Last active
May 6, 2025 23:32
-
-
Save ceferrari/5d5fa61d4cb54ecd5aff0ee3662ffa9a to your computer and use it in GitHub Desktop.
cloudflare_workers_route without route_id
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
starting build "7b846aed-67de-4f7b-a8bd-fd047779eb45" | |
FETCHSOURCE | |
hint: Using 'master' as the name for the initial branch. This default branch name | |
hint: is subject to change. To configure the initial branch name to use in all | |
hint: of your new repositories, which will suppress this warning, call: | |
hint: | |
hint: git config --global init.defaultBranch <name> | |
hint: | |
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and | |
hint: 'development'. The just-created branch can be renamed via this command: | |
hint: | |
hint: git branch -m <name> | |
Initialized empty Git repository in /workspace/.git/ | |
From https://github.com/ceferrari/saas | |
* branch 7aec051c66290dc32535ed0df12d19c3732ea50e -> FETCH_HEAD | |
HEAD is now at 7aec051 update cloudflare terraform version | |
GitCommit: | |
7aec051c66290dc32535ed0df12d19c3732ea50e | |
BUILD | |
Starting Step #0 - "terraform init -upgrade" | |
Pulling image: hashicorp/terraform:1.11 | |
1.11: Pulling from hashicorp/terraform | |
b0f6f1c319a1: Pulling fs layer | |
9b0febcc16b0: Pulling fs layer | |
fe42e5911fab: Pulling fs layer | |
6b6b36068aff: Pulling fs layer | |
6b6b36068aff: Waiting | |
fe42e5911fab: Verifying Checksum | |
fe42e5911fab: Download complete | |
b0f6f1c319a1: Verifying Checksum | |
b0f6f1c319a1: Download complete | |
b0f6f1c319a1: Pull complete | |
9b0febcc16b0: Verifying Checksum | |
9b0febcc16b0: Download complete | |
9b0febcc16b0: Pull complete | |
6b6b36068aff: Verifying Checksum | |
6b6b36068aff: Download complete | |
fe42e5911fab: Pull complete | |
6b6b36068aff: Pull complete | |
Digest: sha256:5820b87995595425074f881500a037b0ccd41158d0d9b44d78f5f120612f2d3d | |
Status: Downloaded newer image for hashicorp/terraform:1.11 | |
docker.io/hashicorp/terraform:1.11 | |
Initializing the backend... | |
Successfully configured the backend "gcs"! Terraform will automatically | |
use this backend unless the backend configuration changes. | |
Initializing modules... | |
- dns in ../../modules/dns | |
- tunnel in ../../modules/tunnel | |
- worker in ../../modules/worker | |
- zone in ../../modules/zone | |
Initializing provider plugins... | |
- Finding cloudflare/cloudflare versions matching "~> 5.4.0"... | |
- Finding latest version of hashicorp/random... | |
- Finding hashicorp/google versions matching "~> 6.33.0"... | |
- Installing hashicorp/google v6.33.0... | |
- Installed hashicorp/google v6.33.0 (signed by HashiCorp) | |
- Installing cloudflare/cloudflare v5.4.0... | |
- Installed cloudflare/cloudflare v5.4.0 (self-signed, key ID C76001609EE3B136) | |
- Installing hashicorp/random v3.7.2... | |
- Installed hashicorp/random v3.7.2 (signed by HashiCorp) | |
Partner and community providers are signed by their developers. | |
If you'd like to know more about provider signing, you can read about it here: | |
https://developer.hashicorp.com/terraform/cli/plugins/signing | |
Terraform has created a lock file .terraform.lock.hcl to record the provider | |
selections it made above. Include this file in your version control repository | |
so that Terraform can guarantee to make the same selections by default when | |
you run "terraform init" in the future. | |
Terraform has been successfully initialized! | |
You may now begin working with Terraform. Try running "terraform plan" to see | |
any changes that are required for your infrastructure. All Terraform commands | |
should now work. | |
If you ever set or change modules or backend configuration for Terraform, | |
rerun this command to reinitialize your working directory. If you forget, other | |
commands will detect it and remind you to do so if necessary. | |
Finished Step #0 - "terraform init -upgrade" | |
Starting Step #1 - "terraform plan" | |
Already have image (with digest): hashicorp/terraform:1.11 | |
module.tunnel.random_id.this: Refreshing state... [id=P1ybCe5uMtwKx0jrJDzIv0pSZCzJkwIttxgv_C7_VNE] | |
data.google_secret_manager_secret_version.this: Reading... | |
data.google_secret_manager_secret_version.this: Read complete after 1s [id=projects/1018252262301/secrets/token-cloudflare/versions/1] | |
module.zone.cloudflare_zone.this: Refreshing state... [id=79064603940238d011a2bde215d9aa48] | |
module.tunnel.cloudflare_zero_trust_tunnel_cloudflared.this: Refreshing state... [id=23d28a59-bffd-4c46-9d3a-3b4fc62ccc36] | |
module.tunnel.google_secret_manager_secret.this: Refreshing state... [id=projects/saas-mono-ts/secrets/dev-cloudflared-token] | |
module.tunnel.cloudflare_zero_trust_tunnel_cloudflared_config.this: Refreshing state... [id=23d28a59-bffd-4c46-9d3a-3b4fc62ccc36] | |
module.zone.cloudflare_zone_setting.tls_1_3: Refreshing state... [id=tls_1_3] | |
module.zone.cloudflare_zone_setting.security_header: Refreshing state... [id=security_header] | |
module.zone.cloudflare_zone_setting.always_use_https: Refreshing state... [id=always_use_https] | |
module.zone.cloudflare_zone_setting.opportunistic_encryption: Refreshing state... [id=opportunistic_encryption] | |
module.zone.cloudflare_zone_setting.min_tls_version: Refreshing state... [id=min_tls_version] | |
module.zone.cloudflare_zone_setting.automatic_https_rewrites: Refreshing state... [id=automatic_https_rewrites] | |
module.zone.cloudflare_zone_setting.ssl: Refreshing state... [id=ssl] | |
module.tunnel.google_secret_manager_secret_version.this: Refreshing state... [id=projects/1018252262301/secrets/dev-cloudflared-token/versions/1] | |
module.tunnel.google_secret_manager_secret_iam_policy.this: Refreshing state... [id=projects/saas-mono-ts/secrets/dev-cloudflared-token] | |
module.worker.cloudflare_workers_script.this: Refreshing state... [id=dev-cloudflared-ping] | |
module.dns.cloudflare_dns_record.porkbun_mx: Refreshing state... [id=c4ab519039d3fa071ca0c437271d3370] | |
module.dns.cloudflare_dns_record.porkbun_cname["*"]: Refreshing state... [id=63afccbd074c2788abff92dd975b4cd1] | |
module.dns.cloudflare_dns_record.porkbun_cname["www"]: Refreshing state... [id=14fcacc846c6e4aa21aaeb36435f4db6] | |
module.dns.cloudflare_dns_record.porkbun_ns["fortaleza"]: Refreshing state... [id=9e620d9255b2778ca1c16c45eac69fc9] | |
module.dns.cloudflare_dns_record.service["test-node"]: Refreshing state... [id=c58a0aacd827e2f2cc7dffb678bb122e] | |
module.dns.cloudflare_dns_record.service["test-node2"]: Refreshing state... [id=16ecc1ee28fda5d159523e5ef2197c24] | |
module.dns.cloudflare_dns_record.service["n8n"]: Refreshing state... [id=3e56a8b08c36970792c85110359d3f10] | |
module.dns.cloudflare_dns_record.service["base-nuxt"]: Refreshing state... [id=3575ab759f8683c333db00e3d07c9a69] | |
module.dns.cloudflare_dns_record.porkbun_ns["curitiba"]: Refreshing state... [id=8816b655775b06f0322fbc7af9f16e4c] | |
module.dns.cloudflare_dns_record.porkbun_ns["salvador"]: Refreshing state... [id=9fcfef72a183285ed4d93bdecee22552] | |
module.dns.cloudflare_dns_record.porkbun_ns["maceio"]: Refreshing state... [id=67a1b9634bd4f61a014f314c82ae963e] | |
module.dns.cloudflare_dns_record.spf1: Refreshing state... [id=fe14adee04bd607ba5656ea24f923387] | |
module.dns.cloudflare_dns_record.porkbun_a["44.227.76.166"]: Refreshing state... [id=ab5aec63bd83c51e27a0ba4bd45b96ad] | |
module.dns.cloudflare_dns_record.dmarc: Refreshing state... [id=c035ac60d4dae044197242cf56d7c4f1] | |
module.dns.cloudflare_dns_record.porkbun_a["44.227.65.245"]: Refreshing state... [id=9a779e91d8068a8149b7478afd93aa5b] | |
module.worker.cloudflare_workers_route.this: Refreshing state... | |
Terraform used the selected providers to generate the following execution | |
plan. Resource actions are indicated with the following symbols: | |
~ update in-place | |
Terraform planned the following actions, but then encountered a problem: | |
# module.tunnel.cloudflare_zero_trust_tunnel_cloudflared_config.this will be updated in-place | |
~ resource "cloudflare_zero_trust_tunnel_cloudflared_config" "this" { | |
~ config = { | |
~ ingress = [ | |
~ { | |
~ origin_request = { | |
+ access = (known after apply) | |
# (13 unchanged attributes hidden) | |
} | |
# (3 unchanged attributes hidden) | |
}, | |
~ { | |
~ origin_request = { | |
+ access = (known after apply) | |
# (13 unchanged attributes hidden) | |
} | |
# (3 unchanged attributes hidden) | |
}, | |
~ { | |
~ origin_request = { | |
+ access = (known after apply) | |
# (13 unchanged attributes hidden) | |
} | |
# (3 unchanged attributes hidden) | |
}, | |
~ { | |
~ origin_request = { | |
+ access = (known after apply) | |
# (13 unchanged attributes hidden) | |
} | |
# (3 unchanged attributes hidden) | |
}, | |
~ { | |
+ origin_request = (known after apply) | |
# (2 unchanged attributes hidden) | |
}, | |
] | |
+ origin_request = (known after apply) | |
~ warp_routing = { | |
~ enabled = false -> (known after apply) | |
} -> (known after apply) | |
} | |
~ created_at = "2025-05-02T23:08:21Z" -> (known after apply) | |
id = "23d28a59-bffd-4c46-9d3a-3b4fc62ccc36" | |
~ source = "cloudflare" -> "local" | |
~ version = 8 -> (known after apply) | |
# (2 unchanged attributes hidden) | |
} | |
# module.worker.cloudflare_workers_script.this will be updated in-place | |
~ resource "cloudflare_workers_script" "this" { | |
- bindings = [] -> null | |
~ created_on = "2025-04-25T02:02:59Z" -> (known after apply) | |
~ etag = "aa9a13182708738524d7cd5905ba1344ff8486c4da1fb3756843909736b5737f" -> (known after apply) | |
~ has_assets = false -> (known after apply) | |
~ has_modules = false -> (known after apply) | |
id = "dev-cloudflared-ping" | |
~ logpush = false -> (known after apply) | |
~ modified_on = "2025-05-04T19:56:44Z" -> (known after apply) | |
~ startup_time_ms = 0 -> (known after apply) | |
- tail_consumers = [] -> null | |
~ usage_model = "standard" -> (known after apply) | |
# (5 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.always_use_https will be updated in-place | |
~ resource "cloudflare_zone_setting" "always_use_https" { | |
- id = "always_use_https" -> null | |
~ modified_on = "2025-04-11T15:17:02Z" -> (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.automatic_https_rewrites will be updated in-place | |
~ resource "cloudflare_zone_setting" "automatic_https_rewrites" { | |
- id = "automatic_https_rewrites" -> null | |
~ modified_on = "2025-04-21T22:07:43Z" -> (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.min_tls_version will be updated in-place | |
~ resource "cloudflare_zone_setting" "min_tls_version" { | |
- id = "min_tls_version" -> null | |
+ modified_on = (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.opportunistic_encryption will be updated in-place | |
~ resource "cloudflare_zone_setting" "opportunistic_encryption" { | |
- id = "opportunistic_encryption" -> null | |
~ modified_on = "2025-04-21T22:07:43Z" -> (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.security_header will be updated in-place | |
~ resource "cloudflare_zone_setting" "security_header" { | |
- id = "security_header" -> null | |
~ modified_on = "2025-04-22T20:56:53Z" -> (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.ssl will be updated in-place | |
~ resource "cloudflare_zone_setting" "ssl" { | |
- id = "ssl" -> null | |
~ modified_on = "2025-04-21T22:49:28Z" -> (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
# module.zone.cloudflare_zone_setting.tls_1_3 will be updated in-place | |
~ resource "cloudflare_zone_setting" "tls_1_3" { | |
- id = "tls_1_3" -> null | |
+ modified_on = (known after apply) | |
+ time_remaining = (known after apply) | |
# (4 unchanged attributes hidden) | |
} | |
Plan: 0 to add, 9 to change, 0 to destroy. | |
╷ | |
│ Error: failed to make http request | |
│ | |
│ with module.worker.cloudflare_workers_route.this, | |
│ on ../../modules/worker/resource.tf line 29, in resource "cloudflare_workers_route" "this": | |
│ 29: resource "cloudflare_workers_route" "this" { | |
│ | |
│ missing required route_id parameter | |
╵ | |
Finished Step #1 - "terraform plan" | |
ERROR | |
ERROR: build step 1 "hashicorp/terraform:1.11" failed: step exited with non-zero status: 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment