Skip to content

Commit 0de2c66

Browse files
committed
specify TF version
1 parent 133f744 commit 0de2c66

File tree

6 files changed

+32
-8
lines changed

6 files changed

+32
-8
lines changed

src/content/partials/cloudflare-one/access/add-infrastructure-app.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,13 @@ import { Tabs, TabItem, Render } from "~/components"
8383
```
8484

8585
</TabItem>
86-
<TabItem label="Terraform">
86+
<TabItem label="Terraform (v4)">
8787

88-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
88+
:::note[Provider versions]
89+
The following example requires Cloudflare provider version `>=4.45.0`.
90+
:::
91+
92+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.45.0/docs/resources/api_token):
8993
- `Access: Apps and Policies Write`
9094

9195
2. Use the [`cloudflare_zero_trust_access_application`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.45.0/docs/resources/zero_trust_access_application) resource to create an infrastructure application:

src/content/partials/cloudflare-one/access/add-target.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,13 @@ If the target IP does not appear in the dropdown, go to **Networks** > **Routes*
5555
```
5656

5757
</TabItem>
58-
<TabItem label="Terraform">
58+
<TabItem label="Terraform (v4)">
5959

60-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
60+
:::note[Provider versions]
61+
The following example requires Cloudflare provider version `>=4.45.0`.
62+
:::
63+
64+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.45.0/docs/resources/api_token):
6165
- `Teams Write`
6266

6367
2. Configure the [`cloudflare_zero_trust_infrastructure_access_target`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.45.0/docs/resources/zero_trust_infrastructure_access_target) resource:

src/content/partials/cloudflare-one/access/create-service-token.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,11 @@ import { Tabs, TabItem, Details } from '~/components';
2323
This is the only time Cloudflare Access will display the Client Secret. If you lose the Client Secret, you must generate a new service token.
2424
:::
2525

26-
</TabItem> <TabItem label="Terraform">
26+
</TabItem> <TabItem label="Terraform (v4)">
27+
28+
:::note[Provider versions]
29+
The following example requires Cloudflare provider version `>=4.40.0`.
30+
:::
2731

2832
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
2933
- `Access: Service Tokens Write`

src/content/partials/cloudflare-one/warp/device-enrollment-mtls.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,11 @@ To check for an mTLS certificate:
2121

2222
4. On your device, add the client certificate to the [system keychain](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/#test-in-the-browser).
2323

24-
</TabItem> <TabItem label="Terraform">
24+
</TabItem> <TabItem label="Terraform (v4)">
25+
26+
:::note[Provider versions]
27+
The following example requires Cloudflare provider version `>=4.40.0`.
28+
:::
2529

2630
1. Add the following permissions to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
2731
- `Access: Mutual TLS Certificates Write`

src/content/partials/cloudflare-one/warp/device-enrollment.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,11 @@ Device posture checks are not supported in device enrollment policies. WARP can
2222
4. In the **Authentication** tab, select the [identity providers](/cloudflare-one/identity/idp-integration/) users can authenticate with. If you have not integrated an identity provider, you can use the [one-time PIN](/cloudflare-one/identity/one-time-pin/).
2323
5. Select **Save**.
2424

25-
</TabItem> <TabItem label="Terraform">
25+
</TabItem> <TabItem label="Terraform (v4)">
26+
27+
:::note[Provider versions]
28+
The following example requires Cloudflare provider version `>=4.40.0`.
29+
:::
2630

2731
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
2832
- `Access: Apps and Policies Write`

src/content/partials/cloudflare-one/warp/service-token-enrollment.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,11 @@ import { Tabs, TabItem } from '~/components';
2121
* `auth_client_id`: The **Client ID** of your service token.
2222
* `auth_client_secret`: The **Client Secret** of your service token.
2323

24-
</TabItem> <TabItem label="Terraform">
24+
</TabItem> <TabItem label="Terraform (v4)">
25+
26+
:::note[Provider versions]
27+
The following example requires Cloudflare provider version `>=4.40.0`.
28+
:::
2529

2630
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/4.40.0/docs/resources/api_token):
2731
- `Access: Apps and Policies Write`

0 commit comments

Comments
 (0)