Created
November 17, 2017 21:13
-
-
Save dond00m/2979149b76a6b0c794b83258fe8de814 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2017/11/17 12:59:03 [INFO] Terraform version: 0.11.0 ec9d4f1d0f90e8ec5148f94b6d634eb542a4f0ce+CHANGES | |
2017/11/17 12:59:03 [INFO] Go runtime version: go1.9 | |
2017/11/17 12:59:03 [INFO] CLI args: []string{"/Users/user/gitlab/internal/internal-vault-config/terraform", "apply", "-var-file=nonprod.tfvars", "-auto-approve=true"} | |
2017/11/17 12:59:03 [DEBUG] Attempting to open CLI config file: /Users/user/.terraformrc | |
2017/11/17 12:59:03 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2017/11/17 12:59:03 [INFO] CLI command args: []string{"apply", "-var-file=nonprod.tfvars", "-auto-approve=true"} | |
2017/11/17 12:59:03 [INFO] command: empty terraform config, returning nil | |
2017/11/17 12:59:03 [DEBUG] command: no data state file found for backend config | |
2017/11/17 12:59:03 [DEBUG] New state was assigned lineage "3a0b404a-a1e7-4d28-9e22-bfefb0de4e1c" | |
2017/11/17 12:59:03 [INFO] command: backend initialized: <nil> | |
2017/11/17 12:59:03 [DEBUG] checking for provider in "." | |
2017/11/17 12:59:03 [DEBUG] checking for provider in "/Users/user/gitlab/internal/internal-vault-config" | |
2017/11/17 12:59:03 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2017/11/17 12:59:03 [DEBUG] found provider "terraform-provider-vault_v1.0.0_x4" | |
2017/11/17 12:59:03 [DEBUG] found valid plugin: "vault" | |
2017/11/17 12:59:03 [DEBUG] checking for provisioner in "." | |
2017/11/17 12:59:03 [DEBUG] checking for provisioner in "/Users/user/gitlab/internal/internal-vault-config" | |
2017/11/17 12:59:03 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2017/11/17 12:59:03 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2017/11/17 12:59:03 [INFO] backend/local: starting Apply operation | |
2017/11/17 12:59:03 [INFO] terraform: building graph: GraphTypeInput | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
plyableProvider | |
vault_policy.test - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017-11-17T12:59:03.283-0800 [DEBUG] plugin: starting plugin: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 args=[/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4] | |
2017-11-17T12:59:03.287-0800 [DEBUG] plugin: waiting for RPC address: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 | |
2017-11-17T12:59:03.294-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] plugin: plugin address: unix /var/folders/k0/20t4zc0n2n927f_cytcbytq480838l/T/plugin711613641 | |
2017/11/17 12:59:03 [INFO] terraform: building graph: GraphTypeValidate | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:03 [DEBUG] Starting graph walk: walkValidate | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
tate{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be6e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc4201be690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_auth_backend.aws | |
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"aws", Type:"vault_auth_backend", RawCount:(*config.RawConfig)(0xc420397f80), RawConfig:(*config.RawConfig)(0xc420397f10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.test | |
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc4203ec070), RawConfig:(*config.RawConfig)(0xc4203ec000), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.example | |
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"example", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc4203ec150), RawConfig:(*config.RawConfig)(0xc4203ec0e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:03 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/11/17 12:59:03 [TRACE] Attach provider request: []string{} vault | |
2017/11/17 12:59:03 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc420397e30)} | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:03 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
output.policy_name - *terraform.NodeApplyableOutput | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.TargetsTransformer: | |
output.policy_name - *terraform.NodeApplyableOutput | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
var.vault_address - *terraform.NodeRootVariable | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
p2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [INFO] Using Vault token with the following policies: root | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc4201be690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance | |
vault_auth_backend.aws: Refreshing state... (ID: tf) | |
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be6e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance | |
vault_aws_auth_backend_role.example: Refreshing state... (ID: auth/aws/role/tf-test-role) | |
vault_policy.test: Refreshing state... (ID: tf-test) | |
2017-11-17T12:59:03.649-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Checking if AWS auth backend role "auth/aws/role/tf-test-role" exists | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/policy/tf-test HTTP/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/auth HTTP/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552 | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 1025 | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT | |
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.854-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.854-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683 | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Checked if AWS auth backend role "auth/aws/role/tf-test-role" exists | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Reading AWS auth backend role "auth/aws/role/tf-test-role" | |
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552 | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 305 | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683 | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Read AWS auth backend role "auth/aws/role/tf-test-role" | |
2017/11/17 12:59:04 [INFO] backend/local: apply calling Plan | |
2017/11/17 12:59:04 [INFO] terraform: building graph: GraphTypePlan | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653310), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420653180), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:04 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:04 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
vider | |
var.vault_address - *terraform.NodeRootVariable | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.aws - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource | |
vault_policy.test - *terraform.NodePlannableResource | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:04 [DEBUG] Starting graph walk: walkPlan | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT | |
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [INFO] Using Vault token with the following policies: root | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420653180), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653310), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017-11-17T12:59:04.454-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Instance Diff is nil in Diff() | |
2017-11-17T12:59:04.454-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Instance Diff is nil in Diff() | |
2017/11/17 12:59:04 [INFO] terraform: building graph: GraphTypeApply | |
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420652460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:04 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeApplyableResource | |
2017/11/17 12:59:04 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/11/17 12:59:04 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "output.policy_name" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [INFO] Using Vault token with the following policies: root | |
vault_aws_auth_backend_role.example: Modifying... (ID: auth/aws/role/tf-test-role) | |
bound_iam_principal_arn: "arn:aws:iam::1111111111111:role/internal-role" => "arn:aws:iam::11111111111:role/*" | |
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Updating AWS auth backend role "auth/aws/role/tf-test-role" | |
policies.#: "1" => "2" | |
policies.1: "" => "admin" | |
role: "tf-test-role" => "test-role" | |
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: PUT /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 146 | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: d6433a65-a1a4-9513-79cb-4c00847faae1 | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 400 Bad Request | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 141 | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017/11/17 12:59:04 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
2017/11/17 12:59:04 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
2017/11/17 12:59:04 [TRACE] [walkApply] Exiting eval tree: vault_aws_auth_backend_role.example | |
2017/11/17 12:59:04 [DEBUG] plugin: waiting for all plugin processes to complete... | |
Error: Error applying plan: | |
1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. | |
2017-11-17T12:59:04.996-0800 [DEBUG] plugin: plugin process exited: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 | |
user:~/gitlab/internal/internal-vault-config$ ./terraform apply -var-file=nonprod.tfvars -auto-approve=true > debug.log | |
2017/11/17 12:59:10 [INFO] Terraform version: 0.11.0 ec9d4f1d0f90e8ec5148f94b6d634eb542a4f0ce+CHANGES | |
2017/11/17 12:59:10 [INFO] Go runtime version: go1.9 | |
2017/11/17 12:59:10 [INFO] CLI args: []string{"/Users/user/gitlab/internal/internal-vault-config/terraform", "apply", "-var-file=nonprod.tfvars", "-auto-approve=true"} | |
2017/11/17 12:59:10 [DEBUG] Attempting to open CLI config file: /Users/user/.terraformrc | |
2017/11/17 12:59:10 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2017/11/17 12:59:10 [INFO] CLI command args: []string{"apply", "-var-file=nonprod.tfvars", "-auto-approve=true"} | |
2017/11/17 12:59:10 [INFO] command: empty terraform config, returning nil | |
2017/11/17 12:59:10 [DEBUG] command: no data state file found for backend config | |
2017/11/17 12:59:10 [DEBUG] New state was assigned lineage "a884c8be-d481-4b10-b786-dab4c5d55484" | |
2017/11/17 12:59:10 [INFO] command: backend initialized: <nil> | |
2017/11/17 12:59:10 [DEBUG] checking for provider in "." | |
2017/11/17 12:59:10 [DEBUG] checking for provider in "/Users/user/gitlab/internal/internal-vault-config" | |
2017/11/17 12:59:10 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2017/11/17 12:59:10 [DEBUG] found provider "terraform-provider-vault_v1.0.0_x4" | |
2017/11/17 12:59:10 [DEBUG] found valid plugin: "vault" | |
2017/11/17 12:59:10 [DEBUG] checking for provisioner in "." | |
2017/11/17 12:59:10 [DEBUG] checking for provisioner in "/Users/user/gitlab/internal/internal-vault-config" | |
2017/11/17 12:59:10 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2017/11/17 12:59:10 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2017/11/17 12:59:10 [INFO] backend/local: starting Apply operation | |
2017/11/17 12:59:10 [INFO] terraform: building graph: GraphTypeInput | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkInput | |
2017-11-17T12:59:10.798-0800 [DEBUG] plugin: starting plugin: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 args=[/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4] | |
2017-11-17T12:59:10.802-0800 [DEBUG] plugin: waiting for RPC address: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 | |
2017-11-17T12:59:10.810-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:10 [DEBUG] plugin: plugin address: unix /var/folders/k0/20t4zc0n2n927f_cytcbytq480838l/T/plugin982061042 | |
2017/11/17 12:59:10 [INFO] terraform: building graph: GraphTypeValidate | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [DEBUG] resource vault_auth_backend.aws using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] resource vault_policy.test using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkValidate | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_auth_backend.aws - *terraform.NodeValidatableResourceInstance | |
erenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.test - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_policy.test - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_policy.test" | |
2017/11/17 12:59:10 [TRACE] dag/walk: walking "vault_policy.test" | |
2017/11/17 12:59:10 [TRACE] vertex 'root.vault_policy.test': walking | |
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:10 [TRACE] vertex 'root.vault_policy.test': evaluating | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:10 [TRACE] [walkValidate] Exiting eval tree: vault_auth_backend.aws | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:10 [TRACE] [walkValidate] Entering eval tree: vault_policy.test | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance | |
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalSequence | |
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResoug)(0xc420343b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.test | |
2017/11/17 12:59:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc420343c70), RawConfig:(*config.RawConfig)(0xc420343c00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.example | |
2017/11/17 12:59:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"example", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc420343d50), RawConfig:(*config.RawConfig)(0xc420343ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
var.vault_address - *terraform.NodeRootVariable | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
2017/11/17 12:59:10 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/11/17 12:59:10 [TRACE] Attach provider request: []string{} vault | |
20le - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.test - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkRefresh | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_auth_backend.aws" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_policy.test" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.example" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "var.vault_address" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "output.policy_name" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "root" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "output.policy_name" waiting on "vault_policy.test" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_auth_backend.aws" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_auth_backend.aws" waiting on "provider.vault" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.example" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_policy.test" waiting on "provider.vault" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.example" waiting on "provider.vault" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault" waiting on "var.vault_address" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_policy.test" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "root" waiting on "output.policy_name" | |
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2017/11/17 12:59:10 [TRACE] dag/walk: dependencies changed for "output.policy_name", sending new deps | |
2017/11/17 2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:10 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [INFO] Using Vault token with the following policies: root | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a8820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a8870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Checking if AWS auth backend role "auth/aws/role/tf-test-role" exists | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/policy/tf-test HTTP/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/auth HTTP/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 305 | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 1025 | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683 | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Checked if AWS auth backend role "auth/aws/role/tf-test-role" exists | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Reading AWS auth backend role "auth/aws/role/tf-test-role" | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683 | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Read AWS auth backend role "auth/aws/role/tf-test-role" | |
2017/11/17 12:59:11 [INFO] backend/local: apply calling Plan | |
2017/11/17 12:59:11 [INFO] terraform: building graph: GraphTypePlan | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d10), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423db0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d60), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
output.policy_name - *terraform.NodeApplyableOutput | |
vault_auth_backend.aws - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource | |
vault_policy.test - *terraform.NodePlannableResource | |
2017/11/17 12:59:11 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: [] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_policy.test" references: [] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT | |
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [INFO] Using Vault token with the following policies: root | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423db0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_policy.test - *terraform.NodePlannableResourceInstance | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d60), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017-11-17T12:59:11.913-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Instance Diff is nil in Diff() | |
2017/11/17 12:59:11 [TRACE] root: eval: *terraform.EvalReadState | |
2017/11/17 12:59:11 [INFO] terraform: building graph: GraphTypeApply | |
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d85a0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.example - *terraform.NodeApplyableResource | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: [] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "var.vault_address" references: [] | |
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "output.policy_name" references: [] | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101 | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023 | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339 | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:12 GMT | |
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [INFO] Using Vault token with the following policies: root | |
2017/11/17 12:59:12 [DEBUG] apply: vault_aws_auth_backend_role.example: executing Apply | |
2017-11-17T12:59:12.234-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Updating AWS auth backend role "auth/aws/role/tf-test-role" | |
2017-11-17T12:59:12.234-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Request Details: | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]--------------------------------------- | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: PUT /v1/auth/aws/role/tf-test-role HTTP/1.1 | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1 | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 146 | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 878bb75d-4309-010b-27ca-6ee724736add | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Response Details: | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 400 Bad Request | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 141 | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:12 GMT | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: | |
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ----------------------------------------------------- | |
2017/11/17 12:59:12 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
2017/11/17 12:59:12 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
2017/11/17 12:59:12 [DEBUG] plugin: waiting for all plugin processes to complete... | |
Error: Error applying plan: | |
1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request. | |
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role | |
Code: 400. Errors: | |
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}' | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment