-
-
Save melbit-michaelw/fca4e290438f060f079f3dcc1232a3c4 to your computer and use it in GitHub Desktop.
Initial Terraform Apply
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021/02/10 11:52:09 [INFO] Terraform version: 0.12.29 | |
2021/02/10 11:52:09 [INFO] Go runtime version: go1.12.13 | |
2021/02/10 11:52:09 [INFO] CLI args: []string{"/Users/michaelw/bin/terraform", "apply"} | |
2021/02/10 11:52:09 [DEBUG] Attempting to open CLI config file: /Users/michaelw/.terraformrc | |
2021/02/10 11:52:09 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2021/02/10 11:52:09 [INFO] CLI command args: []string{"apply"} | |
2021/02/10 11:52:09 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config | |
2021/02/10 11:52:09 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2021/02/10 11:52:09 [DEBUG] New state was assigned lineage "2781701a-a75a-7302-2d60-64afb8636be6" | |
2021/02/10 11:52:09 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend) | |
2021/02/10 11:52:09 [TRACE] Meta.Backend: instantiated backend of type <nil> | |
2021/02/10 11:52:09 [DEBUG] checking for provider in "." | |
2021/02/10 11:52:09 [DEBUG] checking for provider in "/Users/michaelw/bin" | |
2021/02/10 11:52:09 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2021/02/10 11:52:09 [DEBUG] found provider "terraform-provider-vault_v2.18.0_x4" | |
2021/02/10 11:52:09 [DEBUG] found valid plugin: "vault", "2.18.0", "/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4" | |
2021/02/10 11:52:09 [DEBUG] checking for provisioner in "." | |
2021/02/10 11:52:09 [DEBUG] checking for provisioner in "/Users/michaelw/bin" | |
2021/02/10 11:52:09 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2021/02/10 11:52:09 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend | |
2021/02/10 11:52:09 [INFO] backend/local: starting Apply operation | |
2021/02/10 11:52:09 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021/02/10 11:52:09 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2021/02/10 11:52:09 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: no previously-stored snapshot exists | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info | |
2021/02/10 11:52:09 [TRACE] backend/local: reading remote state for workspace "default" | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay | |
2021/02/10 11:52:09 [TRACE] statemgr.Filesystem: read nil snapshot | |
2021/02/10 11:52:09 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021/02/10 11:52:09 [TRACE] backend/local: building context for current working directory | |
2021/02/10 11:52:09 [TRACE] terraform.NewContext: starting | |
2021/02/10 11:52:09 [TRACE] terraform.NewContext: resolving provider version selections | |
2021/02/10 11:52:09 [TRACE] terraform.NewContext: loading provider schemas | |
2021/02/10 11:52:09 [TRACE] LoadSchemas: retrieving schema for provider type "vault" | |
2021-02-10T11:52:09.632+1000 [INFO] plugin: configuring client automatic mTLS | |
2021-02-10T11:52:09.662+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4] | |
2021-02-10T11:52:09.666+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32408 | |
2021-02-10T11:52:09.666+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 | |
2021-02-10T11:52:09.681+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:09.680+1000 | |
2021-02-10T11:52:09.713+1000 [DEBUG] plugin: using plugin: version=5 | |
2021-02-10T11:52:09.713+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin297877775 network=unix timestamp=2021-02-10T11:52:09.713+1000 | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: GetSchema | |
2021-02-10T11:52:09.777+1000 [TRACE] plugin.stdio: waiting for stdio data | |
2021-02-10T11:52:09.778+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio" | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: Close | |
2021-02-10T11:52:09.790+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32408 | |
2021-02-10T11:52:09.790+1000 [DEBUG] plugin: plugin exited | |
2021/02/10 11:52:09 [TRACE] terraform.NewContext: complete | |
2021/02/10 11:52:09 [TRACE] backend/local: finished building terraform.Context | |
2021/02/10 11:52:09 [TRACE] backend/local: requesting interactive input, if necessary | |
2021/02/10 11:52:09 [TRACE] Context.Input: Prompting for provider arguments | |
2021/02/10 11:52:09 [TRACE] Context.Input: Provider provider.vault declared at test.tf:14,1-17 | |
2021/02/10 11:52:09 [TRACE] Context.Input: Input for provider.vault: map[string]cty.Value{} | |
2021/02/10 11:52:09 [TRACE] backend/local: running validation operation | |
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypeValidate | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path: | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) config from test.tf:1,1-53 | |
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) config from test.tf:8,1-65 | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17 | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeValidatableResource) needs provider.vault | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeValidatableResource) needs provider.vault | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: [] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role.role_id - *terraform.NodeValidatableResource | |
------ | |
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkValidate | |
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "root" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault" | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: provider.vault | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2021-02-10T11:52:09.791+1000 [INFO] plugin: configuring client automatic mTLS | |
2021-02-10T11:52:09.822+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4] | |
2021-02-10T11:52:09.826+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32409 | |
2021-02-10T11:52:09.826+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 | |
2021-02-10T11:52:09.843+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:09.842+1000 | |
2021-02-10T11:52:09.876+1000 [DEBUG] plugin: using plugin: version=5 | |
2021-02-10T11:52:09.876+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin004513244 network=unix timestamp=2021-02-10T11:52:09.876+1000 | |
2021/02/10 11:52:09 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateProvider | |
2021/02/10 11:52:09 [TRACE] buildProviderConfig for provider.vault: using explicit config only | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: GetSchema | |
2021-02-10T11:52:09.940+1000 [TRACE] plugin.stdio: waiting for stdio data | |
2021-02-10T11:52:09.940+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio" | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:09 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: provider.vault | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": visit complete | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeValidatableResource) | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeValidatableResource) | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": evaluating | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput) | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: provider.vault (close) | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2021/02/10 11:52:09 [TRACE] GRPCProvider: Close | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: output.wrapped_secret | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalWriteOutput | |
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null) | |
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: output.wrapped_secret | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": visit complete | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-02-10T11:52:09.960+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32409 | |
2021-02-10T11:52:09.960+1000 [DEBUG] plugin: plugin exited | |
2021/02/10 11:52:09 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close) | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault (close)": visit complete | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "root" | |
2021/02/10 11:52:09 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021/02/10 11:52:09 [TRACE] vertex "root": visit complete | |
2021/02/10 11:52:09 [INFO] backend/local: apply calling Refresh | |
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypeRefresh | |
2021/02/10 11:52:09 [TRACE] No managed resources in state during refresh; skipping managed resource transformer | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path: | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17 | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/02/10 11:52:09 [DEBUG] pruning unused provider.vault | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [] | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer (no changes) | |
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkRefresh | |
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput) | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkRefresh] Entering eval tree: output.wrapped_secret | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalWriteOutput | |
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null) | |
2021/02/10 11:52:09 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset | |
2021/02/10 11:52:09 [TRACE] [walkRefresh] Exiting eval tree: output.wrapped_secret | |
2021/02/10 11:52:09 [TRACE] vertex "output.wrapped_secret": visit complete | |
2021/02/10 11:52:09 [INFO] backend/local: apply calling Plan | |
2021/02/10 11:52:09 [INFO] terraform: building graph: GraphTypePlan | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ConfigTransformer: Starting for path: | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/02/10 11:52:09 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) config from test.tf:1,1-53 | |
2021/02/10 11:52:09 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) config from test.tf:8,1-65 | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/02/10 11:52:09 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17 | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) needs provider.vault | |
2021/02/10 11:52:09 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) needs provider.vault | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/02/10 11:52:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: [] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id] | |
2021/02/10 11:52:09 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/02/10 11:52:09 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2021/02/10 11:52:09 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/02/10 11:52:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResource | |
------ | |
2021/02/10 11:52:09 [DEBUG] Starting graph walk: walkPlan | |
2021/02/10 11:52:09 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "root" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "provider.vault" | |
2021/02/10 11:52:09 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2021/02/10 11:52:09 [TRACE] dag/walk: visiting "provider.vault" | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2021/02/10 11:52:09 [TRACE] vertex "provider.vault": evaluating | |
2021/02/10 11:52:09 [TRACE] [walkPlan] Entering eval tree: provider.vault | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:09 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2021-02-10T11:52:09.962+1000 [INFO] plugin: configuring client automatic mTLS | |
2021-02-10T11:52:09.992+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4] | |
2021-02-10T11:52:09.997+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32410 | |
2021-02-10T11:52:09.998+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 | |
2021-02-10T11:52:10.013+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:10.013+1000 | |
2021-02-10T11:52:10.044+1000 [DEBUG] plugin: using plugin: version=5 | |
2021-02-10T11:52:10.044+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin974102881 network=unix timestamp=2021-02-10T11:52:10.044+1000 | |
2021/02/10 11:52:10 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2021-02-10T11:52:10.109+1000 [TRACE] plugin.stdio: waiting for stdio data | |
2021/02/10 11:52:10 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:10 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalConfigProvider | |
2021/02/10 11:52:10 [TRACE] buildProviderConfig for provider.vault: using explicit config only | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: GetSchema | |
2021-02-10T11:52:10.110+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio" | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: Configure | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1 | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.120+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461 | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:10 GMT | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "7abb169e-f5d2-f102-4a72-d51895447fa7", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": { | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root", | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [ | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service" | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.121+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128 | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": "" | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396 | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:10 GMT | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "30490f11-530c-5683-09c5-7238d381f15b", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": { | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.PWdc5QA92GrCySnJdWtBibYd", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "ixO1WTHN4wz9wc477nhKxdYc", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [ | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [ | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200, | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: provider.vault | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "", | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service", | |
2021/02/10 11:52:10 [TRACE] vertex "provider.vault": visit complete | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:10.122+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResource) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id | |
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2021-02-10T11:52:10.123+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:10 [INFO] Using Vault token with the following policies: root | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": expanding dynamic subgraph | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_approle_auth_backend_role.role_id - *terraform.NodePlannableResourceInstance | |
------ | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:10 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role.role_id", instance vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:10 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: [] | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": entering dynamic subgraph | |
2021/02/10 11:52:10 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:10 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodePlannableResourceInstance) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:10 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalDiff | |
2021/02/10 11:52:10 [TRACE] Re-validating config for "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: PlanResourceChange | |
2021/02/10 11:52:10 [WARN] Provider "registry.terraform.io/-/vault" produced an invalid plan for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_type: planned value cty.StringVal("default") does not match config value cty.NullVal(cty.String) | |
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool) | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021/02/10 11:52:10 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2021/02/10 11:52:10 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": dynamic subgraph completed successfully | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResource) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": expanding dynamic subgraph | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodePlannableResourceInstance | |
------ | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:10 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:10 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [] | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:10 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": entering dynamic subgraph | |
2021/02/10 11:52:10 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:10 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodePlannableResourceInstance) | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:10 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalDiff | |
2021/02/10 11:52:10 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: PlanResourceChange | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021/02/10 11:52:10 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2021/02/10 11:52:10 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": dynamic subgraph completed successfully | |
2021/02/10 11:52:10 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: provider.vault (close) | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2021/02/10 11:52:10 [TRACE] GRPCProvider: Close | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "output.wrapped_secret" | |
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput) | |
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: output.wrapped_secret | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalWriteOutput | |
2021/02/10 11:52:10 [TRACE] EvalWriteOutput: Removing output.wrapped_secret from state (it is now null) | |
2021/02/10 11:52:10 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: output.wrapped_secret | |
2021/02/10 11:52:10 [TRACE] vertex "output.wrapped_secret": visit complete | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:10 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:10 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-02-10T11:52:10.129+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32410 | |
2021-02-10T11:52:10.129+1000 [DEBUG] plugin: plugin exited | |
2021/02/10 11:52:10 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close) | |
2021/02/10 11:52:10 [TRACE] vertex "provider.vault (close)": visit complete | |
2021/02/10 11:52:10 [TRACE] dag/walk: visiting "root" | |
2021/02/10 11:52:10 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021/02/10 11:52:10 [TRACE] vertex "root": visit complete | |
2021/02/10 11:52:10 [DEBUG] command: asking for input: "Do you want to perform these actions?" | |
2021/02/10 11:52:12 [INFO] backend/local: apply calling Apply | |
2021/02/10 11:52:12 [INFO] terraform: building graph: GraphTypeApply | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/02/10 11:52:12 [TRACE] ConfigTransformer: Starting for path: | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.DiffTransformer | |
2021/02/10 11:52:12 [TRACE] DiffTransformer starting | |
2021/02/10 11:52:12 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] DiffTransformer: vault_approle_auth_backend_role.role_id will be represented by vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] DiffTransformer: vault_approle_auth_backend_role_secret_id.secret_id will be represented by vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] DiffTransformer complete | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph: | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OrphanResourceTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OrphanResourceTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:8,1-65 | |
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id" (*terraform.NodeApplyableResourceInstance) config from test.tf:1,1-53 | |
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) config from test.tf:8,1-65 | |
2021/02/10 11:52:12 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) config from test.tf:1,1-53 | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/02/10 11:52:12 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role.role_id", instance vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role_secret_id.secret_id", instance vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/02/10 11:52:12 [TRACE] ProviderConfigTransformer: attaching to "provider.vault" provider configuration from test.tf:14,1-17 | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id (prepare state) is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role_secret_id.secret_id (prepare state) is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.role_id is provided by provider.vault or inherited equivalent | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id (prepare state) | |
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id (prepare state) | |
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.role_id" (*terraform.NodeApplyableResourceInstance) needs provider.vault | |
2021/02/10 11:52:12 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" (*terraform.NodeApplyableResourceInstance) needs provider.vault | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/02/10 11:52:12 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.role_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role_secret_id.secret_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id (prepare state)" references: [] | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" references: [] | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.role_id" references: [] | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role_secret_id.secret_id" references: [vault_approle_auth_backend_role.role_id (prepare state) vault_approle_auth_backend_role.role_id vault_approle_auth_backend_role.role_id] | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "output.wrapped_secret" references: [vault_approle_auth_backend_role_secret_id.secret_id (prepare state) vault_approle_auth_backend_role_secret_id.secret_id vault_approle_auth_backend_role_secret_id.secret_id] | |
2021/02/10 11:52:12 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/02/10 11:52:12 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role.role_id depends on [] | |
2021/02/10 11:52:12 [TRACE] AttachDependenciesTransformer: vault_approle_auth_backend_role_secret_id.secret_id depends on [vault_approle_auth_backend_role.role_id] | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.PruneUnusedValuesTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.PruneUnusedValuesTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/02/10 11:52:12 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
output.wrapped_secret - *terraform.NodeApplyableOutput | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.role_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role_secret_id.secret_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.role_id - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role_secret_id.secret_id (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2021/02/10 11:52:12 [DEBUG] Starting graph walk: walkApply | |
2021/02/10 11:52:12 [TRACE] dag/walk: updating graph | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "output.wrapped_secret" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "root" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" waiting on "provider.vault" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.wrapped_secret" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role_secret_id.secret_id" waiting on "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id" waiting on "vault_approle_auth_backend_role.role_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.role_id (prepare state)" waiting on "provider.vault" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "output.wrapped_secret" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:12 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.role_id (prepare state)", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: dependencies changed for "output.wrapped_secret", sending new deps | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "provider.vault" | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: provider.vault | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2021-02-10T11:52:12.156+1000 [INFO] plugin: configuring client automatic mTLS | |
2021-02-10T11:52:12.187+1000 [DEBUG] plugin: starting plugin: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 args=[/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4] | |
2021-02-10T11:52:12.191+1000 [DEBUG] plugin: plugin started: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32411 | |
2021-02-10T11:52:12.191+1000 [DEBUG] plugin: waiting for RPC address: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 | |
2021-02-10T11:52:12.207+1000 [INFO] plugin.terraform-provider-vault_v2.18.0_x4: configuring server automatic mTLS: timestamp=2021-02-10T11:52:12.206+1000 | |
2021-02-10T11:52:12.239+1000 [DEBUG] plugin: using plugin: version=5 | |
2021-02-10T11:52:12.239+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: plugin address: network=unix address=/var/folders/z_/12g6j5m17j58tfgc7m9rr65r0000gn/T/plugin446502454 timestamp=2021-02-10T11:52:12.239+1000 | |
2021/02/10 11:52:12 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2021-02-10T11:52:12.303+1000 [TRACE] plugin.stdio: waiting for stdio data | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalConfigProvider | |
2021/02/10 11:52:12 [TRACE] buildProviderConfig for provider.vault: using explicit config only | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: GetSchema | |
2021-02-10T11:52:12.304+1000 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unimplemented desc = unknown service plugin.GRPCStdio" | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: Configure | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/token/lookup-self HTTP/1.1 | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.315+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM | |
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.316+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 461 | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "631954b9-ecda-ca9e-fdf0-b67cbea7f6c6", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": { | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "SMu3Uvf99OTUwveG24oRRJ8H", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921802, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 0, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "root", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": null, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 0, | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "s.HwVG6bOXOT6h58eULwA9ZcDM", | |
2021-02-10T11:52:12.317+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/token/root", | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [ | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 0, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service" | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 128 | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.HwVG6bOXOT6h58eULwA9ZcDM | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": "1200s", | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": "1200s", | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "terraform", | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 0, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "", | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_alias": "" | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.318+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 396 | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "f768750b-1f00-2f53-4ae1-ffeac89f9156", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": { | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "client_token": "s.fMbRjRbexNUMuRbWfzwroF5e", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "18E4GegUQ4rMFnju19pr6JvA", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [ | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [ | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "root" | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": null, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 1200, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "service", | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": false | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.319+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [INFO] Using Vault token with the following policies: root | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: provider.vault | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": evaluating | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id (prepare state)" | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.role_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id (prepare state)": visit complete | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.role_id (prepare state) | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id (prepare state)": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": starting visit (*terraform.NodeApplyableResourceInstance) | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalDiff | |
2021/02/10 11:52:12 [TRACE] Re-validating config for "vault_approle_auth_backend_role.role_id" | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: PlanResourceChange | |
2021/02/10 11:52:12 [WARN] Provider "registry.terraform.io/-/vault" produced an invalid plan for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_type: planned value cty.StringVal("default") does not match config value cty.NullVal(cty.String) | |
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange | |
2021/02/10 11:52:12 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReduceDiff | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPre | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApply | |
2021/02/10 11:52:12 [DEBUG] vault_approle_auth_backend_role.role_id: applying the planned Create change | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: ApplyResourceChange | |
2021-02-10T11:52:12.322+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role "auth/approle/role/approle-testing-role" | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role HTTP/1.1 | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 75 | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true, | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [ | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default" | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default" | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.323+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 204 No Content | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 0 | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/approle-testing-role" | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role/role-id HTTP/1.1 | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.324+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 34 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "role_id": "approle-testing-role" | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 204 No Content | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 0 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role" | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role HTTP/1.1 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.325+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 478 | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "09f2e52e-8a5b-0d63-efca-ee29e97d600c", | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": { | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "bind_secret_id": true, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "local_secret_ids": false, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_bound_cidrs": null, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_num_uses": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "secret_id_ttl": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_bound_cidrs": [], | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_explicit_max_ttl": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_max_ttl": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_no_default_policy": false, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_num_uses": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_period": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_policies": [ | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "default" | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_ttl": 0, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token_type": "default" | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role" | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Reading AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: GET /v1/auth/approle/role/approle-testing-role/role-id HTTP/1.1 | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.326+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 192 | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "6059184b-739e-3990-b3d9-18b66e01258d", | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": { | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "role_id": "approle-testing-role" | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.327+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Read AppRole auth backend role "auth/approle/role/approle-testing-role" RoleID | |
2021/02/10 11:52:12 [WARN] Provider "registry.terraform.io/-/vault" produced an unexpected new value for vault_approle_auth_backend_role.role_id, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_max_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_num_uses: was null, but now cty.NumberIntVal(0) | |
- .secret_id_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_ttl: was null, but now cty.NumberIntVal(0) | |
- .secret_id_num_uses: was null, but now cty.NumberIntVal(0) | |
- .token_explicit_max_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_no_default_policy: was null, but now cty.False | |
- .token_period: was null, but now cty.NumberIntVal(0) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 0 dependencies for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 0 dependencies for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPost | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: read nil snapshot | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 1 | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.role_id | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role.role_id": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": starting visit (*terraform.NodeApplyableResourceInstance) | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2021/02/10 11:52:12 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalDiff | |
2021/02/10 11:52:12 [TRACE] Re-validating config for "vault_approle_auth_backend_role_secret_id.secret_id" | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: PlanResourceChange | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange | |
2021/02/10 11:52:12 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReadState | |
2021/02/10 11:52:12 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalReduceDiff | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: terraform.EvalNoop | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPre | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApply | |
2021/02/10 11:52:12 [DEBUG] vault_approle_auth_backend_role_secret_id.secret_id: applying the planned Create change | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: ApplyResourceChange | |
2021-02-10T11:52:12.343+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Writing AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id" | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/approle/role/approle-testing-role/secret-id HTTP/1.1 | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 15 | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Wrap-Ttl: 30m | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "metadata": "" | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.344+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 327 | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "", | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": null, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": { | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "token": "s.gPoMjLYsFlLpIrcYdtRQkLti", | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX", | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1800, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": "2021-02-10T11:52:12.344895+10:00", | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_path": "auth/approle/role/approle-testing-role/secret-id" | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.345+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Wrote AppRole auth backend role SecretID "auth/approle/role/approle-testing-role/secret-id" | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Request Details: | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ REQUEST ]--------------------------------------- | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: PUT /v1/auth/token/lookup-accessor HTTP/1.1 | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Host: 127.0.0.1:8200 | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: User-Agent: Go-http-client/1.1 | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 39 | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Request: true | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: X-Vault-Token: s.fMbRjRbexNUMuRbWfzwroF5e | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Accept-Encoding: gzip | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX" | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: 2021/02/10 11:52:12 [DEBUG] Vault API Response Details: | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: HTTP/1.1 200 OK | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Length: 582 | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Cache-Control: no-store | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Content-Type: application/json | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: Date: Wed, 10 Feb 2021 01:52:12 GMT | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: { | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "request_id": "145111fd-75f4-d3d9-5996-d69354f5f43f", | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_id": "", | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "lease_duration": 0, | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "data": { | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "accessor": "cJjARjfs8Gy0o5p9Atd3ydcX", | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_time": 1612921932, | |
2021-02-10T11:52:12.346+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "creation_ttl": 1800, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "display_name": "", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "entity_id": "", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "expire_time": "2021-02-10T12:22:12.345221+10:00", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "explicit_max_ttl": 1800, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "id": "", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "issue_time": "2021-02-10T11:52:12.345227+10:00", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "meta": null, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "num_uses": 1, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "orphan": true, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "path": "auth/approle/role/approle-testing-role/secret-id", | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "policies": [ | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "response-wrapping" | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ], | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "renewable": false, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "ttl": 1800, | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "type": "service" | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: }, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "wrap_info": null, | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "warnings": null, | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: "auth": null | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: } | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: | |
2021-02-10T11:52:12.347+1000 [DEBUG] plugin.terraform-provider-vault_v2.18.0_x4: ----------------------------------------------------- | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: recording 1 dependencies for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalIf | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalApplyPost | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: read snapshot with lineage "caac3c75-1723-184d-d5a0-3b58398483e0" serial 1 | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 2 | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role_secret_id.secret_id | |
2021/02/10 11:52:12 [TRACE] vertex "vault_approle_auth_backend_role_secret_id.secret_id": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: provider.vault (close) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2021/02/10 11:52:12 [TRACE] GRPCProvider: Close | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "output.wrapped_secret" | |
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": starting visit (*terraform.NodeApplyableOutput) | |
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: output.wrapped_secret | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalSequence | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalWriteOutput | |
2021/02/10 11:52:12 [TRACE] EvalWriteOutput: Saving value for output.wrapped_secret in state | |
2021/02/10 11:52:12 [TRACE] EvalWriteOutput: Saving Create change for output.wrapped_secret in changeset | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: output.wrapped_secret | |
2021/02/10 11:52:12 [TRACE] vertex "output.wrapped_secret": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating | |
2021/02/10 11:52:12 [TRACE] [walkApply] Entering eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:12 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: meta.count-boundary (EachMode fixup) | |
2021/02/10 11:52:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-02-10T11:52:12.366+1000 [DEBUG] plugin: plugin process exited: path=/Users/michaelw/IdeaProjects/sbox-michaelw-ado-magicservice-test/secret-id-accessor-testing/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.18.0_x4 pid=32411 | |
2021-02-10T11:52:12.366+1000 [DEBUG] plugin: plugin exited | |
2021/02/10 11:52:12 [TRACE] [walkApply] Exiting eval tree: provider.vault (close) | |
2021/02/10 11:52:12 [TRACE] vertex "provider.vault (close)": visit complete | |
2021/02/10 11:52:12 [TRACE] dag/walk: visiting "root" | |
2021/02/10 11:52:12 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021/02/10 11:52:12 [TRACE] vertex "root": visit complete | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: no original state snapshot to back up | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 3 | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info | |
2021/02/10 11:52:12 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment