Skip to content

Instantly share code, notes, and snippets.

@melbit-michaelw
Created February 10, 2021 01:55
Show Gist options
  • Save melbit-michaelw/02f2010884b69daf3b78c578f3ff8f07 to your computer and use it in GitHub Desktop.
Save melbit-michaelw/02f2010884b69daf3b78c578f3ff8f07 to your computer and use it in GitHub Desktop.
Terraform Apply After Unwrapping Secret_id
2021/02/10 11:54:24 [INFO] Terraform version: 0.12.29
2021/02/10 11:54:24 [INFO] Go runtime version: go1.12.13
2021/02/10 11:54:24 [INFO] CLI args: []string{"/Users/michaelw/bin/terraform", "apply"}
2021/02/10 11:54:24 [DEBUG] Attempting to open CLI config file: /Users/michaelw/.terraformrc
2021/02/10 11:54:24 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2021/02/10 11:54:24 [INFO] CLI command args: []string{"apply"}
2021/02/10 11:54:24 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config
2021/02/10 11:54:24 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory
2021/02/10 11:54:24 [DEBUG] New state was assigned lineage "faebc37a-0d52-b40b-a2d2-5f205228a915"
2021/02/10 11:54:24 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend)
2021/02/10 11:54:24 [TRACE] Meta.Backend: instantiated backend of type <nil>
2021/02/10 11:54:24 [DEBUG] checking for provider in "."
2021/02/10 11:54:24 [DEBUG] checking for provider in "/Users/michaelw/bin"
2021/02/10 11:54:24 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2021/02/10 11:54:24 [DEBUG] found provider "terraform-provider-vault_v2.18.0_x4"
2021/02/10 11:54:24 [DEBUG] found valid plugin: "vault", "2.18.0", "/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4"
2021/02/10 11:54:24 [DEBUG] checking for provisioner in "."
2021/02/10 11:54:24 [DEBUG] checking for provisioner in "/Users/michaelw/bin"
2021/02/10 11:54:24 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2021/02/10 11:54:24 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend
2021/02/10 11:54:24 [INFO] backend/local: starting Apply operation
2021/02/10 11:54:24 [TRACE] backend/local: requesting state manager for workspace "default"
2021/02/10 11:54:24 [TRACE] backend/local: state manager for workspace "default" will:
- read initial snapshot from terraform.tfstate
- write new snapshots to terraform.tfstate
- create any backup at terraform.tfstate.backup
2021/02/10 11:54:24 [TRACE] backend/local: requesting state lock for workspace "default"
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: existing snapshot has lineage "caac3c75-1723-184d-d5a0-3b58398483e0" serial 3
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info
2021/02/10 11:54:24 [TRACE] backend/local: reading remote state for workspace "default"
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2021/02/10 11:54:24 [TRACE] statemgr.Filesystem: read snapshot with lineage "caac3c75-1723-184d-d5a0-3b58398483e0" serial 3
2021/02/10 11:54:24 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2021/02/10 11:54:24 [TRACE] backend/local: building context for current working directory
2021/02/10 11:54:24 [TRACE] terraform.NewContext: starting
2021/02/10 11:54:24 [TRACE] terraform.NewContext: resolving provider version selections
2021/02/10 11:54:24 [TRACE] terraform.NewContext: loading provider schemas
2021/02/10 11:54:24 [TRACE] LoadSchemas: retrieving schema for provider type "vault"
2021-02-10T11:54:24.156+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:54:24.193+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:54:24.198+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32458
2021-02-10T11:54:24.199+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:54:24.216+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:54:24.215+1000
2021-02-10T11:54:24.246+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:54:24.246+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin677658617 network=unix timestamp=2021-02-10T11:54:24.246+1000
2021/02/10 11:54:24 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:54:24.322+1000 [TRACE] plugin.stdio: waiting for stdio data
2021-02-10T11:54:24.323+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:54:24 [TRACE] GRPCProvider: Close
2021-02-10T11:54:24.337+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32458
2021-02-10T11:54:24.337+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:54:24 [TRACE] terraform.NewContext: complete
2021/02/10 11:54:24 [TRACE] backend/local: finished building terraform.Context
2021/02/10 11:54:24 [TRACE] backend/local: requesting interactive input, if necessary
2021/02/10 11:54:24 [TRACE] Context.Input: Prompting for provider arguments
2021/02/10 11:54:24 [TRACE] Context.Input: Provider provider.vault declared at test.tf:14,1-17
2021/02/10 11:54:24 [TRACE] Context.Input: Input for provider.vault: map[string]cty.Value{}
2021/02/10 11:54:24 [TRACE] backend/local: running validation operation
2021/02/10 11:54:24 [INFO] terraform: building graph: GraphTypeValidate
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:54:24 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:54:24 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) config from test.tf:1,1-53
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) config from test.tf:8,1-65
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:54:24 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:54:24 [DEBUG] Starting graph walk: walkValidate
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: provider.vault
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:54:24.347+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:54:24.377+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:54:24.381+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32459
2021-02-10T11:54:24.381+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:54:24.397+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:54:24.397+1000
2021-02-10T11:54:24.428+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:54:24.428+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin472239038 network=unix timestamp=2021-02-10T11:54:24.428+1000
2021/02/10 11:54:24 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021-02-10T11:54:24.493+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2021/02/10 11:54:24 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:54:24 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:54:24.493+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:54:24 [TRACE] GRPCProvider: PrepareProviderConfig
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: provider.vault
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeValidatableResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalValidateResource
2021/02/10 11:54:24 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeValidatableResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalValidateResource
2021/02/10 11:54:24 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:54:24 [TRACE] GRPCProvider: Close
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:54:24 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:54:24.517+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32459
2021-02-10T11:54:24.517+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:54:24 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "root"
2021/02/10 11:54:24 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:54:24 [TRACE] vertex "root": visit complete
2021/02/10 11:54:24 [INFO] backend/local: apply calling Refresh
2021/02/10 11:54:24 [INFO] terraform: building graph: GraphTypeRefresh
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:54:24 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:54:24 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ConfigTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:54:24 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeRefreshableManagedResource) config from test.tf:8,1-65
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeRefreshableManagedResource) config from test.tf:1,1-53
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:54:24 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeRefreshableManagedResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeRefreshableManagedResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/02/10 11:54:24 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role.role_id depends on []
2021/02/10 11:54:24 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role_secret_id.secret_id depends on [vault_approle_auth_backend_role.role_id]
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
root - terraform.graphNodeRoot
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
root - terraform.graphNodeRoot
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResource
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResource
------
2021/02/10 11:54:24 [DEBUG] Starting graph walk: walkRefresh
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:54:24 [TRACE] [walkRefresh] Entering eval tree: provider.vault
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:54:24.519+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:54:24.548+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:54:24.553+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32461
2021-02-10T11:54:24.553+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:54:24.567+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:54:24.567+1000
2021-02-10T11:54:24.599+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:54:24.599+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin190307544 network=unix timestamp=2021-02-10T11:54:24.599+1000
2021-02-10T11:54:24.663+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:54:24 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2021/02/10 11:54:24 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:54:24 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:54:24.665+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:54:24 [TRACE] GRPCProvider: Configure
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.675+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "8b48e436-29c3-af86-b1ca-e8c549640e4f",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root",
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.676+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": ""
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "329f2bd2-fa40-8487-0f74-4677fb0444e3",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": {
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.YFu4lPnXvC5nQH3rYHm06QKG",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "qTQKei3NZUgbHba5nWyl4IBe",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service",
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.677+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [INFO] Using Vault token with the following policies: root
2021/02/10 11:54:24 [TRACE] [walkRefresh] Exiting eval tree: provider.vault
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeRefreshableManagedResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": expanding dynamic subgraph
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodeRefreshableManagedResourceInstance
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": entering dynamic subgraph
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeRefreshableManagedResourceInstance)
2021/02/10 11:54:24 [TRACE] NodeRefreshableManagedResourceInstance: vault_approle_auth_backend_role.role_id will be refreshed
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkRefresh] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:24 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] UpgradeResourceState: schema version of vault_approle_auth_backend_role.role_id is still 0; calling provider "registry.terraform.io/-/vault" for any other minor fixups
2021/02/10 11:54:24 [TRACE] GRPCProvider: UpgradeResourceState
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalRefreshDependencies
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalRefresh
2021/02/10 11:54:24 [TRACE] GRPCProvider: ReadResource
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Checking if AppRole auth backend role "auth/approle/role/approle-testing-role" exists
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role HTTP/1.1
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.YFu4lPnXvC5nQH3rYHm06QKG
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 478
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "bb228cc8-88b7-4ceb-0464-831f18dd6614",
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "local_secret_ids": false,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_bound_cidrs": null,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_num_uses": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_ttl": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_bound_cidrs": [],
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_explicit_max_ttl": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_max_ttl": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_no_default_policy": false,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_num_uses": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_period": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default"
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_ttl": 0,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default"
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Checked if AppRole auth backend role "auth/approle/role/approle-testing-role" exists
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role HTTP/1.1
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.YFu4lPnXvC5nQH3rYHm06QKG
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.683+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 478
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "4766b348-b650-c3cc-7d0f-342e44c5717c",
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "local_secret_ids": false,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_bound_cidrs": null,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_num_uses": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_ttl": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_bound_cidrs": [],
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_explicit_max_ttl": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_max_ttl": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_no_default_policy": false,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_num_uses": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_period": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default"
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_ttl": 0,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default"
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role/role-id HTTP/1.1
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.YFu4lPnXvC5nQH3rYHm06QKG
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.684+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 192
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "3e29242b-3cc7-e7e3-b0da-1dba7630270f",
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "role_id": "approle-testing-role"
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.685+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:24 [TRACE] EvalWriteState: recording 0 dependencies for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] [walkRefresh] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": dynamic subgraph completed successfully
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeRefreshableManagedResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": expanding dynamic subgraph
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeRefreshableManagedResourceInstance
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": entering dynamic subgraph
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeRefreshableManagedResourceInstance)
2021/02/10 11:54:24 [TRACE] NodeRefreshableManagedResourceInstance: vault_approle_auth_backend_role_secret_id.secret_id will be refreshed
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkRefresh] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:24 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] UpgradeResourceState: schema version of vault_approle_auth_backend_role_secret_id.secret_id is still 0; calling provider "registry.terraform.io/-/vault" for any other minor fixups
2021/02/10 11:54:24 [TRACE] GRPCProvider: UpgradeResourceState
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalRefreshDependencies
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalRefresh
2021/02/10 11:54:24 [TRACE] GRPCProvider: ReadResource
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/token/lookup-accessor HTTP/1.1
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 39
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.YFu4lPnXvC5nQH3rYHm06QKG
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX"
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.686+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 400 Bad Request
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 59
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "errors": [
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "1 error occurred:\n\t* invalid accessor\n\n"
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ]
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.687+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:24 [TRACE] EvalWriteState: removing state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] [walkRefresh] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": dynamic subgraph completed successfully
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:54:24 [TRACE] [walkRefresh] Entering eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:54:24 [TRACE] [walkRefresh] Entering eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:54:24 [TRACE] GRPCProvider: Close
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:54:24 [TRACE] [walkRefresh] Exiting eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": visit complete
2021-02-10T11:54:24.689+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32461
2021-02-10T11:54:24.689+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:54:24 [TRACE] [walkRefresh] Exiting eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "root"
2021/02/10 11:54:24 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:54:24 [TRACE] vertex "root": visit complete
2021/02/10 11:54:24 [INFO] backend/local: apply calling Plan
2021/02/10 11:54:24 [INFO] terraform: building graph: GraphTypePlan
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:54:24 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:54:24 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) config from test.tf:1,1-53
2021/02/10 11:54:24 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) config from test.tf:8,1-65
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:54:24 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) needs provider.vault
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:54:24 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/02/10 11:54:24 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping
2021/02/10 11:54:24 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:54:24 [DEBUG] Starting graph walk: walkPlan
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: provider.vault
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:54:24.691+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:54:24.721+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:54:24.726+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32462
2021-02-10T11:54:24.726+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:54:24.741+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:54:24.741+1000
2021-02-10T11:54:24.772+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin083202397 network=unix timestamp=2021-02-10T11:54:24.772+1000
2021-02-10T11:54:24.772+1000 [DEBUG] plugin: using plugin: version=5
2021/02/10 11:54:24 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021-02-10T11:54:24.842+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2021/02/10 11:54:24 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:54:24 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:54:24.842+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:54:24 [TRACE] GRPCProvider: Configure
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.851+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "f1425722-606c-6780-1072-c959a8970f3f",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Request Details:
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "",
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": ""
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.852+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [DEBUG] Vault API Response Details:
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:24 GMT
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "25912b0b-d465-012f-5c8e-9f748a8e8f60",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": {
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.d6xtCFJZcey5ux05QTHoyu5z",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "E71tzFK7qClPyQMCnTCOYiA4",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service",
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: provider.vault
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:24.853+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:24 [INFO] Using Vault token with the following policies: root
2021/02/10 11:54:24 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": expanding dynamic subgraph
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResourceInstance
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": entering dynamic subgraph
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResourceInstance)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:24 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] UpgradeResourceState: schema version of vault_approle_auth_backend_role.role_id is still 0; calling provider "registry.terraform.io/-/vault" for any other minor fixups
2021/02/10 11:54:24 [TRACE] GRPCProvider: UpgradeResourceState
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:54:24 [TRACE] Re-validating config for "vault_approle_auth_backend_role.role_id"
2021/02/10 11:54:24 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:54:24 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:24 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:54:24 [TRACE] EvalWriteDiff: recorded NoOp change for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": dynamic subgraph completed successfully
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResource)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": expanding dynamic subgraph
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResourceInstance
------
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:24 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:24 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: []
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:54:24 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:24 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": entering dynamic subgraph
2021/02/10 11:54:24 [TRACE] dag/walk: updating graph
2021/02/10 11:54:24 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResourceInstance)
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:24 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:54:24 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:24 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:54:24 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:24 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:54:24 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": dynamic subgraph completed successfully
2021/02/10 11:54:24 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:54:24 [TRACE] GRPCProvider: Close
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:54:24 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: output.wrapped_secret
2021/02/10 11:54:24 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:54:24 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:24 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:24 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:54:24.863+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32462
2021-02-10T11:54:24.863+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:54:24 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close)
2021/02/10 11:54:24 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:54:24 [TRACE] dag/walk: visiting "root"
2021/02/10 11:54:24 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:54:24 [TRACE] vertex "root": visit complete
2021/02/10 11:54:24 [DEBUG] command: asking for input: "Do you want to perform these actions?"
2021/02/10 11:54:27 [INFO] backend/local: apply calling Apply
2021/02/10 11:54:27 [INFO] terraform: building graph: GraphTypeApply
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:54:27 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.DiffTransformer
2021/02/10 11:54:27 [TRACE] DiffTransformer starting
2021/02/10 11:54:27 [TRACE] DiffTransformer: found NoOp change for vault_approle_auth_backend_role.role_id
2021/02/10 11:54:27 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] DiffTransformer: vault_approle_auth_backend_role_secret_id.secret_id will be represented by vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] DiffTransformer complete
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph:
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.OrphanResourceTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.OrphanResourceTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:54:27 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:1,1-53
2021/02/10 11:54:27 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:8,1-65
2021/02/10 11:54:27 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) config from test.tf:8,1-65
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:54:27 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:54:27 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:54:27 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id (prepare state) is provided by provider.vault or inherited equivalent
2021/02/10 11:54:27 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id (prepare state) is provided by provider.vault or inherited equivalent
2021/02/10 11:54:27 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:54:27 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:54:27 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault
2021/02/10 11:54:27 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:54:27 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault
2021/02/10 11:54:27 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) needs provider.vault
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:54:27 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:54:27 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:54:27 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:54:27 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:54:27 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" references: []
2021/02/10 11:54:27 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id (prepare state)]
2021/02/10 11:54:27 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id (prepare state) vault_approle_auth_backend_role_secret_id.secret_id vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:54:27 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:54:27 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" references: []
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/02/10 11:54:27 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role_secret_id.secret_id depends on [vault_approle_auth_backend_role.role_id]
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.PruneUnusedValuesTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.PruneUnusedValuesTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:54:27 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:54:27 [DEBUG] Starting graph walk: walkApply
2021/02/10 11:54:27 [TRACE] dag/walk: updating graph
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:54:27 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id (prepare state)" waiting on "provider.vault"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" waiting on "provider.vault"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:27 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id (prepare state)", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:54:27 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:54:27 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: provider.vault
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:54:27.399+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:54:27.429+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:54:27.435+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32463
2021-02-10T11:54:27.435+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:54:27.452+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:54:27.452+1000
2021-02-10T11:54:27.484+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:54:27.484+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin052010938 network=unix timestamp=2021-02-10T11:54:27.484+1000
2021/02/10 11:54:27 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021/02/10 11:54:27 [TRACE] <root>: eval: terraform.EvalNoop
2021-02-10T11:54:27.548+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:54:27 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2021/02/10 11:54:27 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:54:27 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:54:27.548+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:54:27 [TRACE] GRPCProvider: Configure
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Request Details:
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.558+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Response Details:
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:27 GMT
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "b2731dfb-562a-d7fe-be6e-45030da41c55",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Request Details:
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "",
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": ""
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.559+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Response Details:
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:27 GMT
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "162a6c00-0432-fd2f-962f-9b9717cd4ed3",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": {
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.F2vEYhrV4BQEj11LWPhBr0Ki",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "tJDuQ0fY1iT6f3IY8dRqBM10",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service",
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.560+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [INFO] Using Vault token with the following policies: root
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: provider.vault
2021/02/10 11:54:27 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": starting visit (*terraform.NodeApplyableResource)
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": evaluating
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": starting visit (*terraform.NodeApplyableResource)
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": evaluating
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": visit complete
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": visit complete
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeApplyableResourceInstance)
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:54:27 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:54:27 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:27 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:54:27 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:54:27 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:54:27 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:54:27 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange
2021/02/10 11:54:27 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create)
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:54:27 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalReduceDiff
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:54:27 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalApplyPre
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalApply
2021/02/10 11:54:27 [DEBUG] vault_approle_auth_backend_role_secret_id.secret_id: applying the planned Create change
2021/02/10 11:54:27 [TRACE] GRPCProvider: ApplyResourceChange
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Writing AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Request Details:
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role/secret-id HTTP/1.1
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 15
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.F2vEYhrV4BQEj11LWPhBr0Ki
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Wrap-Ttl: 30m
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": ""
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.564+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Response Details:
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 327
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:27 GMT
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "",
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": {
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token": "s.oytRONYLrzxEIVvjjPDOkym2",
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cAUYnMOWTtWhejxFEMGlM0AB",
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1800,
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": "2021-02-10T11:54:27.565413+10:00",
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_path": "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Wrote AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Request Details:
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/token/lookup-accessor HTTP/1.1
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 39
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.F2vEYhrV4BQEj11LWPhBr0Ki
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.565+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cAUYnMOWTtWhejxFEMGlM0AB"
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:54:27 [DEBUG] Vault API Response Details:
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 581
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:54:27 GMT
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "b666c2c6-0352-06d4-7fdf-2ec85a855e17",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cAUYnMOWTtWhejxFEMGlM0AB",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612922067,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 1800,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": "2021-02-10T12:24:27.56555+10:00",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 1800,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "issue_time": "2021-02-10T11:54:27.565555+10:00",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 1,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/approle/role/approle-testing-role/secret-id",
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "response-wrapping"
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1799,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:54:27.566+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:27 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:54:27 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalApplyPost
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: creating backup snapshot at terraform.tfstate.backup
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 4
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:54:27 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:54:27 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:54:27 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:54:27 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:54:27 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: provider.vault (close)
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:54:27 [TRACE] GRPCProvider: Close
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: output.wrapped_secret
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:54:27 [TRACE] EvalWriteOutput: Saving value for output.wrapped_secret in state
2021/02/10 11:54:27 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: output.wrapped_secret
2021/02/10 11:54:27 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:54:27 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:54:27 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:54:27 [TRACE] [walkApply] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:27 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:54:27 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:54:27.587+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32463
2021-02-10T11:54:27.587+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:54:27 [TRACE] [walkApply] Exiting eval tree: provider.vault (close)
2021/02/10 11:54:27 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:54:27 [TRACE] dag/walk: visiting "root"
2021/02/10 11:54:27 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:54:27 [TRACE] vertex "root": visit complete
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 5
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info
2021/02/10 11:54:27 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment