Show Plan
```
terraform
tls_private_key.terraform_access: Refreshing state... [id=2ffac8d1a1e85232461425b441d27bce00a220c3]
b2_bucket.terraform-state: Refreshing state... [id=c33185c9297d9b5484380d18]
cloudflare_zone_settings_override.tmeit-se-settings: Refreshing state... [id=6a806c0199e15cdf23bb3017a90bf149]
cloudflare_record.mx-1: Refreshing state... [id=01b1e5831a61d592bb2a1fb51fc40a47]
data.cloudflare_api_token_permission_groups.all: Reading...
cloudflare_record.mx-2: Refreshing state... [id=7539dc716260bb768658d6b61e54740e]
hcloud_firewall.myfirewall: Refreshing state... [id=572118]
data.cloudflare_api_token_permission_groups.all: Read complete after 1s [id=37f58c2e50041f9eed30c0006b111b44]
hcloud_server.node1: Refreshing state... [id=24978813]
cloudflare_record.root-aaaa: Refreshing state... [id=eec58a7b6d17f1a40f411efb35d4da22]
cloudflare_record.www-aaaa: Refreshing state... [id=9f7b0d63a18b5513abb8db23ce62cd46]
hcloud_rdns.node1_ipv4: Refreshing state... [id=s-24978813-65.21.188.62]
hcloud_rdns.node1_ipv6: Refreshing state... [id=s-24978813-2a01:4f9:c012:6063::1]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# cloudflare_api_token.dns_validation_token will be created
+ resource "cloudflare_api_token" "dns_validation_token" {
+ id = (known after apply)
+ issued_on = (known after apply)
+ modified_on = (known after apply)
+ name = "dns_validation_token"
+ status = (known after apply)
+ value = (sensitive value)
+ condition {
+ request_ip {
+ in = [
+ "2a01:4f9:c012:6063::1/64",
+ "65.21.188.62/32",
]
}
}
+ policy {
+ effect = "allow"
+ permission_groups = [
+ "4755a26eedb94da69e1066d98aa820be",
]
+ resources = {
+ "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*"
}
}
}
Plan: 1 to add, 0 to change, 0 to destroy.
Changes to Outputs:
+ cloudflare-le-token = (sensitive value)
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
```
Terraform Lint/Plan Results
Terraform Format and Style 🖌
success
Terraform Initialization ⚙️
success
Terraform Plan 📖
success
Terraform Validation 🤖
success
Show Plan
``` terraform tls_private_key.terraform_access: Refreshing state... [id=2ffac8d1a1e85232461425b441d27bce00a220c3] b2_bucket.terraform-state: Refreshing state... [id=c33185c9297d9b5484380d18] cloudflare_zone_settings_override.tmeit-se-settings: Refreshing state... [id=6a806c0199e15cdf23bb3017a90bf149] cloudflare_record.mx-1: Refreshing state... [id=01b1e5831a61d592bb2a1fb51fc40a47] data.cloudflare_api_token_permission_groups.all: Reading... cloudflare_record.mx-2: Refreshing state... [id=7539dc716260bb768658d6b61e54740e] hcloud_firewall.myfirewall: Refreshing state... [id=572118] data.cloudflare_api_token_permission_groups.all: Read complete after 1s [id=37f58c2e50041f9eed30c0006b111b44] hcloud_server.node1: Refreshing state... [id=24978813] cloudflare_record.root-aaaa: Refreshing state... [id=eec58a7b6d17f1a40f411efb35d4da22] cloudflare_record.www-aaaa: Refreshing state... [id=9f7b0d63a18b5513abb8db23ce62cd46] hcloud_rdns.node1_ipv4: Refreshing state... [id=s-24978813-65.21.188.62] hcloud_rdns.node1_ipv6: Refreshing state... [id=s-24978813-2a01:4f9:c012:6063::1] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # cloudflare_api_token.dns_validation_token will be created + resource "cloudflare_api_token" "dns_validation_token" { + id = (known after apply) + issued_on = (known after apply) + modified_on = (known after apply) + name = "dns_validation_token" + status = (known after apply) + value = (sensitive value) + condition { + request_ip { + in = [ + "2a01:4f9:c012:6063::1/64", + "65.21.188.62/32", ] } } + policy { + effect = "allow" + permission_groups = [ + "4755a26eedb94da69e1066d98aa820be", ] + resources = { + "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*" } } } Plan: 1 to add, 0 to change, 0 to destroy. Changes to Outputs: + cloudflare-le-token = (sensitive value) ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```Pushed by: @JustinLex, Action:
pull_request