Skip to content

Instantly share code, notes, and snippets.

@melbit-michaelw
Created February 10, 2021 01:53
Show Gist options
  • Save melbit-michaelw/fca4e290438f060f079f3dcc1232a3c4 to your computer and use it in GitHub Desktop.
Save melbit-michaelw/fca4e290438f060f079f3dcc1232a3c4 to your computer and use it in GitHub Desktop.
Initial Terraform Apply
2021/02/10 11:52:09 [INFO] Terraform version: 0.12.29
2021/02/10 11:52:09 [INFO] Go runtime version: go1.12.13
2021/02/10 11:52:09 [INFO] CLI args: []string{"/Users/michaelw/bin/terraform", "apply"}
2021/02/10 11:52:09 [DEBUG] Attempting to open CLI config file: /Users/michaelw/.terraformrc
2021/02/10 11:52:09 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2021/02/10 11:52:09 [INFO] CLI command args: []string{"apply"}
2021/02/10 11:52:09 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config
2021/02/10 11:52:09 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory
2021/02/10 11:52:09 [DEBUG] New state was assigned lineage "2781701a-a75a-7302-2d60-64afb8636be6"
2021/02/10 11:52:09 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend)
2021/02/10 11:52:09 [TRACE] Meta.Backend: instantiated backend of type <nil>
2021/02/10 11:52:09 [DEBUG] checking for provider in "."
2021/02/10 11:52:09 [DEBUG] checking for provider in "/Users/michaelw/bin"
2021/02/10 11:52:09 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2021/02/10 11:52:09 [DEBUG] found provider "terraform-provider-vault_v2.18.0_x4"
2021/02/10 11:52:09 [DEBUG] found valid plugin: "vault", "2.18.0", "/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4"
2021/02/10 11:52:09 [DEBUG] checking for provisioner in "."
2021/02/10 11:52:09 [DEBUG] checking for provisioner in "/Users/michaelw/bin"
2021/02/10 11:52:09 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2021/02/10 11:52:09 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend
2021/02/10 11:52:09 [INFO] backend/local: starting Apply operation
2021/02/10 11:52:09 [TRACE] backend/local: requesting state manager for workspace "default"
2021/02/10 11:52:09 [TRACE] backend/local: state manager for workspace "default" will:
- read initial snapshot from terraform.tfstate
- write new snapshots to terraform.tfstate
- create any backup at terraform.tfstate.backup
2021/02/10 11:52:09 [TRACE] backend/local: requesting state lock for workspace "default"
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: no previously-stored snapshot exists
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info
2021/02/10 11:52:09 [TRACE] backend/local: reading remote state for workspace "default"
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: read nil snapshot
2021/02/10 11:52:09 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2021/02/10 11:52:09 [TRACE] backend/local: building context for current working directory
2021/02/10 11:52:09 [TRACE] terraform.NewContext: starting
2021/02/10 11:52:09 [TRACE] terraform.NewContext: resolving provider version selections
2021/02/10 11:52:09 [TRACE] terraform.NewContext: loading provider schemas
2021/02/10 11:52:09 [TRACE] LoadSchemas: retrieving schema for provider type "vault"
2021-02-10T11:52:09.632+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:52:09.662+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:52:09.666+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32408
2021-02-10T11:52:09.666+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:52:09.681+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:09.680+1000
2021-02-10T11:52:09.713+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:52:09.713+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin297877775 network=unix timestamp=2021-02-10T11:52:09.713+1000
2021/02/10 11:52:09 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:52:09.777+1000 [TRACE] plugin.stdio: waiting for stdio data
2021-02-10T11:52:09.778+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:52:09 [TRACE] GRPCProvider: Close
2021-02-10T11:52:09.790+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32408
2021-02-10T11:52:09.790+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:52:09 [TRACE] terraform.NewContext: complete
2021/02/10 11:52:09 [TRACE] backend/local: finished building terraform.Context
2021/02/10 11:52:09 [TRACE] backend/local: requesting interactive input, if necessary
2021/02/10 11:52:09 [TRACE] Context.Input: Prompting for provider arguments
2021/02/10 11:52:09 [TRACE] Context.Input: Provider provider.vault declared at test.tf:14,1-17
2021/02/10 11:52:09 [TRACE] Context.Input: Input for provider.vault: map[string]cty.Value{}
2021/02/10 11:52:09 [TRACE] backend/local: running validation operation
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypeValidate
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) config from test.tf:1,1-53
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) config from test.tf:8,1-65
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) needs provider.vault
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) needs provider.vault
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id]
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource
------
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkValidate
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: provider.vault
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:52:09.791+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:52:09.822+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:52:09.826+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32409
2021-02-10T11:52:09.826+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:52:09.843+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:09.842+1000
2021-02-10T11:52:09.876+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:52:09.876+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin004513244 network=unix timestamp=2021-02-10T11:52:09.876+1000
2021/02/10 11:52:09 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2021/02/10 11:52:09 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:52:09 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:52:09.940+1000 [TRACE] plugin.stdio: waiting for stdio data
2021-02-10T11:52:09.940+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:52:09 [TRACE] GRPCProvider: PrepareProviderConfig
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: provider.vault
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeValidatableResource)
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateResource
2021/02/10 11:52:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeValidatableResource)
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateResource
2021/02/10 11:52:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: provider.vault (close)
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:52:09 [TRACE] GRPCProvider: Close
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: output.wrapped_secret
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: output.wrapped_secret
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:52:09.960+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32409
2021-02-10T11:52:09.960+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close)
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "root"
2021/02/10 11:52:09 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:52:09 [TRACE] vertex "root": visit complete
2021/02/10 11:52:09 [INFO] backend/local: apply calling Refresh
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypeRefresh
2021/02/10 11:52:09 [TRACE] No managed resources in state during refresh; skipping managed resource transformer
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:52:09 [DEBUG] pruning unused provider.vault
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: []
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer (no changes)
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkRefresh
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:52:09 [TRACE] [walkRefresh] Entering eval tree: output.wrapped_secret
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:52:09 [TRACE] [walkRefresh] Exiting eval tree: output.wrapped_secret
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:52:09 [INFO] backend/local: apply calling Plan
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypePlan
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) config from test.tf:1,1-53
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) config from test.tf:8,1-65
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) needs provider.vault
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) needs provider.vault
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id]
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/02/10 11:52:09 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping
2021/02/10 11:52:09 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource
------
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkPlan
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault"
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:52:09 [TRACE] [walkPlan] Entering eval tree: provider.vault
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:52:09.962+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:52:09.992+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:52:09.997+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32410
2021-02-10T11:52:09.998+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:52:10.013+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:10.013+1000
2021-02-10T11:52:10.044+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:52:10.044+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin974102881 network=unix timestamp=2021-02-10T11:52:10.044+1000
2021/02/10 11:52:10 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021-02-10T11:52:10.109+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:52:10 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:10 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2021/02/10 11:52:10 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:52:10 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:52:10.110+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:52:10 [TRACE] GRPCProvider: Configure
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Request Details:
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Response Details:
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:10 GMT
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "7abb169e-f5d2-f102-4a72-d51895447fa7",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root",
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Request Details:
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": ""
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Response Details:
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:10 GMT
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "30490f11-530c-5683-09c5-7238d381f15b",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": {
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.PWdc5QA92GrCySnJdWtBibYd",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "ixO1WTHN4wz9wc477nhKxdYc",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200,
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: provider.vault
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service",
2021/02/10 11:52:10 [TRACE] vertex "provider.vault": visit complete
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResource)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [INFO] Using Vault token with the following policies: root
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": expanding dynamic subgraph
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResourceInstance
------
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:10 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role.role_id", instance vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:10 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": entering dynamic subgraph
2021/02/10 11:52:10 [TRACE] dag/walk: updating graph
2021/02/10 11:52:10 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResourceInstance)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:10 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:52:10 [TRACE] Re-validating config for "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:10 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:52:10 [WARN] Provider "registry.terraform.io/-/vault" produced an invalid plan for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_type: planned value cty.StringVal("default") does not match config value cty.NullVal(cty.String)
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool)
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:52:10 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:52:10 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": dynamic subgraph completed successfully
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResource)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": expanding dynamic subgraph
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResourceInstance
------
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:10 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:10 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: []
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": entering dynamic subgraph
2021/02/10 11:52:10 [TRACE] dag/walk: updating graph
2021/02/10 11:52:10 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResourceInstance)
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:10 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:52:10 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:10 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:52:10 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:52:10 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": dynamic subgraph completed successfully
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: provider.vault (close)
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:52:10 [TRACE] GRPCProvider: Close
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: output.wrapped_secret
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:52:10 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null)
2021/02/10 11:52:10 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: output.wrapped_secret
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:52:10.129+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32410
2021-02-10T11:52:10.129+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close)
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "root"
2021/02/10 11:52:10 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:52:10 [TRACE] vertex "root": visit complete
2021/02/10 11:52:10 [DEBUG] command: asking for input: "Do you want to perform these actions?"
2021/02/10 11:52:12 [INFO] backend/local: apply calling Apply
2021/02/10 11:52:12 [INFO] terraform: building graph: GraphTypeApply
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/02/10 11:52:12 [TRACE] ConfigTransformer: Starting for path:
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.DiffTransformer
2021/02/10 11:52:12 [TRACE] DiffTransformer starting
2021/02/10 11:52:12 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] DiffTransformer: vault_approle_auth_backend_role.role_id will be represented by vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] DiffTransformer: vault_approle_auth_backend_role_secret_id.secret_id will be represented by vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] DiffTransformer complete
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph:
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OrphanResourceTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OrphanResourceTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:8,1-65
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeApplyableResourceInstance) config from test.tf:1,1-53
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) config from test.tf:8,1-65
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:1,1-53
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/02/10 11:52:12 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role.role_id", instance vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/02/10 11:52:12 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
------
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id (prepare state) is provided by provider.vault or inherited equivalent
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id (prepare state) is provided by provider.vault or inherited equivalent
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeApplyableResourceInstance) needs provider.vault
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) needs provider.vault
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" references: []
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" references: []
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: []
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id (prepare state) vault_approle_auth_backend_role.role_id vault_approle_auth_backend_role.role_id]
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id (prepare state) vault_approle_auth_backend_role_secret_id.secret_id vault_approle_auth_backend_role_secret_id.secret_id]
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/02/10 11:52:12 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role.role_id depends on []
2021/02/10 11:52:12 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role_secret_id.secret_id depends on [vault_approle_auth_backend_role.role_id]
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.PruneUnusedValuesTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.PruneUnusedValuesTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RootTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.wrapped_secret - *terraform.NodeApplyableOutput
output.wrapped_secret - *terraform.NodeApplyableOutput
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
------
2021/02/10 11:52:12 [DEBUG] Starting graph walk: walkApply
2021/02/10 11:52:12 [TRACE] dag/walk: updating graph
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "output.wrapped_secret"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "provider.vault"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "root"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" waiting on "provider.vault"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id (prepare state)" waiting on "provider.vault"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id (prepare state)", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "provider.vault"
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider)
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: provider.vault
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalInitProvider
2021-02-10T11:52:12.156+1000 [INFO] plugin: configuring client automatic mTLS
2021-02-10T11:52:12.187+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4]
2021-02-10T11:52:12.191+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32411
2021-02-10T11:52:12.191+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4
2021-02-10T11:52:12.207+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:12.206+1000
2021-02-10T11:52:12.239+1000 [DEBUG] plugin: using plugin: version=5
2021-02-10T11:52:12.239+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: network=unix address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin446502454 timestamp=2021-02-10T11:52:12.239+1000
2021/02/10 11:52:12 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault
2021-02-10T11:52:12.303+1000 [TRACE] plugin.stdio: waiting for stdio data
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalConfigProvider
2021/02/10 11:52:12 [TRACE] buildProviderConfig for provider.vault: using explicit config only
2021/02/10 11:52:12 [TRACE] GRPCProvider: GetSchema
2021-02-10T11:52:12.304+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio"
2021/02/10 11:52:12 [TRACE] GRPCProvider: Configure
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "631954b9-ecda-ca9e-fdf0-b67cbea7f6c6",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0,
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM",
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root",
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s",
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s",
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform",
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "",
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": ""
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "f768750b-1f00-2f53-4ae1-ffeac89f9156",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": {
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.fMbRjRbexNUMuRbWfzwroF5e",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "18E4GegUQ4rMFnju19pr6JvA",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root"
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service",
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [INFO] Using Vault token with the following policies: root
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: provider.vault
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)"
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": starting visit (*terraform.NodeApplyableResource)
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": evaluating
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id (prepare state)"
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": starting visit (*terraform.NodeApplyableResource)
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state)
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": visit complete
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteResourceState
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.role_id (prepare state)
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeApplyableResourceInstance)
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:52:12 [TRACE] Re-validating config for "vault_approle_auth_backend_role.role_id"
2021/02/10 11:52:12 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:12 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:52:12 [WARN] Provider "registry.terraform.io/-/vault" produced an invalid plan for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_type: planned value cty.StringVal("default") does not match config value cty.NullVal(cty.String)
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange
2021/02/10 11:52:12 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReduceDiff
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPre
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApply
2021/02/10 11:52:12 [DEBUG] vault_approle_auth_backend_role.role_id: applying the planned Create change
2021/02/10 11:52:12 [TRACE] GRPCProvider: ApplyResourceChange
2021-02-10T11:52:12.322+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role HTTP/1.1
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 75
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true,
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default"
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default"
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 204 No Content
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 0
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role/role-id HTTP/1.1
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 34
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "role_id": "approle-testing-role"
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 204 No Content
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 0
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role HTTP/1.1
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 478
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "09f2e52e-8a5b-0d63-efca-ee29e97d600c",
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "local_secret_ids": false,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_bound_cidrs": null,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_num_uses": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_ttl": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_bound_cidrs": [],
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_explicit_max_ttl": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_max_ttl": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_no_default_policy": false,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_num_uses": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_period": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default"
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_ttl": 0,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default"
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role"
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role/role-id HTTP/1.1
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 192
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "6059184b-739e-3990-b3d9-18b66e01258d",
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "role_id": "approle-testing-role"
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID
2021/02/10 11:52:12 [WARN] Provider "registry.terraform.io/-/vault" produced an unexpected new value for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_max_ttl: was null, but now cty.NumberIntVal(0)
- .token_num_uses: was null, but now cty.NumberIntVal(0)
- .secret_id_ttl: was null, but now cty.NumberIntVal(0)
- .token_ttl: was null, but now cty.NumberIntVal(0)
- .secret_id_num_uses: was null, but now cty.NumberIntVal(0)
- .token_explicit_max_ttl: was null, but now cty.NumberIntVal(0)
- .token_no_default_policy: was null, but now cty.False
- .token_period: was null, but now cty.NumberIntVal(0)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 0 dependencies for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 0 dependencies for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPost
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: read nil snapshot
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 1
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.role_id
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeApplyableResourceInstance)
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalDiff
2021/02/10 11:52:12 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id"
2021/02/10 11:52:12 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/02/10 11:52:12 [TRACE] GRPCProvider: PlanResourceChange
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange
2021/02/10 11:52:12 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReduceDiff
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPre
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApply
2021/02/10 11:52:12 [DEBUG] vault_approle_auth_backend_role_secret_id.secret_id: applying the planned Create change
2021/02/10 11:52:12 [TRACE] GRPCProvider: ApplyResourceChange
2021-02-10T11:52:12.343+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role/secret-id HTTP/1.1
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 15
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Wrap-Ttl: 30m
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": ""
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 327
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "",
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null,
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": {
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token": "s.gPoMjLYsFlLpIrcYdtRQkLti",
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX",
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1800,
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": "2021-02-10T11:52:12.344895+10:00",
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_path": "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id"
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details:
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]---------------------------------------
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/token/lookup-accessor HTTP/1.1
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 39
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX"
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details:
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]--------------------------------------
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 582
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: {
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "145111fd-75f4-d3d9-5996-d69354f5f43f",
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "",
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0,
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": {
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX",
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921932,
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 1800,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": "2021-02-10T12:22:12.345221+10:00",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 1800,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "issue_time": "2021-02-10T11:52:12.345227+10:00",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 1,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/approle/role/approle-testing-role/secret-id",
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "response-wrapping"
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ],
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1800,
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service"
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: },
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null,
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null,
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4:
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: -----------------------------------------------------
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPost
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: read snapshot with lineage "caac3c75-1723-184d-d5a0-3b58398483e0" serial 1
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 2
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "provider.vault (close)"
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: provider.vault (close)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCloseProvider
2021/02/10 11:52:12 [TRACE] GRPCProvider: Close
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "output.wrapped_secret"
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput)
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: output.wrapped_secret
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteOutput
2021/02/10 11:52:12 [TRACE] EvalWriteOutput: Saving value for output.wrapped_secret in state
2021/02/10 11:52:12 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: output.wrapped_secret
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: meta.count-boundary (EachMode fixup)
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-02-10T11:52:12.366+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32411
2021-02-10T11:52:12.366+1000 [DEBUG] plugin: plugin exited
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: provider.vault (close)
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": visit complete
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "root"
2021/02/10 11:52:12 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021/02/10 11:52:12 [TRACE] vertex "root": visit complete
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 3
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment