPZqJ4RLDD"}],"group":"cf-nel","max_age":604800} | |
< | |
{"result":[{"suffix":"example.com","description":"Example domain","dns_server":["1.1.1.1"]}],"success":true,"errors":[],"messages":[]} | |
: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba @caller=github.com/cloudflare/terraform-provider-cloudflare/internal/logging/logging.go:92 @module=cloudflare timestamp="2025-04-16T14:31:48.666+0200" | |
2025-04-16T14:31:48.667+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: @module=sdk.framework tf_attribute_path=policy_id tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange timestamp="2025-04-16T14:31:48.667+0200" | |
2025-04-16T14:31:48.667+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: @module=sdk.framework tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 tf_attribute_path=account_id tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback timestamp="2025-04-16T14:31:48.667+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 @module=sdk.framework tf_rpc=ApplyResourceChange tf_attribute_path=domains[0].dns_server[0] timestamp="2025-04-16T14:31:48.667+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback @module=sdk.framework tf_attribute_path=domains[0].dns_server timestamp="2025-04-16T14:31:48.668+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: @module=sdk.framework tf_attribute_path=domains[0].suffix tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 timestamp="2025-04-16T14:31:48.668+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 @module=sdk.framework tf_attribute_path=domains[0].description timestamp="2025-04-16T14:31:48.668+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_attribute_path=domains[0] tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange @module=sdk.framework tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 timestamp="2025-04-16T14:31:48.668+0200" | |
2025-04-16T14:31:48.668+0200 [DEBUG] provider.terraform-provider-cloudflare_v5.3.0: Value switched to prior value due to semantic equality logic: tf_attribute_path=domains tf_provider_addr=registry.terraform.io/cloudflare/cloudflare tf_req_id=6c57c8bc-19b7-e77e-1350-2f00c483ebba @module=sdk.framework tf_resource_type=cloudflare_zero_trust_device_custom_profile_local_domain_fallback tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:91 timestamp="2025-04-16T14:31:48.668+0200" | |
2025-04-16T14:31:48.675+0200 [DEBUG] State storage *statemgr.Filesystem declined to persist a state snapshot | |
2025-04-16T14:31:48.675+0200 [ERROR] vertex "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" error: Provider returned invalid result object after apply | |
2025-04-16T14:31:48.675+0200 [ERROR] vertex "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" error: Provider returned invalid result object after apply | |
2025-04-16T14:31:48.675+0200 [ERROR] vertex "cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains" error: Provider returned invalid result object after apply | |
╷ | |
│ Warning: Resource Destruction Considerations | |
│ | |
│ with cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains, | |
│ on fallback_domains.tf line 2, in resource "cloudflare_zero_trust_device_custom_profile_local_domain_fallback" "fallback_domains": | |
│ 2: resource "cloudflare_zero_trust_device_custom_profile_local_domain_fallback" "fallback_domains" { | |
│ | |
│ This resource cannot be destroyed from Terraform. If you create this resource, it will be present in the API until manually deleted. | |
╵ | |
╷ | |
│ Error: Provider returned invalid result object after apply | |
│ | |
│ After the apply operation, the provider still indicated an unknown value for | |
│ cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains.description. All values must be known after apply, so this is always a bug in | |
│ the provider and should be reported in the provider's own repository. Terraform will still save the other known object values in the state. | |
╵ | |
╷ | |
│ Error: Provider returned invalid result object after apply | |
│ | |
│ After the apply operation, the provider still indicated an unknown value for | |
│ cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains.dns_server. All values must be known after apply, so this is always a bug in | |
│ the provider and should be reported in the provider's own repository. Terraform will still save the other known object values in the state. | |
╵ | |
╷ | |
│ Error: Provider returned invalid result object after apply | |
│ | |
│ After the apply operation, the provider still indicated an unknown value for | |
│ cloudflare_zero_trust_device_custom_profile_local_domain_fallback.fallback_domains.suffix. All values must be known after apply, so this is always a bug in the | |
│ provider and should be reported in the provider's own repository. Terraform will still save the other known object values in the state. | |
╵ | |
2025-04-16T14:31:48.682+0200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF" | |
2025-04-16T14:31:48.688+0200 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/cloudflare/cloudflare/5.3.0/darwin_arm64/terraform-provider-cloudflare_v5.3.0 id=52426 | |
2025-04-16T14:31:48.688+0200 [DEBUG] provider: plugin exited |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment