Created
April 2, 2019 17:09
-
-
Save soapergem/c5dd860b128a1073709f9b60671d93e2 to your computer and use it in GitHub Desktop.
Terraform Debug Output
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/04/02 12:00:28 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019/04/02 12:00:28 [INFO] Terraform version: 0.11.11 ac4fff416318bf0915a0ab80e062a99ef3724334 | |
2019/04/02 12:00:28 [INFO] Go runtime version: go1.11.1 | |
2019/04/02 12:00:28 [INFO] CLI args: []string{"/usr/local/bin/terraform", "apply"} | |
2019/04/02 12:00:28 [DEBUG] Attempting to open CLI config file: /home/gmyers/.terraformrc | |
2019/04/02 12:00:28 Loading CLI configuration from /home/gmyers/.terraformrc | |
2019/04/02 12:00:28 [INFO] CLI command args: []string{"apply"} | |
2019/04/02 12:00:28 [INFO] command: empty backend config, returning nil | |
2019/04/02 12:00:28 [DEBUG] command: no data state file found for backend config | |
2019/04/02 12:00:28 [DEBUG] New state was assigned lineage "5d499e8f-1e68-9a9a-7da1-2d4b12690894" | |
2019/04/02 12:00:28 [INFO] command: backend initialized: <nil> | |
2019/04/02 12:00:28 [DEBUG] checking for provider in "." | |
2019/04/02 12:00:28 [DEBUG] checking for provider in "/usr/local/bin" | |
2019/04/02 12:00:28 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" | |
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-aws_v2.4.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-null_v2.1.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-vault_v1.6.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found plugin override in .terraformrc: "k8s", "/home/gmyers/go/bin/terraform-provider-k8s" | |
2019/04/02 12:00:28 [DEBUG] found valid plugin: "vault", "1.6.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found valid plugin: "aws", "2.4.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found valid plugin: "null", "2.1.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4" | |
2019/04/02 12:00:28 [DEBUG] found valid plugin: "k8s", "0.0.0", "/home/gmyers/go/bin/terraform-provider-k8s" | |
2019/04/02 12:00:28 [DEBUG] checking for provisioner in "." | |
2019/04/02 12:00:28 [DEBUG] checking for provisioner in "/usr/local/bin" | |
2019/04/02 12:00:28 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" | |
2019/04/02 12:00:28 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2019/04/02 12:00:28 [INFO] backend/local: starting Apply operation | |
2019/04/02 12:00:28 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:28 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeInput | |
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null | |
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
aws_iam_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource | |
aws_lambda_function.launcher - *terraform.NodeAbstractResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
vault_policy.envconfig - *terraform.NodeAbstractResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkInput | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.aws | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-04-02T12:00:29.354-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4] | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.null | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-04-02T12:00:29.354-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4 | |
2019-04-02T12:00:29.364-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: plugin address: timestamp=2019-04-02T12:00:29.364-0500 address=/tmp/plugin478572781 network=unix | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider | |
2019-04-02T12:00:29.384-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4] | |
2019-04-02T12:00:29.385-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4 | |
2019-04-02T12:00:29.393-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] plugin: plugin address: unix /tmp/plugin864157245 | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.aws | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019-04-02T12:00:29.402-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4] | |
2019-04-02T12:00:29.403-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4 | |
2019-04-02T12:00:29.416-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: plugin address: timestamp=2019-04-02T12:00:29.416-0500 network=unix address=/tmp/plugin551759210 | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.vault (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.vault (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.null | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvisioner | |
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.aws (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.aws (close) | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.null (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.null (close) | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "root" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.root': walking | |
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeValidate | |
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null | |
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provisioner.local-exec" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
aws_iam_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource | |
aws_lambda_function.launcher - *terraform.NodeValidatableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
provisioner.local-exec - *terraform.NodeProvisioner | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
vault_policy.envconfig - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkValidate | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provisioner.local-exec" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvisioner | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking | |
2019-04-02T12:00:29.427-0500 [DEBUG] plugin: starting plugin: path=/usr/local/bin/terraform args="[/usr/local/bin/terraform internal-plugin provisioner local-exec]" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.aws | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.null | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019-04-02T12:00:29.428-0500 [DEBUG] plugin: waiting for RPC address: path=/usr/local/bin/terraform | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] Terraform version: 0.11.11 ac4fff416318bf0915a0ab80e062a99ef3724334 | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] Go runtime version: go1.11.1 | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] CLI args: []string{"/usr/local/bin/terraform", "internal-plugin", "provisioner", "local-exec"} | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [DEBUG] Attempting to open CLI config file: /home/gmyers/.terraformrc | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 Loading CLI configuration from /home/gmyers/.terraformrc | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"} | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:29 [INFO] Starting provisioner plugin local-exec | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.null | |
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: plugin address: timestamp=2019-04-02T12:00:29.438-0500 address=/tmp/plugin566928270 network=unix | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
null_resource.lambda - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
null_resource.lambda - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
null_resource.lambda - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
null_resource.lambda - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
null_resource.lambda - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvisioner | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvisioner | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.null (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.null (close) | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvisioner | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.aws | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [] | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.aws (close) | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.aws (close) | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.vault (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close) | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "root" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.root': walking | |
2019/04/02 12:00:29 [INFO] backend/local: apply calling Refresh | |
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeRefresh | |
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcbe0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcc30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc0003dc9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dccd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dca00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc0003dcb40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dcaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcb90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig | |
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)} | |
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null | |
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null | |
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws | |
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig] | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
root - terraform.graphNodeRoot | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
root - terraform.graphNodeRoot | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkRefresh | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.null | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.aws | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.null | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Checking: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcbe0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalRefresh | |
null_resource.lambda: Refreshing state... (ID: 4339833956391835786) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] No assume_role block read from configuration | |
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] Building AWS auth structure | |
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] Setting AWS metadata API timeout to 100ms | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.null (close) | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.null (close) | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Request Details: | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]--------------------------------------- | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1 | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100 | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:29.649-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Response Details: | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381 | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:29 GMT | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [INFO] Using Vault token with the following policies: root | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.vault | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Checking: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcc30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalRefresh | |
vault_policy.envconfig: Refreshing state... (ID: envconfig-reader) | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Request Details: | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]--------------------------------------- | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: GET /v1/sys/policies/acl/envconfig-reader HTTP/1.1 | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1 | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:30 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:30 [DEBUG] Vault API Response Details: | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 271 | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:30.136-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:30.136-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019/04/02 12:00:30 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:30 [TRACE] [walkRefresh] Exiting eval tree: vault_policy.envconfig | |
2019-04-02T12:00:30.358-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2019-04-02T12:00:30.358-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [INFO] AWS Auth provider used: "EnvProvider" | |
2019-04-02T12:00:30.359-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] Trying to get account information via sts:GetCallerIdentity | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43 | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=899d9429f0b5f60fe6f8be57f70e3ddcd29990b82172281f759aed95ab36756e | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d263db82-5568-11e9-b2e5-a5bae605880d | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d263db82-5568-11e9-b2e5-a5bae605880d</RequestId> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse> | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] Trying to get account information via sts:GetCallerIdentity | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=899d9429f0b5f60fe6f8be57f70e3ddcd29990b82172281f759aed95ab36756e | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452 | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d27a97fc-5568-11e9-abe2-3959dd6b0293 | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d27a97fc-5568-11e9-abe2-3959dd6b0293</RequestId> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse> | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: ec2.us-east-1.amazonaws.com | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 87 | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=46c73e048bcc83e5f98397b3b446f68487e55be09d8c06b1481bc02ce6bee69f | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 540 | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Server: AmazonEC2 | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <requestId>1cb7825d-fa80-4d1c-b008-49ff8f00dbb3</requestId> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <accountAttributeSet> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeName>supported-platforms</attributeName> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValueSet> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValue>VPC</attributeValue> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </attributeValueSet> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </accountAttributeSet> | |
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </DescribeAccountAttributesResponse> | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.aws | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcb90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadDataDiff | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadDataApply | |
data.aws_iam_policy_document.assume_role: Refreshing state... | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalUpdateStateHook | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc0003dc9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh | |
aws_iam_role.envconfig: Refreshing state... (ID: envconfig-reader) | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 59 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6df0a509998f1c7538b35e387aedf645fdddd10c51ff6ed1c5ad61d4f448f452 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetRole&RoleName=envconfig-reader&Version=2010-05-08 | |
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 878 | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2c38814-5568-11e9-a00a-2bf9517bf690 | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetRoleResult> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Role> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%5B%22ecs.amazonaws.com%22%2C%22lambda.amazonaws.com%22%2C%22ec2.amazonaws.com%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <MaxSessionDuration>3600</MaxSessionDuration> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleId>AROAQ27DWD7N5FEEFY4KM</RoleId> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleName>envconfig-reader</RoleName> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:role/envconfig-reader</Arn> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:45Z</CreateDate> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </Role> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetRoleResult> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2c38814-5568-11e9-a00a-2bf9517bf690</RequestId> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetRoleResponse> | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dca00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh | |
aws_iam_role_policy_attachment.envconfig-basic: Refreshing state... (ID: envconfig-reader-20190402164746351800000002) | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc0003dcb40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
aws_lambda_function.launcher: Refreshing state... (ID: envconfig-test) | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 76 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=55e646d686142e4f41edde2a8c25b600aa4f95d04dfe1518fc4dd62754276806 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=ListAttachedRolePolicies&RoleName=envconfig-reader&Version=2010-05-08 | |
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dcaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh | |
aws_iam_role_policy_attachment.envconfig-vpc: Refreshing state... (ID: envconfig-reader-20190402164746350600000001) | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dccd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
aws_iam_instance_profile.envconfig: Refreshing state... (ID: envconfig-reader) | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 76 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=55e646d686142e4f41edde2a8c25b600aa4f95d04dfe1518fc4dd62754276806 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=ListAttachedRolePolicies&RoleName=envconfig-reader&Version=2010-05-08 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetInstanceProfile Details: | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 81 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=14e47277d9f1bf28e93e65ceffe718771a497a6b3ad3b34f71f4cc6cf6ab3551 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetInstanceProfile&InstanceProfileName=envconfig-reader&Version=2010-05-08 | |
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] Fetching Lambda Function: envconfig-test | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/GetFunction Details: | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /2015-03-31/functions/envconfig-test HTTP/1.1 | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: lambda.us-east-1.amazonaws.com | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/lambda/aws4_request, SignedHeaders=content-type;host;x-amz-date;x-amz-security-token, Signature=ed499c4f40efda04afa2bb07c90006076df7e84ff5e3d538689671f44bd9bb95 | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 767 | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2d9a7fe-5568-11e9-b106-f5be55899e5d | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ListAttachedRolePoliciesResult> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <IsTruncated>false</IsTruncated> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AttachedPolicies> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole</PolicyArn> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaBasicExecutionRole</PolicyName> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole</PolicyArn> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaVPCAccessExecutionRole</PolicyName> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </AttachedPolicies> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResult> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2d9a7fe-5568-11e9-b106-f5be55899e5d</RequestId> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResponse> | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 767 | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2dae07f-5568-11e9-a428-a5ec0881dea5 | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ListAttachedRolePoliciesResult> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <IsTruncated>false</IsTruncated> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AttachedPolicies> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole</PolicyArn> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaBasicExecutionRole</PolicyName> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole</PolicyArn> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaVPCAccessExecutionRole</PolicyName> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </AttachedPolicies> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResult> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2dae07f-5568-11e9-a428-a5ec0881dea5</RequestId> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResponse> | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetInstanceProfile Details: | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 1263 | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2dfe93e-5568-11e9-a00a-2bf9517bf690 | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <GetInstanceProfileResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetInstanceProfileResult> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfile> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfileName>envconfig-reader</InstanceProfileName> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Roles> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%5B%22ecs.amazonaws.com%22%2C%22lambda.amazonaws.com%22%2C%22ec2.amazonaws.com%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleId>AROAQ27DWD7N5FEEFY4KM</RoleId> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleName>envconfig-reader</RoleName> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:role/envconfig-reader</Arn> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:45Z</CreateDate> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </Roles> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:instance-profile/envconfig-reader</Arn> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfileId>AIPAQ27DWD7NWIEQCSUYL</InstanceProfileId> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:46Z</CreateDate> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </InstanceProfile> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetInstanceProfileResult> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2dfe93e-5568-11e9-a00a-2bf9517bf690</RequestId> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetInstanceProfileResponse> | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.vault (close)" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault (close)': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault (close)': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: provider.vault (close) | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.vault (close) | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/GetFunction Details: | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 2457 | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2e1bdf2-5568-11e9-8692-85f7554f8f4b | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] {"Configuration":{"FunctionArn":"arn:aws:lambda:us-east-1:057922691035:function:envconfig-test","KMSKeyArn":null,"MemorySize":128,"Description":"","TracingConfig":{"Mode":"PassThrough"},"VpcConfig":{"VpcId":"vpc-8b43e6f0","SecurityGroupIds":["sg-23cf3055"],"SubnetIds":["subnet-ee6f6e8a","subnet-e8702bc7"]},"DeadLetterConfig":null,"Timeout":30,"Handler":"lambda.handler","CodeSha256":"Ntw+EZ5Ew8yVMCEUryMNGA8Bs8GCEnArVqjH2lUcJDU=","RevisionId":"e2a80950-bbef-44da-ad28-af356fe1afe4","LastModified":"2019-04-02T16:47:54.689+0000","Role":"arn:aws:iam::057922691035:role/envconfig-reader","FunctionName":"envconfig-test","MasterArn":null,"Runtime":"python3.6","CodeSize":1363325,"Version":"$LATEST","Environment":{"Variables":{"VAULT_TOKEN":""},"Error":null},"Layers":null},"Concurrency":null,"Code":{"RepositoryType":"S3","Location":"https://prod-04-2014-tasks.s3.amazonaws.com/snapshots/057922691035/envconfig-test-48a7c3b2-5e7f-4d53-bdc8-50dc89098847?versionId=RLJxfrVZM7bVeiQg5k5tOtSgm4hFxb8Q&X-Amz-Security-Token=AgoJb3JpZ2luX2VjEPH%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJIMEYCIQCbdQsAEUDGk50uaoJrEiAdxzaab7t%2BJ2WVx5Sn9b5usgIhAORbV3w%2BVki3CqAzG4g7UBlaKVk7e3%2BJyCFyxRGLBk2lKuMDCKn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQABoMNzQ5Njc4OTAyODM5IgzejlX8mp6CgYm31aEqtwPcX8XxeEJKrquTNELyRyvWpZBsnKqWw9eblsv%2Fz9ZgUdTylADEfYLJezgwjRlYZzV68%2BuiayE0LJa3WcPL9hH2TBRqHA03JkERhCzDusF4OQi%2FECp49KeiL1O%2F1UiAlIiGJpLpgBbUuLuN6BsokuE4ajXX%2Bzn4d8%2BYkkAfASgSUYkNm605AGaaCE%2F8b78YR91PPkwhtDrb3T438nNPBC8ACMGS7w6MUZDfco5CI4QCnDBLmq%2Fc0Ig%2B%2Fvv3toj9UkF9lRCbeHR63EwBXW7BJSQK6h4cEGzDDQFuQni86AVXaaFQZbKoRSodJQZRlbhWo%2FXLn39Ry%2BVv0Z9XDLkhNrLyvIjRGkSI%2BHMP0OF3rGgGiPCdtT51i1in1C0Kq7js%2FPdEb3RiZF993lgJ4%2Fa8HUVphNomxyXUwvNjY4pkEsEiEP%2BcRk977vO9jnHwcNtA%2BENQUihK0v8YohsX73NIXFpvy5%2FtTfGtJ137hb43oJQ2w9YQLzmCsiWXiNa8KV71ODkWERIixOKWM6crdyjfx%2FzvSHQFsWCKre5X%2FbBHMITicKdGB76q0I5YxXcdQzcmDxf46%2BjxO5KgMMiTjuUFOrMB12wai%2BWZKtgjosyUE6r5%2FZFFLCgB2%2FUnRLq2xWD%2BUsVmuhhc2FddU8P08yCValmbWCll6%2FYs8c4A48YXDZgo8%2BWzJH6%2FyY9Hp5tn0qgu6sL%2BBSxJro%2Bebpi2UkgXgpzr3ff7gwIjnRxP%2FyRipTP9d1vovmxZ5adX6gXNZ7o2SV%2FXjl2iewNT98LnLbEDEdCCehp%2BXBeMTHlCS7wOzHy3vTAqiQI6X2BDNQLqwh%2B8gg9su78%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190402T170031Z&X-Amz-SignedHeaders=host&X-Amz-Expires=600&X-Amz-Credential=ASIA25DCYHY32UWFDXM2%2F20190402%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=73d32d52c86bf57a5ded5984c26b006ec3f52362dbe46995f2dddeed0ec26367"},"Tags":null} | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test Layers []interface {}{} from API | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test VPC config []map[string]interface {}{map[string]interface {}{"subnet_ids":*Set(map[string]interface {}{"2681154614":"subnet-ee6f6e8a", "4037590019":"subnet-e8702bc7"}), "security_group_ids":*Set(map[string]interface {}{"3099877247":"sg-23cf3055"}), "vpc_id":"vpc-8b43e6f0"}} from API | |
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test environment []interface {}{map[string]interface {}{"variables":map[string]string{"VAULT_TOKEN":""}}} from API | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/ListVersionsByFunction Details: | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /2015-03-31/functions/envconfig-test/versions?MaxItems=10000 HTTP/1.1 | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: lambda.us-east-1.amazonaws.com | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/lambda/aws4_request, SignedHeaders=content-type;host;x-amz-date;x-amz-security-token, Signature=45b26b92fbe28afda1e3eca97d3c5e7be64a71b4755e9f555c9ef18dac918ef7 | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/ListVersionsByFunction Details: | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 795 | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT | |
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2ff7f7c-5568-11e9-acc9-03fbf5ca9dd5 | |
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] {"Versions":[{"FunctionArn":"arn:aws:lambda:us-east-1:057922691035:function:envconfig-test:$LATEST","KMSKeyArn":null,"MemorySize":128,"Description":"","TracingConfig":{"Mode":"PassThrough"},"VpcConfig":{"VpcId":"vpc-8b43e6f0","SecurityGroupIds":["sg-23cf3055"],"SubnetIds":["subnet-ee6f6e8a","subnet-e8702bc7"]},"DeadLetterConfig":null,"Timeout":30,"Handler":"lambda.handler","CodeSha256":"Ntw+EZ5Ew8yVMCEUryMNGA8Bs8GCEnArVqjH2lUcJDU=","RevisionId":"e2a80950-bbef-44da-ad28-af356fe1afe4","LastModified":"2019-04-02T16:47:54.689+0000","Role":"arn:aws:iam::057922691035:role/envconfig-reader","FunctionName":"envconfig-test","MasterArn":null,"Runtime":"python3.6","CodeSize":1363325,"Version":"$LATEST","Environment":{"Variables":{"VAULT_TOKEN":""},"Error":null},"Layers":null}],"NextMarker":null} | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.aws (close)" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws (close)': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: provider.aws (close) | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.aws (close) | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "root" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.root': walking | |
2019/04/02 12:00:31 [INFO] backend/local: apply calling Plan | |
2019/04/02 12:00:31 [INFO] terraform: building graph: GraphTypePlan | |
2019/04/02 12:00:31 [TRACE] ConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig | |
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00002c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c730), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c8c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00002c960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} vault | |
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)} | |
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} aws | |
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)} | |
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} null | |
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws | |
2019/04/02 12:00:31 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws | |
2019/04/02 12:00:31 [DEBUG] resource null_resource.lambda using provider provider.null | |
2019/04/02 12:00:31 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws | |
2019/04/02 12:00:31 [DEBUG] resource vault_policy.envconfig using provider provider.vault | |
2019/04/02 12:00:31 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault | |
2019/04/02 12:00:31 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws | |
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws | |
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.null" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
aws_iam_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource | |
aws_lambda_function.launcher - *terraform.NodePlannableResource | |
provider.null - *terraform.NodeApplyableProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
null_resource.lambda - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
null_resource.lambda - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.null (close) - *terraform.graphNodeCloseProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
vault_policy.envconfig - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:31 [DEBUG] Starting graph walk: walkPlan | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.null (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "root" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.null" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher" | |
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.null" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null': evaluating | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.aws" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws': walking | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.vault" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.aws | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.null | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.vault | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.null | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019-04-02T12:00:31.727-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] No assume_role block read from configuration | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Building AWS auth structure | |
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:31.729-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting AWS metadata API timeout to 100ms | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Vault API Request Details: | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]--------------------------------------- | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1 | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100 | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED | |
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:31.734-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:31.734-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
null_resource.lambda - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "null_resource.lambda" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff | |
2019-04-02T12:00:31.737-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: 2019/04/02 12:00:31 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: null_resource.lambda | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provisioner.local-exec (close)" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provisioner.local-exec (close)': walking | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.null (close)" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null (close)': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating | |
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null (close)': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.null (close) | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvisioner | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provisioner.local-exec (close) | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.null (close) | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Vault API Response Details: | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381 | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [INFO] Using Vault token with the following policies: root | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.vault | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: vault_policy.envconfig | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: vault_policy.envconfig | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: [] | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_policy.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig" | |
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_policy.envconfig" | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': walking | |
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': evaluating | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: vault_policy.envconfig | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff | |
2019-04-02T12:00:31.892-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: vault_policy.envconfig | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [INFO] AWS Auth provider used: "EnvProvider" | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Trying to get account information via sts:GetCallerIdentity | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43 | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=988a6aef9d03c4da48a640b598134e6b91f5d4d5be0d776dfd9dbffb087c5949 | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z | |
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d38a5a5d-5568-11e9-ab89-53ded3900b52 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d38a5a5d-5568-11e9-ab89-53ded3900b52</RequestId> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse> | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Trying to get account information via sts:GetCallerIdentity | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=988a6aef9d03c4da48a640b598134e6b91f5d4d5be0d776dfd9dbffb087c5949 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452 | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:32 GMT | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d3a2282c-5568-11e9-8f70-fd3117f4b5bc | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d3a2282c-5568-11e9-8f70-fd3117f4b5bc</RequestId> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata> | |
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse> | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: ec2.us-east-1.amazonaws.com | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 87 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=a206f8eea639ebd1d561b02fbe19fc54f4720a40ad67ff8a3533b82069fbc7a5 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 540 | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:32 GMT | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Server: AmazonEC2 | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <requestId>6b3ad07b-ba24-4a27-8df2-ccd9336fc031</requestId> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <accountAttributeSet> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeName>supported-platforms</attributeName> | |
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValueSet> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValue>VPC</attributeValue> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </attributeValueSet> | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.aws | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </accountAttributeSet> | |
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </DescribeAccountAttributesResponse> | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c730), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf, err: early exit | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence, err: early exit | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: data.aws_iam_policy_document.assume_role | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role.envconfig | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00002c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019-04-02T12:00:32.962-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.envconfig | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.launcher | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00002c960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_lambda_function.launcher" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': walking | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.launcher | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c8c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_instance_profile.envconfig | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting... | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [] | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance | |
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff | |
2019-04-02T12:00:32.979-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff() | |
2019-04-02T12:00:32.979-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "provider.vault (close)" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.vault (close)': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.vault (close)': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: provider.vault (close) | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close) | |
2019-04-02T12:00:32.980-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:32 [DEBUG] Removing 'id' diff and setting Destroy to false because after ignore_changes, this diff no longer requires replacement | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.launcher | |
2019-04-02T12:00:32.981-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff() | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig" | |
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic" | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "provider.aws (close)" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.aws (close)': walking | |
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: provider.aws (close) | |
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.aws (close) | |
2019/04/02 12:00:32 [TRACE] dag/walk: walking "root" | |
2019/04/02 12:00:32 [TRACE] vertex 'root.root': walking | |
An execution plan has been generated and is shown below. | |
2019/04/02 12:00:32 [DEBUG] command: asking for input: "Do you want to perform these actions?" | |
Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
+ vault_aws_auth_backend_role.envconfig | |
id: <computed> | |
allow_instance_migration: "false" | |
auth_type: "iam" | |
backend: "aws" | |
bound_iam_instance_profile_arns.#: "1" | |
bound_iam_instance_profile_arns.0: "arn:aws:iam::057922691035:instance-profile/envconfig-reader" | |
bound_iam_role_arns.#: "1" | |
bound_iam_role_arns.0: "arn:aws:iam::057922691035:role/envconfig-reader" | |
disallow_reauthentication: "false" | |
max_ttl: "120" | |
policies.#: "1" | |
policies.0: "envconfig-reader" | |
resolve_aws_unique_ids: "true" | |
role: "envconfig-reader" | |
ttl: "60" | |
Plan: 1 to add, 0 to change, 0 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
2019/04/02 12:00:37 [INFO] terraform: building graph: GraphTypeApply | |
2019/04/02 12:00:37 [TRACE] DiffTransformer: starting | |
2019/04/02 12:00:37 [TRACE] DiffTransformer: Module: CREATE: vault_aws_auth_backend_role.envconfig | |
allow_instance_migration: "" => "false" | |
auth_type: "" => "iam" (forces new resource) | |
backend: "" => "aws" (forces new resource) | |
bound_iam_instance_profile_arns.#: "" => "1" | |
bound_iam_instance_profile_arns.0: "" => "arn:aws:iam::057922691035:instance-profile/envconfig-reader" | |
bound_iam_role_arns.#: "" => "1" | |
bound_iam_role_arns.0: "" => "arn:aws:iam::057922691035:role/envconfig-reader" | |
disallow_reauthentication: "" => "false" | |
max_ttl: "" => "120" | |
policies.#: "" => "1" | |
policies.0: "" => "envconfig-reader" | |
resolve_aws_unique_ids: "" => "true" | |
role: "" => "envconfig-reader" (forces new resource) | |
ttl: "" => "60" | |
2019/04/02 12:00:37 [TRACE] DiffTransformer: Resource "vault_aws_auth_backend_role.envconfig": *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"policies.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "auth_type":*terraform.ResourceAttrDiff{Old:"", New:"iam", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, "bound_iam_instance_profile_arns.0":*terraform.ResourceAttrDiff{Old:"", New:"arn:aws:iam::057922691035:instance-profile/envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "bound_iam_role_arns.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "role":*terraform.ResourceAttrDiff{Old:"", New:"envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, "backend":*terraform.ResourceAttrDiff{Old:"", New:"aws", NewComputed:false, NewRemoved:false, NewExtra:"aws", RequiresNew:true, Sensitive:false, Type:0x0}, "bound_iam_role_arns.0":*terraform.ResourceAttrDiff{Old:"", New:"arn:aws:iam::057922691035:role/envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "allow_instance_migration":*terraform.ResourceAttrDiff{Old:"", New:"false", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "max_ttl":*terraform.ResourceAttrDiff{Old:"", New:"120", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "disallow_reauthentication":*terraform.ResourceAttrDiff{Old:"", New:"false", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "ttl":*terraform.ResourceAttrDiff{Old:"", New:"60", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "resolve_aws_unique_ids":*terraform.ResourceAttrDiff{Old:"", New:"true", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "bound_iam_instance_profile_arns.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "policies.0":*terraform.ResourceAttrDiff{Old:"", New:"envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "id":*terraform.ResourceAttrDiff{Old:"", New:"", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x2}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.DiffTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2019/04/02 12:00:37 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:37 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} aws | |
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)} | |
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} null | |
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)} | |
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} vault | |
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)} | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
2019/04/02 12:00:37 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProviderTransformer: | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.null - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [DEBUG] pruning unused provider provider.aws | |
2019/04/02 12:00:37 [DEBUG] pruning unused provider provider.null | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] DestroyEdgeTransformer: Beginning destroy edge transformation... | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.DestroyEdgeTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] CBDEdgeTransformer: Beginning CBD transformation... | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CBDEdgeTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.LocalTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.OutputTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/04/02 12:00:37 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [] | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.TargetsTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RootTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
2019/04/02 12:00:37 [DEBUG] Starting graph walk: walkApply | |
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "root" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "provider.vault" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps | |
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/04/02 12:00:37 [TRACE] dag/walk: walking "provider.vault" | |
2019/04/02 12:00:37 [TRACE] vertex 'root.provider.vault': walking | |
2019/04/02 12:00:37 [TRACE] vertex 'root.provider.vault': evaluating | |
2019/04/02 12:00:37 [TRACE] [walkApply] Entering eval tree: provider.vault | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInitProvider | |
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalOpFilter | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Request Details: | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]--------------------------------------- | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1 | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1 | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100 | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Response Details: | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381 | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:37 GMT | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:37.766-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [INFO] Using Vault token with the following policies: root | |
2019/04/02 12:00:37 [TRACE] [walkApply] Exiting eval tree: provider.vault | |
2019/04/02 12:00:37 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig" | |
2019/04/02 12:00:37 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking | |
2019/04/02 12:00:37 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating | |
2019/04/02 12:00:37 [TRACE] [walkApply] Entering eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInstanceInfo | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadDiff | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolate | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadState | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalValidateResource | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalDiff | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadDiff | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalCompareDiff | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadState | |
vault_aws_auth_backend_role.envconfig: Creating... | |
allow_instance_migration: "" => "false" | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyPre | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApply | |
2019/04/02 12:00:37 [DEBUG] apply: vault_aws_auth_backend_role.envconfig: executing Apply | |
auth_type: "" => "iam" | |
backend: "" => "aws" | |
bound_iam_instance_profile_arns.#: "" => "1" | |
bound_iam_instance_profile_arns.0: "" => "arn:aws:iam::057922691035:instance-profile/envconfig-reader" | |
bound_iam_role_arns.#: "" => "1" | |
bound_iam_role_arns.0: "" => "arn:aws:iam::057922691035:role/envconfig-reader" | |
2019-04-02T12:00:37.794-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Writing AWS auth backend role "auth/aws/role/envconfig-reader" | |
disallow_reauthentication: "" => "false" | |
max_ttl: "" => "120" | |
policies.#: "" => "1" | |
policies.0: "" => "envconfig-reader" | |
resolve_aws_unique_ids: "" => "true" | |
role: "" => "envconfig-reader" | |
ttl: "" => "60" | |
2019-04-02T12:00:37.798-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Request Details: | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]--------------------------------------- | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: PUT /v1/auth/aws/role/envconfig-reader HTTP/1.1 | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1 | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 104 | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR] | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Response Details: | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 400 Bad Request | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 79 | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:37 GMT | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: | |
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ----------------------------------------------------- | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyProvisioners | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteState | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyPost | |
2019/04/02 12:00:37 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request. | |
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader | |
Code: 400. Errors: | |
* at least be one bound parameter should be specified on the role | |
2019/04/02 12:00:37 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request. | |
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader | |
Code: 400. Errors: | |
* at least be one bound parameter should be specified on the role | |
2019/04/02 12:00:37 [TRACE] [walkApply] Exiting eval tree: vault_aws_auth_backend_role.envconfig | |
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "provider.vault (close)" | |
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "root" | |
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8" | |
2019/04/02 12:00:38 [DEBUG] plugin: waiting for all plugin processes to complete... | |
2019-04-02T12:00:38.005-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin864157245: use of closed network connection | |
2019-04-02T12:00:38.005-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin551759210: use of closed network connection | |
Error: Error applying plan: | |
1 error(s) occurred: | |
* vault_aws_auth_backend_role.envconfig: 1 error(s) occurred: | |
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request. | |
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader | |
Code: 400. Errors: | |
* at least be one bound parameter should be specified on the role | |
2019-04-02T12:00:38.013-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin478572781: use of closed network connection | |
2019-04-02T12:00:38.013-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4 | |
2019-04-02T12:00:38.014-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin566928270: use of closed network connection | |
2019-04-02T12:00:38.014-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:38 [DEBUG] plugin: waiting for all plugin processes to complete... | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. | |
2019-04-02T12:00:38.020-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4 | |
2019-04-02T12:00:38.025-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4 | |
2019-04-02T12:00:38.031-0500 [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform | |
exit status 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment