Skip to content

Instantly share code, notes, and snippets.

@dond00m
Created November 17, 2017 21:13
Show Gist options
  • Save dond00m/2979149b76a6b0c794b83258fe8de814 to your computer and use it in GitHub Desktop.
Save dond00m/2979149b76a6b0c794b83258fe8de814 to your computer and use it in GitHub Desktop.
2017/11/17 12:59:03 [INFO] Terraform version: 0.11.0 ec9d4f1d0f90e8ec5148f94b6d634eb542a4f0ce+CHANGES
2017/11/17 12:59:03 [INFO] Go runtime version: go1.9
2017/11/17 12:59:03 [INFO] CLI args: []string{"/Users/user/gitlab/internal/internal-vault-config/terraform", "apply", "-var-file=nonprod.tfvars", "-auto-approve=true"}
2017/11/17 12:59:03 [DEBUG] Attempting to open CLI config file: /Users/user/.terraformrc
2017/11/17 12:59:03 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2017/11/17 12:59:03 [INFO] CLI command args: []string{"apply", "-var-file=nonprod.tfvars", "-auto-approve=true"}
2017/11/17 12:59:03 [INFO] command: empty terraform config, returning nil
2017/11/17 12:59:03 [DEBUG] command: no data state file found for backend config
2017/11/17 12:59:03 [DEBUG] New state was assigned lineage "3a0b404a-a1e7-4d28-9e22-bfefb0de4e1c"
2017/11/17 12:59:03 [INFO] command: backend initialized: <nil>
2017/11/17 12:59:03 [DEBUG] checking for provider in "."
2017/11/17 12:59:03 [DEBUG] checking for provider in "/Users/user/gitlab/internal/internal-vault-config"
2017/11/17 12:59:03 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2017/11/17 12:59:03 [DEBUG] found provider "terraform-provider-vault_v1.0.0_x4"
2017/11/17 12:59:03 [DEBUG] found valid plugin: "vault"
2017/11/17 12:59:03 [DEBUG] checking for provisioner in "."
2017/11/17 12:59:03 [DEBUG] checking for provisioner in "/Users/user/gitlab/internal/internal-vault-config"
2017/11/17 12:59:03 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2017/11/17 12:59:03 [INFO] command: backend <nil> is not enhanced, wrapping in local
2017/11/17 12:59:03 [INFO] backend/local: starting Apply operation
2017/11/17 12:59:03 [INFO] terraform: building graph: GraphTypeInput
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:03 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
plyableProvider
vault_policy.test - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2017-11-17T12:59:03.283-0800 [DEBUG] plugin: starting plugin: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 args=[/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4]
2017-11-17T12:59:03.287-0800 [DEBUG] plugin: waiting for RPC address: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4
2017-11-17T12:59:03.294-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] plugin: plugin address: unix /var/folders/k0/20t4zc0n2n927f_cytcbytq480838l/T/plugin711613641
2017/11/17 12:59:03 [INFO] terraform: building graph: GraphTypeValidate
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:03 [DEBUG] Starting graph walk: walkValidate
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420430460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420430410), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4204303c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
tate{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be6e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc4201be690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Beginning...
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_auth_backend.aws
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"aws", Type:"vault_auth_backend", RawCount:(*config.RawConfig)(0xc420397f80), RawConfig:(*config.RawConfig)(0xc420397f10), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.test
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc4203ec070), RawConfig:(*config.RawConfig)(0xc4203ec000), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:03 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.example
2017/11/17 12:59:03 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"example", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc4203ec150), RawConfig:(*config.RawConfig)(0xc4203ec0e0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootVariableTransformer:
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:03 [TRACE] ProviderConfigTransformer: Starting for path: []
2017/11/17 12:59:03 [TRACE] Attach provider request: []string{} vault
2017/11/17 12:59:03 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc420397e30)}
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.MissingProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:03 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:03 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:03 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.PruneProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ParentProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
provider.vault - *terraault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer:
output.policy_name - *terraform.NodeApplyableOutput
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.TargetsTransformer:
output.policy_name - *terraform.NodeApplyableOutput
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
var.vault_address - *terraform.NodeRootVariable
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
p2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details:
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.404-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details:
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.646-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [INFO] Using Vault token with the following policies: root
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc4201be690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance
vault_auth_backend.aws: Refreshing state... (ID: tf)
2017/11/17 12:59:03 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4201be6e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:03 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:03 [TRACE] Graph after step *terraform.RootTransformer:
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance
vault_aws_auth_backend_role.example: Refreshing state... (ID: auth/aws/role/tf-test-role)
vault_policy.test: Refreshing state... (ID: tf-test)
2017-11-17T12:59:03.649-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Checking if AWS auth backend role "auth/aws/role/tf-test-role" exists
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/policy/tf-test HTTP/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/auth HTTP/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.650-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details:
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 1025
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT
2017-11-17T12:59:03.853-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.854-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.854-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details:
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Checked if AWS auth backend role "auth/aws/role/tf-test-role" exists
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Reading AWS auth backend role "auth/aws/role/tf-test-role"
2017-11-17T12:59:03.861-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Request Details:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 29a3f394-a65c-bdb0-8739-bf9252eb3552
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:03 [DEBUG] Vault API Response Details:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 305
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:03 GMT
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:03.862-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details:
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.051-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Read AWS auth backend role "auth/aws/role/tf-test-role"
2017/11/17 12:59:04 [INFO] backend/local: apply calling Plan
2017/11/17 12:59:04 [INFO] terraform: building graph: GraphTypePlan
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653310), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420653180), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:04 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:04 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
vider
var.vault_address - *terraform.NodeRootVariable
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_auth_backend.aws - *terraform.NodePlannableResource
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource
vault_policy.test - *terraform.NodePlannableResource
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:04 [DEBUG] Starting graph walk: walkPlan
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details:
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.146-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details:
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT
2017-11-17T12:59:04.450-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.451-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [INFO] Using Vault token with the following policies: root
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420653180), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [TRACE] root: eval: *terraform.EvalGetProvider
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420653310), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017-11-17T12:59:04.454-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Instance Diff is nil in Diff()
2017-11-17T12:59:04.454-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Instance Diff is nil in Diff()
2017/11/17 12:59:04 [INFO] terraform: building graph: GraphTypeApply
2017/11/17 12:59:04 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{"vault_policy.test"}, Primary:(*terraform.InstanceState)(0xc420652460), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:04 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeApplyableResource
2017/11/17 12:59:04 [TRACE] ProviderConfigTransformer: Starting for path: []
2017/11/17 12:59:04 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "output.policy_name" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:04 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details:
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.549-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details:
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.769-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [INFO] Using Vault token with the following policies: root
vault_aws_auth_backend_role.example: Modifying... (ID: auth/aws/role/tf-test-role)
bound_iam_principal_arn: "arn:aws:iam::1111111111111:role/internal-role" => "arn:aws:iam::11111111111:role/*"
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Updating AWS auth backend role "auth/aws/role/tf-test-role"
policies.#: "1" => "2"
policies.1: "" => "admin"
role: "tf-test-role" => "test-role"
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Request Details:
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: PUT /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:04.771-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 146
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: d6433a65-a1a4-9513-79cb-4c00847faae1
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.772-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:04 [DEBUG] Vault API Response Details:
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 400 Bad Request
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 141
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:04 GMT
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:04.978-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017/11/17 12:59:04 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
2017/11/17 12:59:04 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
2017/11/17 12:59:04 [TRACE] [walkApply] Exiting eval tree: vault_aws_auth_backend_role.example
2017/11/17 12:59:04 [DEBUG] plugin: waiting for all plugin processes to complete...
Error: Error applying plan:
1 error(s) occurred:
* vault_aws_auth_backend_role.example: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.
2017-11-17T12:59:04.996-0800 [DEBUG] plugin: plugin process exited: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4
user:~/gitlab/internal/internal-vault-config$ ./terraform apply -var-file=nonprod.tfvars -auto-approve=true > debug.log
2017/11/17 12:59:10 [INFO] Terraform version: 0.11.0 ec9d4f1d0f90e8ec5148f94b6d634eb542a4f0ce+CHANGES
2017/11/17 12:59:10 [INFO] Go runtime version: go1.9
2017/11/17 12:59:10 [INFO] CLI args: []string{"/Users/user/gitlab/internal/internal-vault-config/terraform", "apply", "-var-file=nonprod.tfvars", "-auto-approve=true"}
2017/11/17 12:59:10 [DEBUG] Attempting to open CLI config file: /Users/user/.terraformrc
2017/11/17 12:59:10 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2017/11/17 12:59:10 [INFO] CLI command args: []string{"apply", "-var-file=nonprod.tfvars", "-auto-approve=true"}
2017/11/17 12:59:10 [INFO] command: empty terraform config, returning nil
2017/11/17 12:59:10 [DEBUG] command: no data state file found for backend config
2017/11/17 12:59:10 [DEBUG] New state was assigned lineage "a884c8be-d481-4b10-b786-dab4c5d55484"
2017/11/17 12:59:10 [INFO] command: backend initialized: <nil>
2017/11/17 12:59:10 [DEBUG] checking for provider in "."
2017/11/17 12:59:10 [DEBUG] checking for provider in "/Users/user/gitlab/internal/internal-vault-config"
2017/11/17 12:59:10 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2017/11/17 12:59:10 [DEBUG] found provider "terraform-provider-vault_v1.0.0_x4"
2017/11/17 12:59:10 [DEBUG] found valid plugin: "vault"
2017/11/17 12:59:10 [DEBUG] checking for provisioner in "."
2017/11/17 12:59:10 [DEBUG] checking for provisioner in "/Users/user/gitlab/internal/internal-vault-config"
2017/11/17 12:59:10 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2017/11/17 12:59:10 [INFO] command: backend <nil> is not enhanced, wrapping in local
2017/11/17 12:59:10 [INFO] backend/local: starting Apply operation
2017/11/17 12:59:10 [INFO] terraform: building graph: GraphTypeInput
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:10 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:10 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkInput
2017-11-17T12:59:10.798-0800 [DEBUG] plugin: starting plugin: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4 args=[/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4]
2017-11-17T12:59:10.802-0800 [DEBUG] plugin: waiting for RPC address: path=/Users/user/gitlab/internal/internal-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v1.0.0_x4
2017-11-17T12:59:10.810-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:10 [DEBUG] plugin: plugin address: unix /var/folders/k0/20t4zc0n2n927f_cytcbytq480838l/T/plugin982061042
2017/11/17 12:59:10 [INFO] terraform: building graph: GraphTypeValidate
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [DEBUG] resource vault_auth_backend.aws using provider provider.vault
2017/11/17 12:59:10 [DEBUG] resource vault_policy.test using provider provider.vault
2017/11/17 12:59:10 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkValidate
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a95e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_auth_backend.aws - *terraform.NodeValidatableResourceInstance
erenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.test - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootTransformer:
vault_policy.test - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_policy.test"
2017/11/17 12:59:10 [TRACE] dag/walk: walking "vault_policy.test"
2017/11/17 12:59:10 [TRACE] vertex 'root.vault_policy.test': walking
2017/11/17 12:59:10 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a9630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:10 [TRACE] vertex 'root.vault_policy.test': evaluating
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:10 [TRACE] [walkValidate] Exiting eval tree: vault_auth_backend.aws
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:10 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:10 [TRACE] [walkValidate] Entering eval tree: vault_policy.test
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResourceInstance
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalSequence
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2017/11/17 12:59:10 [TRACE] root: eval: *terraform.EvalGetProvider
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeValidatableResoug)(0xc420343b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.test
2017/11/17 12:59:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc420343c70), RawConfig:(*config.RawConfig)(0xc420343c00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.example
2017/11/17 12:59:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"example", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc420343d50), RawConfig:(*config.RawConfig)(0xc420343ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:10 [TRACE] Graph after step *terraform.RootVariableTransformer:
var.vault_address - *terraform.NodeRootVariable
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResource
vault_policy.test - *terraform.NodeRefreshableManagedResource
2017/11/17 12:59:10 [TRACE] ProviderConfigTransformer: Starting for path: []
2017/11/17 12:59:10 [TRACE] Attach provider request: []string{} vault
20le - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.test - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2017/11/17 12:59:10 [DEBUG] Starting graph walk: walkRefresh
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_auth_backend.aws"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_policy.test"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.example"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "var.vault_address"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "provider.vault"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "output.policy_name"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2017/11/17 12:59:10 [TRACE] dag/walk: added new vertex: "root"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "output.policy_name" waiting on "vault_policy.test"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_auth_backend.aws"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_auth_backend.aws" waiting on "provider.vault"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.example"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_policy.test" waiting on "provider.vault"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.example" waiting on "provider.vault"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault" waiting on "var.vault_address"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_policy.test"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "root" waiting on "output.policy_name"
2017/11/17 12:59:10 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2017/11/17 12:59:10 [TRACE] dag/walk: dependencies changed for "output.policy_name", sending new deps
2017/11/17 2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:10 [DEBUG] Vault API Request Details:
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:10.929-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.172-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [INFO] Using Vault token with the following policies: root
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a8820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_auth_backend.aws - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4203a8870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.test - *terraform.NodeRefreshableManagedResourceInstance
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeRefreshableManagedResourceInstance
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Checking if AWS auth backend role "auth/aws/role/tf-test-role" exists
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/policy/tf-test HTTP/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/sys/auth HTTP/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.174-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 305
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.382-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 1025
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.383-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Checked if AWS auth backend role "auth/aws/role/tf-test-role" exists
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Reading AWS auth backend role "auth/aws/role/tf-test-role"
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: GET /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: f9c86cfb-6414-e0db-db7b-324ad46eadfa
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.384-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 683
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.565-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Read AWS auth backend role "auth/aws/role/tf-test-role"
2017/11/17 12:59:11 [INFO] backend/local: apply calling Plan
2017/11/17 12:59:11 [INFO] terraform: building graph: GraphTypePlan
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_auth_backend.aws": &terraform.ResourceState{Type:"vault_auth_backend", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d10), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423db0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d60), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer:
output.policy_name - *terraform.NodeApplyableOutput
vault_auth_backend.aws - *terraform.NodePlannableResource
vault_aws_auth_backend_role.example - *terraform.NodePlannableResource
vault_policy.test - *terraform.NodePlannableResource
2017/11/17 12:59:11 [DEBUG] resource vault_aws_auth_backend_role.example using provider provider.vault
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "output.policy_name" references: [vault_policy.test]
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_auth_backend.aws" references: []
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_policy.test" references: []
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Request Details:
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.660-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Vault API Response Details:
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:11 GMT
2017-11-17T12:59:11.910-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:11.911-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [INFO] Using Vault token with the following policies: root
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_policy.test": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423db0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_policy.test - *terraform.NodePlannableResourceInstance
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420423d60), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017-11-17T12:59:11.913-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:11 [DEBUG] Instance Diff is nil in Diff()
2017/11/17 12:59:11 [TRACE] root: eval: *terraform.EvalReadState
2017/11/17 12:59:11 [INFO] terraform: building graph: GraphTypeApply
2017/11/17 12:59:11 [DEBUG] Attaching resource state to "vault_aws_auth_backend_role.example": &terraform.ResourceState{Type:"vault_aws_auth_backend_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d85a0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2017/11/17 12:59:11 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.example - *terraform.NodeApplyableResource
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.example" references: []
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "provider.vault" references: [var.vault_address]
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "var.vault_address" references: []
2017/11/17 12:59:11 [DEBUG] ReferenceTransformer: "output.policy_name" references: []
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Request Details:
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: POST /v1/auth/token/create HTTP/1.1
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 101
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 1338aa80-9f7a-8544-70a6-eca808998023
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.007-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Response Details:
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 200 OK
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 339
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:12 GMT
2017-11-17T12:59:12.229-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:12.230-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [INFO] Using Vault token with the following policies: root
2017/11/17 12:59:12 [DEBUG] apply: vault_aws_auth_backend_role.example: executing Apply
2017-11-17T12:59:12.234-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Updating AWS auth backend role "auth/aws/role/tf-test-role"
2017-11-17T12:59:12.234-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Request Details:
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ REQUEST ]---------------------------------------
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: PUT /v1/auth/aws/role/tf-test-role HTTP/1.1
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Host: vault.nonprod.internal
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: User-Agent: Go-http-client/1.1
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 146
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: X-Vault-Token: 878bb75d-4309-010b-27ca-6ee724736add
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Accept-Encoding: gzip
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.235-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: 2017/11/17 12:59:12 [DEBUG] Vault API Response Details:
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: ---[ RESPONSE ]--------------------------------------
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: HTTP/1.1 400 Bad Request
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Connection: close
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Length: 141
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Cache-Control: no-store
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Content-Type: application/json
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: Date: Fri, 17 Nov 2017 20:59:12 GMT
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4:
2017-11-17T12:59:12.436-0800 [DEBUG] plugin.terraform-provider-vault_v1.0.0_x4: -----------------------------------------------------
2017/11/17 12:59:12 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
2017/11/17 12:59:12 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
2017/11/17 12:59:12 [DEBUG] plugin: waiting for all plugin processes to complete...
Error: Error applying plan:
1 error(s) occurred:
* vault_aws_auth_backend_role.example: 1 error(s) occurred:
* vault_aws_auth_backend_role.example: Error updating AWS auth backend role "auth/aws/role/tf-test-role": Error making API request.
URL: PUT https://vault.nonprod.internal/v1/auth/aws/role/tf-test-role
Code: 400. Errors:
* Error converting input [default admin] for field policies: '' expected type 'string', got unconvertible type '[]interface {}'
Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment