Created
August 4, 2017 10:23
-
-
Save Yuxael/9f3c0ff87f26053688a3bb6d8420877d to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
data.vault_generic_secret.aws_creds: Refreshing state... | |
^C2017/08/04 11:46:35 [INFO] Terraform version: 0.10.0 | |
2017/08/04 11:46:35 [INFO] Go runtime version: go1.8.3 | |
2017/08/04 11:46:35 [INFO] CLI args: []string{"terraform", "refresh"} | |
2017/08/04 11:46:35 [DEBUG] Attempting to open CLI config file: /User/user/.terraformrc | |
2017/08/04 11:46:35 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2017/08/04 11:46:35 [INFO] CLI command args: []string{"refresh"} | |
2017/08/04 11:46:35 [INFO] command: empty terraform config, returning nil | |
2017/08/04 11:46:35 [DEBUG] command: no data state file found for backend config | |
2017/08/04 11:46:35 [DEBUG] New state was assigned lineage "6c143df3-ba66-4e9c-b8c5-21e8f381bde7" | |
2017/08/04 11:46:35 [INFO] command: backend initialized: <nil> | |
2017/08/04 11:46:35 [DEBUG] checking for provider in "." | |
2017/08/04 11:46:35 [DEBUG] skipping ".git", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping ".gitmodules", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping ".terraform", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping ".terraform.tfstate.lock.info", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "ansible.cfg", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "filter_plugins", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "hat-server", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "library", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "lookup_plugins", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "nginx.conf.j2", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "provision.yml", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "roles", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "run.sh", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "site.yml", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tf", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.backup", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.bak", not a provider | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.diff", not a provider | |
2017/08/04 11:46:35 [DEBUG] checking for provider in "/usr/local/Cellar/terraform/0.10.0/bin" | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform", not a provider | |
2017/08/04 11:46:35 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2017/08/04 11:46:35 [DEBUG] skipping "lock.json", not a provider | |
2017/08/04 11:46:35 [DEBUG] found provider "terraform-provider-aws_v0.1.3_x4" | |
2017/08/04 11:46:35 [DEBUG] found provider "terraform-provider-vault_v0.1.0_x4" | |
2017/08/04 11:46:35 [DEBUG] found valid plugin: "vault" | |
2017/08/04 11:46:35 [DEBUG] found valid plugin: "aws" | |
2017/08/04 11:46:35 [DEBUG] checking for provisioner in "." | |
2017/08/04 11:46:35 [DEBUG] skipping ".git", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping ".gitmodules", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping ".terraform", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping ".terraform.tfstate.lock.info", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "ansible.cfg", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "filter_plugins", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "hat-server", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "library", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "lookup_plugins", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "nginx.conf.j2", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "provision.yml", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "roles", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "run.sh", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "site.yml", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tf", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.backup", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.bak", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform.tfstate.diff", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] checking for provisioner in "/usr/local/Cellar/terraform/0.10.0/bin" | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2017/08/04 11:46:35 [DEBUG] skipping "lock.json", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform-provider-aws_v0.1.3_x4", not a provisioner | |
2017/08/04 11:46:35 [DEBUG] skipping "terraform-provider-vault_v0.1.0_x4", not a provisioner | |
2017/08/04 11:46:35 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2017/08/04 11:46:35 [TRACE] Preserving existing state lineage "b558d51d-2c83-4a23-8a64-8645d1d707b6" | |
2017/08/04 11:46:35 [TRACE] Preserving existing state lineage "b558d51d-2c83-4a23-8a64-8645d1d707b6" | |
2017/08/04 11:46:35 [INFO] terraform: building graph: GraphTypeInput | |
2017/08/04 11:46:35 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"aws_creds", Type:"vault_generic_secret", RawCount:(*config.RawConfig)(0xc420392180), RawConfig:(*config.RawConfig)(0xc420392000), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"cloud", Type:"aws_route53_zone", RawCount:(*config.RawConfig)(0xc420392780), RawConfig:(*config.RawConfig)(0xc420392600), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"initial_key", Type:"aws_key_pair", RawCount:(*config.RawConfig)(0xc42037a420), RawConfig:(*config.RawConfig)(0xc42037a1e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_eip.app-eip | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app-eip", Type:"aws_eip", RawCount:(*config.RawConfig)(0xc420388ba0), RawConfig:(*config.RawConfig)(0xc4203889c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"haproxy", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc4203892c0), RawConfig:(*config.RawConfig)(0xc420388d20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_security_group.lan | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"lan", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420392480), RawConfig:(*config.RawConfig)(0xc420392300), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.external | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"external", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc42037ba40), RawConfig:(*config.RawConfig)(0xc42037a5a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_instance.app | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app", Type:"aws_instance", RawCount:(*config.RawConfig)(0xc420388540), RawConfig:(*config.RawConfig)(0xc42037bc20), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc4203789f0)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.consul | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"consul", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc420315e60), RawConfig:(*config.RawConfig)(0xc4203158c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_security_group.lan": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c28c0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_security_group.external": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2780), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_instance.app": &terraform.ResourceState{Type:"aws_instance", Dependencies:[]string{"aws_security_group.external"}, Primary:(*terraform.InstanceState)(0xc4203c2820), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.consul": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c2870), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.vault_generic_secret.aws_creds": &terraform.ResourceState{Type:"vault_generic_secret", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2910), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_route53_zone.cloud": &terraform.ResourceState{Type:"aws_route53_zone", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2a00), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_key_pair.initial_key": &terraform.ResourceState{Type:"aws_key_pair", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2960), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_eip.app-eip": &terraform.ResourceState{Type:"aws_eip", Dependencies:[]string{"aws_instance.app"}, Primary:(*terraform.InstanceState)(0xc4203c27d0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.haproxy": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"aws_eip.app-eip", "data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c29b0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.DisableProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} vault | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} aws | |
2017/08/04 11:46:35 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc42036f800)} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachProviderConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_key_pair.initial_key" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_eip.app-eip" references: [aws_instance.app] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.haproxy" references: [aws_eip.app-eip data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_instance.app" references: [aws_security_group.external data.aws_security_group.lan var.ec2_region var.images var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.images" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.aws" references: [data.vault_generic_secret.aws_creds var.ec2_region] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.vault_generic_secret.aws_creds" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_route53_zone.cloud" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.project_name" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_security_group.lan" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_security_group.external" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.consul" references: [data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_region" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_instance_type" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeAbstractResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_instance.app - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
var.images - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
aws_eip.app-eip - *terraform.NodeAbstractResource | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
aws_security_group.external - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_key_pair.initial_key - *terraform.NodeAbstractResource | |
aws_route53_record.consul - *terraform.NodeAbstractResource | |
aws_route53_record.haproxy - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeAbstractResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] Starting graph walk: walkInput | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "root" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_eip.app-eip" waiting on "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_route53_zone.cloud" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.vault_generic_secret.aws_creds" waiting on "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.vault (close)" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_security_group.lan" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.consul" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.consul", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_security_group.external", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_key_pair.initial_key", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "root", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.vault_generic_secret.aws_creds", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_instance.app", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_eip.app-eip", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_route53_zone.cloud", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_security_group.lan", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.haproxy", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_instance_type': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_region': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.project_name': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.images" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.images': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:35 [DEBUG] plugin: starting plugin: /Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-vault_v0.1.0_x4 []string{"/Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-vault_v0.1.0_x4"} | |
2017/08/04 11:46:35 [DEBUG] plugin: waiting for RPC address for: /Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-vault_v0.1.0_x4 | |
2017/08/04 11:46:35 [DEBUG] plugin: terraform-provider-vault_v0.1.0_x4: 2017/08/04 11:46:35 [DEBUG] plugin: plugin address: unix /var/folders/p8/2d56549n45q5xgsg4qqh2nf80000gp/T/plugin590284390 | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInputProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: provider.aws | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:35 [DEBUG] plugin: starting plugin: /Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-aws_v0.1.3_x4 []string{"/Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-aws_v0.1.3_x4"} | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: provider.vault (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvider | |
2017/08/04 11:46:35 [DEBUG] plugin: waiting for RPC address for: /Users/user/Documents/project/haproxy/.terraform/plugins/darwin_amd64/terraform-provider-aws_v0.1.3_x4 | |
2017/08/04 11:46:35 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:35 [DEBUG] plugin: plugin address: unix /var/folders/p8/2d56549n45q5xgsg4qqh2nf80000gp/T/plugin784429649 | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] Interpolating computed map element attribute data (3) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInputProvider | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: provider.vault (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: provider.aws | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: provisioner.local-exec (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvisioner | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: provisioner.local-exec (close) | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: provider.aws (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvider | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: provider.aws (close) | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.vault_generic_secret.aws_creds.0", replace "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_route53_record.haproxy.0", replace "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_security_group.lan.0", replace "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_key_pair.initial_key.0", replace "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.external.0", replace "aws_security_group.external" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_eip.app-eip.0", replace "aws_eip.app-eip" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_route53_record.consul.0", replace "aws_route53_record.consul" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_instance.app.0", replace "aws_instance.app" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_route53_zone.cloud.0", replace "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "root" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.root': walking | |
2017/08/04 11:46:35 [INFO] terraform: building graph: GraphTypeValidate | |
2017/08/04 11:46:35 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_instance.app | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app", Type:"aws_instance", RawCount:(*config.RawConfig)(0xc420388540), RawConfig:(*config.RawConfig)(0xc42037bc20), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc4203789f0)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"haproxy", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc4203892c0), RawConfig:(*config.RawConfig)(0xc420388d20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"aws_creds", Type:"vault_generic_secret", RawCount:(*config.RawConfig)(0xc420392180), RawConfig:(*config.RawConfig)(0xc420392000), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_security_group.lan | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"lan", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420392480), RawConfig:(*config.RawConfig)(0xc420392300), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.external | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"external", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc42037ba40), RawConfig:(*config.RawConfig)(0xc42037a5a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.consul | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"consul", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc420315e60), RawConfig:(*config.RawConfig)(0xc4203158c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"cloud", Type:"aws_route53_zone", RawCount:(*config.RawConfig)(0xc420392780), RawConfig:(*config.RawConfig)(0xc420392600), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"initial_key", Type:"aws_key_pair", RawCount:(*config.RawConfig)(0xc42037a420), RawConfig:(*config.RawConfig)(0xc42037a1e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_eip.app-eip | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app-eip", Type:"aws_eip", RawCount:(*config.RawConfig)(0xc420388ba0), RawConfig:(*config.RawConfig)(0xc4203889c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_key_pair.initial_key": &terraform.ResourceState{Type:"aws_key_pair", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2960), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_eip.app-eip": &terraform.ResourceState{Type:"aws_eip", Dependencies:[]string{"aws_instance.app"}, Primary:(*terraform.InstanceState)(0xc4203c27d0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.consul": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c2870), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_route53_zone.cloud": &terraform.ResourceState{Type:"aws_route53_zone", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2a00), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_security_group.lan": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c28c0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_security_group.external": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2780), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_instance.app": &terraform.ResourceState{Type:"aws_instance", Dependencies:[]string{"aws_security_group.external"}, Primary:(*terraform.InstanceState)(0xc4203c2820), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.haproxy": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"aws_eip.app-eip", "data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c29b0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.vault_generic_secret.aws_creds": &terraform.ResourceState{Type:"vault_generic_secret", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2910), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.DisableProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} aws | |
2017/08/04 11:46:35 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc42036f800)} | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} vault | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachProviderConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_route53_zone.cloud" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_eip.app-eip" references: [aws_instance.app] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_instance_type" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_security_group.lan" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.haproxy" references: [aws_eip.app-eip data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.images" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_key_pair.initial_key" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.consul" references: [data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.project_name" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_region" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.aws" references: [var.ec2_region data.vault_generic_secret.aws_creds] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provisioner.local-exec" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.vault_generic_secret.aws_creds" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_security_group.external" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_instance.app" references: [aws_security_group.external data.aws_security_group.lan var.ec2_region var.images var.project_name] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeValidatableResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_instance.app - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
var.images - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
aws_eip.app-eip - *terraform.NodeValidatableResource | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
aws_security_group.external - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_key_pair.initial_key - *terraform.NodeValidatableResource | |
aws_route53_record.consul - *terraform.NodeValidatableResource | |
aws_route53_record.haproxy - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
aws_instance.app - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] Starting graph walk: walkValidate | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provisioner.local-exec" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "root" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "provisioner.local-exec" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_route53_zone.cloud" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_eip.app-eip" waiting on "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.consul" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.vault_generic_secret.aws_creds" waiting on "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_security_group.lan" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.vault (close)" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_key_pair.initial_key", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_security_group.external", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.consul", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.haproxy", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_eip.app-eip", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.vault_generic_secret.aws_creds", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_security_group.lan", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_route53_zone.cloud", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "root", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_instance.app", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_instance_type': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_region': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.images" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.images': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.project_name': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provisioner.local-exec" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': evaluating | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvisioner | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:35 [DEBUG] plugin: starting plugin: /usr/local/Cellar/terraform/0.10.0/bin/terraform []string{"/usr/local/Cellar/terraform/0.10.0/bin/terraform", "internal-plugin", "provisioner", "local-exec"} | |
2017/08/04 11:46:35 [DEBUG] plugin: waiting for RPC address for: /usr/local/Cellar/terraform/0.10.0/bin/terraform | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSetProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.vault_generic_secret.aws_creds": &terraform.ResourceState{Type:"vault_generic_secret", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2910), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.vault_generic_secret.aws_creds" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provider.vault (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvider | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close) | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provider.aws | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSetProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provider.aws | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.aws_security_group.lan | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_route53_zone.cloud": &terraform.ResourceState{Type:"aws_route53_zone", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2a00), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': evaluating | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_route53_zone.cloud" references: [] | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_security_group.external | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
data.aws_route53_zone.cloud - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': walking | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_route53_zone.cloud': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_key_pair.initial_key - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.aws_security_group.lan | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_key_pair.initial_key": &terraform.ResourceState{Type:"aws_key_pair", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2960), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_route53_record.consul | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_key_pair.initial_key - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_key_pair.initial_key - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_key_pair.initial_key" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_key_pair.initial_key - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_key_pair.initial_key - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': walking | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_key_pair.initial_key': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.external | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.external - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.aws_security_group.lan - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_security_group.external": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c2780), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.external - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.external - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_security_group.external" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.external - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.external - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': walking | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_security_group.lan": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c28c0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.aws_security_group.lan - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.aws_security_group.lan - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_security_group.lan" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.aws_security_group.lan - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
data.aws_security_group.lan - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_security_group.external': evaluating | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_security_group.external | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_route53_record.consul | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_route53_record.consul - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.consul": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c2870), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_route53_record.consul - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_route53_record.consul - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': walking | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.consul" references: [] | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.aws_security_group.lan': evaluating | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_route53_record.consul - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: data.aws_security_group.lan | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_route53_record.consul - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.consul': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_route53_record.consul | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.external | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: data.aws_security_group.lan | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_route53_record.consul | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_instance.app | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_instance.app | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_instance.app - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_instance.app": &terraform.ResourceState{Type:"aws_instance", Dependencies:[]string{"aws_security_group.external"}, Primary:(*terraform.InstanceState)(0xc4203c2820), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_instance.app - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_instance.app - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_instance.app" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_instance.app - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_instance.app - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_instance.app': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_instance.app | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvisioner | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateProvisioner | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_instance.app | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provisioner.local-exec (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_eip.app-eip | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provisioner.local-exec (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvisioner | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_eip.app-eip | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_eip.app-eip": &terraform.ResourceState{Type:"aws_eip", Dependencies:[]string{"aws_instance.app"}, Primary:(*terraform.InstanceState)(0xc4203c27d0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_eip.app-eip" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_eip.app-eip - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_eip.app-eip': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_eip.app-eip | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_eip.app-eip | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateCount | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_route53_record.haproxy - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.haproxy": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"aws_eip.app-eip", "data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c29b0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_route53_record.haproxy - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_route53_record.haproxy - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.haproxy" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_route53_record.haproxy - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_route53_record.haproxy - *terraform.NodeValidatableResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.aws_route53_record.haproxy': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalValidateResource | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws (close)': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.aws (close)': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Entering eval tree: provider.aws (close) | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCloseProvider | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_eip.app-eip.0", replace "aws_eip.app-eip" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_instance.app.0", replace "aws_instance.app" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_key_pair.initial_key.0", replace "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_route53_record.consul.0", replace "aws_route53_record.consul" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.vault_generic_secret.aws_creds.0", replace "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: provider.aws (close) | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_route53_record.haproxy.0", replace "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.external.0", replace "aws_security_group.external" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_security_group.lan.0", replace "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_route53_zone.cloud.0", replace "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "root" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.root': walking | |
2017/08/04 11:46:35 [INFO] terraform: building graph: GraphTypeRefresh | |
2017/08/04 11:46:35 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
2017/08/04 11:46:35 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_security_group.external": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3c20), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.haproxy": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"aws_eip.app-eip", "data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c3db0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_route53_record.consul": &terraform.ResourceState{Type:"aws_route53_record", Dependencies:[]string{"data.aws_route53_zone.cloud"}, Primary:(*terraform.InstanceState)(0xc4203c3d10), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.vault_generic_secret.aws_creds": &terraform.ResourceState{Type:"vault_generic_secret", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3d60), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_route53_zone.cloud": &terraform.ResourceState{Type:"aws_route53_zone", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3ea0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_key_pair.initial_key": &terraform.ResourceState{Type:"aws_key_pair", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3e50), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_instance.app": &terraform.ResourceState{Type:"aws_instance", Dependencies:[]string{"aws_security_group.external"}, Primary:(*terraform.InstanceState)(0xc4203c3cc0), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "aws_eip.app-eip": &terraform.ResourceState{Type:"aws_eip", Dependencies:[]string{"aws_instance.app"}, Primary:(*terraform.InstanceState)(0xc4203c3c70), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.aws_security_group.lan": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3e00), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.external | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"external", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc42037ba40), RawConfig:(*config.RawConfig)(0xc42037a5a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.haproxy | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"haproxy", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc4203892c0), RawConfig:(*config.RawConfig)(0xc420388d20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_route53_record.consul | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"consul", Type:"aws_route53_record", RawCount:(*config.RawConfig)(0xc420315e60), RawConfig:(*config.RawConfig)(0xc4203158c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"aws_creds", Type:"vault_generic_secret", RawCount:(*config.RawConfig)(0xc420392180), RawConfig:(*config.RawConfig)(0xc420392000), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_key_pair.initial_key | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"initial_key", Type:"aws_key_pair", RawCount:(*config.RawConfig)(0xc42037a420), RawConfig:(*config.RawConfig)(0xc42037a1e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_instance.app | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app", Type:"aws_instance", RawCount:(*config.RawConfig)(0xc420388540), RawConfig:(*config.RawConfig)(0xc42037bc20), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc4203789f0)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_eip.app-eip | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"app-eip", Type:"aws_eip", RawCount:(*config.RawConfig)(0xc420388ba0), RawConfig:(*config.RawConfig)(0xc4203889c0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_security_group.lan | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"lan", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420392480), RawConfig:(*config.RawConfig)(0xc420392300), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_route53_zone.cloud | |
2017/08/04 11:46:35 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"cloud", Type:"aws_route53_zone", RawCount:(*config.RawConfig)(0xc420392780), RawConfig:(*config.RawConfig)(0xc420392600), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.DisableProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} aws | |
2017/08/04 11:46:35 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc42036f800)} | |
2017/08/04 11:46:35 [TRACE] Attach provider request: []string{} vault | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachProviderConfigTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_security_group.external" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.haproxy" references: [aws_eip.app-eip data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.vault_generic_secret.aws_creds" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.images" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_instance.app" references: [aws_security_group.external data.aws_security_group.lan var.ec2_region var.images var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_eip.app-eip" references: [aws_instance.app] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_region" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.aws" references: [data.vault_generic_secret.aws_creds var.ec2_region] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_route53_record.consul" references: [data.aws_route53_zone.cloud] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.ec2_instance_type" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "aws_key_pair.initial_key" references: [var.project_name] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_security_group.lan" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.aws_route53_zone.cloud" references: [] | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "var.project_name" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_instance.app - *terraform.NodeRefreshableManagedResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
var.images - *terraform.NodeRootVariable | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
aws_eip.app-eip - *terraform.NodeRefreshableManagedResource | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
aws_security_group.external - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
var.project_name - *terraform.NodeRootVariable | |
data.aws_route53_zone.cloud - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_security_group.lan - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
var.ec2_region - *terraform.NodeRootVariable | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_key_pair.initial_key - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.consul - *terraform.NodeRefreshableManagedResource | |
aws_route53_record.haproxy - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResource | |
root - terraform.graphNodeRoot | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_instance_type - *terraform.NodeRootVariable | |
var.ec2_region - *terraform.NodeRootVariable | |
var.images - *terraform.NodeRootVariable | |
var.project_name - *terraform.NodeRootVariable | |
2017/08/04 11:46:35 [DEBUG] Starting graph walk: walkRefresh | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "root" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "aws_eip.app-eip" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.consul" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.vault_generic_secret.aws_creds" waiting on "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_route53_zone.cloud" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.haproxy" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_eip.app-eip" waiting on "aws_instance.app" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_security_group.external" waiting on "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "data.aws_security_group.lan" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "root" waiting on "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_key_pair.initial_key" waiting on "provider.aws" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_route53_record.consul" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "aws_security_group.external" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.aws (close)" waiting on "aws_key_pair.initial_key" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "var.images" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "provider.vault (close)" waiting on "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_route53_record.haproxy" waiting on "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added edge: "aws_instance.app" waiting on "data.aws_security_group.lan" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.consul", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "root", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_route53_zone.cloud", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_key_pair.initial_key", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_security_group.external", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_instance.app", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "provider.aws", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_route53_record.haproxy", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.vault_generic_secret.aws_creds", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "aws_eip.app-eip", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: dependencies changed for "data.aws_security_group.lan", sending new deps | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "provider.vault" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.project_name" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.project_name': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.provider.vault': evaluating | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_region" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_region': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.images" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.images': walking | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "var.ec2_instance_type" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.var.ec2_instance_type': walking | |
2017/08/04 11:46:35 [TRACE] [walkRefresh] Entering eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSetProviderConfig | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalConfigProvider | |
2017/08/04 11:46:35 [DEBUG] plugin: terraform-provider-vault_v0.1.0_x4: 2017/08/04 11:46:35 [INFO] Using Vault token with the following policies: full-access | |
2017/08/04 11:46:35 [TRACE] [walkRefresh] Exiting eval tree: provider.vault | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkRefresh] Entering eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountCheckComputed | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/08/04 11:46:35 [TRACE] [walkRefresh] Exiting eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': expanding/walking dynamic subgraph | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [TRACE] OrphanResourceCount: Starting... | |
2017/08/04 11:46:35 [TRACE] OrphanResourceCount: Checking: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [DEBUG] Attaching resource state to "data.vault_generic_secret.aws_creds": &terraform.ResourceState{Type:"vault_generic_secret", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203c3d60), Deposed:[]*terraform.InstanceState{}, Provider:"", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [DEBUG] ReferenceTransformer: "data.vault_generic_secret.aws_creds" references: [] | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [TRACE] Graph after step *terraform.RootTransformer: | |
data.vault_generic_secret.aws_creds - *terraform.NodeRefreshableDataResourceInstance | |
2017/08/04 11:46:35 [DEBUG] dag/walk: added new vertex: "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] dag/walk: walking "data.vault_generic_secret.aws_creds" | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': walking | |
2017/08/04 11:46:35 [DEBUG] vertex 'root.data.vault_generic_secret.aws_creds': evaluating | |
2017/08/04 11:46:35 [TRACE] [walkRefresh] Entering eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalWriteState | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalIf | |
2017/08/04 11:46:35 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalReadDataDiff | |
2017/08/04 11:46:35 [DEBUG] root: eval: *terraform.EvalReadDataApply | |
o:data.vault_generic_secret.aws_creds: Refreshing state... | |
2017/08/04 11:46:35 [DEBUG] plugin: terraform-provider-vault_v0.1.0_x4: 2017/08/04 11:46:35 [DEBUG] Reading aws/sts/deploy from Vault | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalWriteState | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalUpdateStateHook | |
2017/08/04 11:46:37 [TRACE] [walkRefresh] Exiting eval tree: data.vault_generic_secret.aws_creds | |
2017/08/04 11:46:37 [DEBUG] dag/walk: walking "provider.vault (close)" | |
2017/08/04 11:46:37 [DEBUG] dag/walk: walking "provider.aws" | |
2017/08/04 11:46:37 [DEBUG] vertex 'root.provider.aws': walking | |
2017/08/04 11:46:37 [DEBUG] vertex 'root.provider.vault (close)': walking | |
2017/08/04 11:46:37 [DEBUG] vertex 'root.provider.aws': evaluating | |
2017/08/04 11:46:37 [TRACE] [walkRefresh] Entering eval tree: provider.aws | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalInitProvider | |
2017/08/04 11:46:37 [DEBUG] vertex 'root.provider.vault (close)': evaluating | |
2017/08/04 11:46:37 [TRACE] [walkRefresh] Entering eval tree: provider.vault (close) | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalCloseProvider | |
2017/08/04 11:46:37 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:37 [DEBUG] root: eval: terraform.EvalNoop | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalGetProvider | |
2017/08/04 11:46:37 [TRACE] [walkRefresh] Exiting eval tree: provider.vault (close) | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalInterpolate | |
2017/08/04 11:46:37 [DEBUG] Interpolating computed map element attribute data (3) | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalBuildProviderConfig | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalSetProviderConfig | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalOpFilter | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalSequence | |
2017/08/04 11:46:37 [DEBUG] root: eval: *terraform.EvalConfigProvider | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] No assume_role block read from configuration | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] Building AWS region structure | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] Building AWS auth structure | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] Setting AWS metadata API timeout to 100ms | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] AWS Auth provider used: "StaticProvider" | |
2017/08/04 11:46:37 [DEBUG] plugin: terraform-provider-aws_v0.1.3_x4: 2017/08/04 11:46:37 [INFO] Initializing DeviceFarm SDK connection | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_eip.app-eip", waiting for: "aws_instance.app" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "data.aws_route53_zone.cloud", waiting for: "provider.aws" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_route53_record.consul", waiting for: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_route53_record.haproxy", waiting for: "aws_eip.app-eip" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "data.aws_security_group.lan", waiting for: "provider.aws" | |
2017/08/04 11:46:40 [DEBUG] dag/walk: vertex "aws_key_pair.initial_key", waiting for: "provider.aws" | |
2017/08/04 11:46:42 [DEBUG] dag/walk: vertex "root", waiting for: "provider.aws (close)" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_key_pair.initial_key", waiting for: "provider.aws" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "data.aws_route53_zone.cloud", waiting for: "provider.aws" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_route53_record.consul", waiting for: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_route53_record.haproxy", waiting for: "aws_eip.app-eip" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "aws_eip.app-eip", waiting for: "aws_instance.app" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:46:45 [DEBUG] dag/walk: vertex "data.aws_security_group.lan", waiting for: "provider.aws" | |
2017/08/04 11:46:47 [DEBUG] dag/walk: vertex "root", waiting for: "provider.aws (close)" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "data.aws_security_group.lan", waiting for: "provider.aws" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_route53_record.haproxy", waiting for: "aws_eip.app-eip" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_key_pair.initial_key", waiting for: "provider.aws" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "data.aws_route53_zone.cloud", waiting for: "provider.aws" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_eip.app-eip", waiting for: "aws_instance.app" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:46:50 [DEBUG] dag/walk: vertex "aws_route53_record.consul", waiting for: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:52 [DEBUG] dag/walk: vertex "root", waiting for: "provider.aws (close)" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_route53_record.consul", waiting for: "data.aws_route53_zone.cloud" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_route53_record.haproxy", waiting for: "aws_eip.app-eip" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "data.aws_security_group.lan", waiting for: "provider.aws" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "data.aws_route53_zone.cloud", waiting for: "provider.aws" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_eip.app-eip", waiting for: "aws_instance.app" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:46:55 [DEBUG] dag/walk: vertex "aws_key_pair.initial_key", waiting for: "provider.aws" | |
2017/08/04 11:46:57 [DEBUG] dag/walk: vertex "root", waiting for: "provider.aws (close)" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_key_pair.initial_key", waiting for: "provider.aws" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_route53_record.haproxy", waiting for: "aws_eip.app-eip" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_route53_record.consul", waiting for: "data.aws_route53_zone.cloud" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "data.aws_security_group.lan", waiting for: "provider.aws" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "aws_eip.app-eip", waiting for: "aws_instance.app" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "data.aws_route53_zone.cloud", waiting for: "provider.aws" | |
2017/08/04 11:47:00 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:47:02 [DEBUG] dag/walk: vertex "root", waiting for: "provider.aws (close)" | |
2017/08/04 11:47:05 [DEBUG] dag/walk: vertex "provider.aws (close)", waiting for: "aws_route53_record.consul" | |
2017/08/04 11:47:05 [DEBUG] dag/walk: vertex "aws_instance.app", waiting for: "data.aws_security_group.lan" | |
2017/08/04 11:47:05 [DEBUG] dag/walk: vertex "aws_security_group.external", waiting for: "provider.aws" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment