Skip to content

Instantly share code, notes, and snippets.

@soapergem
Created April 2, 2019 17:09
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save soapergem/c5dd860b128a1073709f9b60671d93e2 to your computer and use it in GitHub Desktop.
Save soapergem/c5dd860b128a1073709f9b60671d93e2 to your computer and use it in GitHub Desktop.
Terraform Debug Output
2019/04/02 12:00:28 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019/04/02 12:00:28 [INFO] Terraform version: 0.11.11 ac4fff416318bf0915a0ab80e062a99ef3724334
2019/04/02 12:00:28 [INFO] Go runtime version: go1.11.1
2019/04/02 12:00:28 [INFO] CLI args: []string{"/usr/local/bin/terraform", "apply"}
2019/04/02 12:00:28 [DEBUG] Attempting to open CLI config file: /home/gmyers/.terraformrc
2019/04/02 12:00:28 Loading CLI configuration from /home/gmyers/.terraformrc
2019/04/02 12:00:28 [INFO] CLI command args: []string{"apply"}
2019/04/02 12:00:28 [INFO] command: empty backend config, returning nil
2019/04/02 12:00:28 [DEBUG] command: no data state file found for backend config
2019/04/02 12:00:28 [DEBUG] New state was assigned lineage "5d499e8f-1e68-9a9a-7da1-2d4b12690894"
2019/04/02 12:00:28 [INFO] command: backend initialized: <nil>
2019/04/02 12:00:28 [DEBUG] checking for provider in "."
2019/04/02 12:00:28 [DEBUG] checking for provider in "/usr/local/bin"
2019/04/02 12:00:28 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64"
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-aws_v2.4.0_x4"
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-null_v2.1.0_x4"
2019/04/02 12:00:28 [DEBUG] found provider "terraform-provider-vault_v1.6.0_x4"
2019/04/02 12:00:28 [DEBUG] found plugin override in .terraformrc: "k8s", "/home/gmyers/go/bin/terraform-provider-k8s"
2019/04/02 12:00:28 [DEBUG] found valid plugin: "vault", "1.6.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4"
2019/04/02 12:00:28 [DEBUG] found valid plugin: "aws", "2.4.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4"
2019/04/02 12:00:28 [DEBUG] found valid plugin: "null", "2.1.0", "/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4"
2019/04/02 12:00:28 [DEBUG] found valid plugin: "k8s", "0.0.0", "/home/gmyers/go/bin/terraform-provider-k8s"
2019/04/02 12:00:28 [DEBUG] checking for provisioner in "."
2019/04/02 12:00:28 [DEBUG] checking for provisioner in "/usr/local/bin"
2019/04/02 12:00:28 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64"
2019/04/02 12:00:28 [INFO] command: backend <nil> is not enhanced, wrapping in local
2019/04/02 12:00:28 [INFO] backend/local: starting Apply operation
2019/04/02 12:00:28 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:28 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeInput
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
aws_iam_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
data.aws_iam_policy_document.assume_role - *terraform.NodeAbstractResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
null_resource.lambda - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeAbstractResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeAbstractResource
aws_lambda_function.launcher - *terraform.NodeAbstractResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeAbstractResource
aws_iam_instance_profile.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
vault_policy.envconfig - *terraform.NodeAbstractResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkInput
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.aws
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019-04-02T12:00:29.354-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4]
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.null
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019-04-02T12:00:29.354-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4
2019-04-02T12:00:29.364-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: plugin address: timestamp=2019-04-02T12:00:29.364-0500 address=/tmp/plugin478572781 network=unix
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider
2019-04-02T12:00:29.384-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4]
2019-04-02T12:00:29.385-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4
2019-04-02T12:00:29.393-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] plugin: plugin address: unix /tmp/plugin864157245
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.aws
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019-04-02T12:00:29.402-0500 [DEBUG] plugin: starting plugin: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4 args=[/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4]
2019-04-02T12:00:29.403-0500 [DEBUG] plugin: waiting for RPC address: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4
2019-04-02T12:00:29.416-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: plugin address: timestamp=2019-04-02T12:00:29.416-0500 network=unix address=/tmp/plugin551759210
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInputProvider
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.vault (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.vault (close)
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.null
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating
2019/04/02 12:00:29 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provisioner.local-exec (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvisioner
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provisioner.local-exec (close)
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.aws (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.aws (close)
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkInput] Entering eval tree: provider.null (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkInput] Exiting eval tree: provider.null (close)
2019/04/02 12:00:29 [TRACE] dag/walk: walking "root"
2019/04/02 12:00:29 [TRACE] vertex 'root.root': walking
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeValidate
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProvisionerTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProvisionerTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provisioner.local-exec" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda]
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
aws_iam_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
null_resource.lambda - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provisioner.local-exec - *terraform.NodeProvisioner
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResource
aws_lambda_function.launcher - *terraform.NodeValidatableResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
provisioner.local-exec - *terraform.NodeProvisioner
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResource
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
vault_policy.envconfig - *terraform.NodeValidatableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkValidate
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provisioner.local-exec"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provisioner.local-exec"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec"
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvisioner
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking
2019-04-02T12:00:29.427-0500 [DEBUG] plugin: starting plugin: path=/usr/local/bin/terraform args="[/usr/local/bin/terraform internal-plugin provisioner local-exec]"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.aws
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.null
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019-04-02T12:00:29.428-0500 [DEBUG] plugin: waiting for RPC address: path=/usr/local/bin/terraform
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] Terraform version: 0.11.11 ac4fff416318bf0915a0ab80e062a99ef3724334
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] Go runtime version: go1.11.1
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] CLI args: []string{"/usr/local/bin/terraform", "internal-plugin", "provisioner", "local-exec"}
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [DEBUG] Attempting to open CLI config file: /home/gmyers/.terraformrc
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 Loading CLI configuration from /home/gmyers/.terraformrc
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: 2019/04/02 12:00:29 [INFO] CLI command args: []string{"internal-plugin", "provisioner", "local-exec"}
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:29 [INFO] Starting provisioner plugin local-exec
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.null
2019-04-02T12:00:29.438-0500 [DEBUG] plugin.terraform: plugin address: timestamp=2019-04-02T12:00:29.438-0500 address=/tmp/plugin566928270 network=unix
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvider
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
null_resource.lambda - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
null_resource.lambda - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
null_resource.lambda - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
null_resource.lambda - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
null_resource.lambda - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvisioner
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateProvisioner
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.null (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.null (close)
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provisioner.local-exec (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provisioner.local-exec (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvisioner
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provisioner.local-exec (close)
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044ab90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
vault_policy.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.aws
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00044aaf0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00044ac80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044a960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: []
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00044aaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_lambda_function.launcher - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044ac30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00044aa00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateCount
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeValidatableResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws (close)': evaluating
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.aws (close)
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.aws (close)
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkValidate] Entering eval tree: provider.vault (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close)
2019/04/02 12:00:29 [TRACE] dag/walk: walking "root"
2019/04/02 12:00:29 [TRACE] vertex 'root.root': walking
2019/04/02 12:00:29 [INFO] backend/local: apply calling Refresh
2019/04/02 12:00:29 [INFO] terraform: building graph: GraphTypeRefresh
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] ConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcbe0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcc30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc0003dc9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dccd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dca00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc0003dcb40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dcaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcb90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig
2019/04/02 12:00:29 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} aws
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} vault
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)}
2019/04/02 12:00:29 [TRACE] Attach provider request: []string{} null
2019/04/02 12:00:29 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.MissingProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
2019/04/02 12:00:29 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource null_resource.lambda using provider provider.null
2019/04/02 12:00:29 [DEBUG] resource vault_policy.envconfig using provider provider.vault
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws
2019/04/02 12:00:29 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.PruneProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ParentProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.graphTransformerMulti:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.LocalTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.aws" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig]
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig]
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.CloseProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
root - terraform.graphNodeRoot
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResource
null_resource.lambda - *terraform.NodeRefreshableManagedResource
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResource
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
root - terraform.graphNodeRoot
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResource
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
vault_policy.envconfig - *terraform.NodeRefreshableManagedResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:29 [DEBUG] Starting graph walk: walkRefresh
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "root"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.null
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.vault"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': walking
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.aws"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.vault': evaluating
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': walking
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.aws': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.aws
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.null
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Checking: null_resource.lambda
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcbe0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
null_resource.lambda - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalRefresh
null_resource.lambda: Refreshing state... (ID: 4339833956391835786)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalConfigProvider
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] No assume_role block read from configuration
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] Building AWS auth structure
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:29.598-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:29 [INFO] Setting AWS metadata API timeout to 100ms
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:29 [TRACE] dag/walk: walking "provider.null (close)"
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: provider.null (close)
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.null (close)
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Request Details:
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]---------------------------------------
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:29.648-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:29.649-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Response Details:
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:29 GMT
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:29.993-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [INFO] Using Vault token with the following policies: root
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: provider.vault
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:29 [TRACE] [walkRefresh] Exiting eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:29 [TRACE] OrphanResourceCount: Checking: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcc30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] Graph after step *terraform.RootTransformer:
vault_policy.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:29 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:29 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:29 [TRACE] [walkRefresh] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:29 [TRACE] root: eval: *terraform.EvalRefresh
vault_policy.envconfig: Refreshing state... (ID: envconfig-reader)
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:29 [DEBUG] Vault API Request Details:
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]---------------------------------------
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: GET /v1/sys/policies/acl/envconfig-reader HTTP/1.1
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:29.996-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:30 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:30 [DEBUG] Vault API Response Details:
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 271
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:30.135-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:30.136-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:30.136-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019/04/02 12:00:30 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:30 [TRACE] [walkRefresh] Exiting eval tree: vault_policy.envconfig
2019-04-02T12:00:30.358-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id
2019-04-02T12:00:30.358-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [INFO] AWS Auth provider used: "EnvProvider"
2019-04-02T12:00:30.359-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] Trying to get account information via sts:GetCallerIdentity
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details:
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=899d9429f0b5f60fe6f8be57f70e3ddcd29990b82172281f759aed95ab36756e
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15
2019-04-02T12:00:30.363-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details:
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d263db82-5568-11e9-b2e5-a5bae605880d
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d263db82-5568-11e9-b2e5-a5bae605880d</RequestId>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse>
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] Trying to get account information via sts:GetCallerIdentity
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details:
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=899d9429f0b5f60fe6f8be57f70e3ddcd29990b82172281f759aed95ab36756e
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15
2019-04-02T12:00:30.659-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details:
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d27a97fc-5568-11e9-abe2-3959dd6b0293
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d27a97fc-5568-11e9-abe2-3959dd6b0293</RequestId>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:30.825-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse>
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:30 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details:
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: ec2.us-east-1.amazonaws.com
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 87
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=46c73e048bcc83e5f98397b3b446f68487e55be09d8c06b1481bc02ce6bee69f
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170030Z
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15
2019-04-02T12:00:30.829-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details:
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 540
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml;charset=UTF-8
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Server: AmazonEC2
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/">
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <requestId>1cb7825d-fa80-4d1c-b008-49ff8f00dbb3</requestId>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <accountAttributeSet>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeName>supported-platforms</attributeName>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValueSet>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValue>VPC</attributeValue>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </attributeValueSet>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </accountAttributeSet>
2019-04-02T12:00:31.080-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </DescribeAccountAttributesResponse>
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.aws
2019/04/02 12:00:31 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc0003dcb90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodeRefreshableDataResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadDataDiff
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadDataApply
data.aws_iam_policy_document.assume_role: Refreshing state...
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalUpdateStateHook
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc0003dc9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh
aws_iam_role.envconfig: Refreshing state... (ID: envconfig-reader)
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 59
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6df0a509998f1c7538b35e387aedf645fdddd10c51ff6ed1c5ad61d4f448f452
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetRole&RoleName=envconfig-reader&Version=2010-05-08
2019-04-02T12:00:31.086-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 878
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2c38814-5568-11e9-a00a-2bf9517bf690
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetRoleResult>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Role>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%5B%22ecs.amazonaws.com%22%2C%22lambda.amazonaws.com%22%2C%22ec2.amazonaws.com%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <MaxSessionDuration>3600</MaxSessionDuration>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleId>AROAQ27DWD7N5FEEFY4KM</RoleId>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleName>envconfig-reader</RoleName>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:role/envconfig-reader</Arn>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:45Z</CreateDate>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </Role>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetRoleResult>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2c38814-5568-11e9-a00a-2bf9517bf690</RequestId>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:31.297-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetRoleResponse>
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dca00), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh
aws_iam_role_policy_attachment.envconfig-basic: Refreshing state... (ID: envconfig-reader-20190402164746351800000002)
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc0003dcb40), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_lambda_function.launcher - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
aws_lambda_function.launcher: Refreshing state... (ID: envconfig-test)
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 76
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=55e646d686142e4f41edde2a8c25b600aa4f95d04dfe1518fc4dd62754276806
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=ListAttachedRolePolicies&RoleName=envconfig-reader&Version=2010-05-08
2019-04-02T12:00:31.309-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dcaa0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh
aws_iam_role_policy_attachment.envconfig-vpc: Refreshing state... (ID: envconfig-reader-20190402164746350600000001)
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc0003dccd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
aws_iam_instance_profile.envconfig: Refreshing state... (ID: envconfig-reader)
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalRefresh
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 76
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=55e646d686142e4f41edde2a8c25b600aa4f95d04dfe1518fc4dd62754276806
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=ListAttachedRolePolicies&RoleName=envconfig-reader&Version=2010-05-08
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetInstanceProfile Details:
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: iam.amazonaws.com
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 81
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=14e47277d9f1bf28e93e65ceffe718771a497a6b3ad3b34f71f4cc6cf6ab3551
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetInstanceProfile&InstanceProfileName=envconfig-reader&Version=2010-05-08
2019-04-02T12:00:31.320-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] Fetching Lambda Function: envconfig-test
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/GetFunction Details:
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /2015-03-31/functions/envconfig-test HTTP/1.1
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: lambda.us-east-1.amazonaws.com
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/lambda/aws4_request, SignedHeaders=content-type;host;x-amz-date;x-amz-security-token, Signature=ed499c4f40efda04afa2bb07c90006076df7e84ff5e3d538689671f44bd9bb95
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.321-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 767
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2d9a7fe-5568-11e9-b106-f5be55899e5d
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ListAttachedRolePoliciesResult>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <IsTruncated>false</IsTruncated>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AttachedPolicies>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole</PolicyArn>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaBasicExecutionRole</PolicyName>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole</PolicyArn>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaVPCAccessExecutionRole</PolicyName>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </AttachedPolicies>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResult>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2d9a7fe-5568-11e9-b106-f5be55899e5d</RequestId>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:31.452-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResponse>
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.465-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 767
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:30 GMT
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2dae07f-5568-11e9-a428-a5ec0881dea5
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ListAttachedRolePoliciesResult>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <IsTruncated>false</IsTruncated>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AttachedPolicies>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole</PolicyArn>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaBasicExecutionRole</PolicyName>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyArn>arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole</PolicyArn>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <PolicyName>AWSLambdaVPCAccessExecutionRole</PolicyName>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </AttachedPolicies>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResult>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2dae07f-5568-11e9-a428-a5ec0881dea5</RequestId>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:31.466-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ListAttachedRolePoliciesResponse>
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetInstanceProfile Details:
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 1263
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2dfe93e-5568-11e9-a00a-2bf9517bf690
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] <GetInstanceProfileResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetInstanceProfileResult>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfile>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfileName>envconfig-reader</InstanceProfileName>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Roles>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <member>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Path>/</Path>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%5B%22ecs.amazonaws.com%22%2C%22lambda.amazonaws.com%22%2C%22ec2.amazonaws.com%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleId>AROAQ27DWD7N5FEEFY4KM</RoleId>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RoleName>envconfig-reader</RoleName>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:role/envconfig-reader</Arn>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:45Z</CreateDate>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </member>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </Roles>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:iam::057922691035:instance-profile/envconfig-reader</Arn>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <InstanceProfileId>AIPAQ27DWD7NWIEQCSUYL</InstanceProfileId>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <CreateDate>2019-04-02T16:47:46Z</CreateDate>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </InstanceProfile>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetInstanceProfileResult>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d2dfe93e-5568-11e9-a00a-2bf9517bf690</RequestId>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:31.485-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetInstanceProfileResponse>
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeRefreshableManagedResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.vault (close)"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault (close)': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault (close)': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: provider.vault (close)
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.vault (close)
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/GetFunction Details:
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 2457
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2e1bdf2-5568-11e9-8692-85f7554f8f4b
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] {"Configuration":{"FunctionArn":"arn:aws:lambda:us-east-1:057922691035:function:envconfig-test","KMSKeyArn":null,"MemorySize":128,"Description":"","TracingConfig":{"Mode":"PassThrough"},"VpcConfig":{"VpcId":"vpc-8b43e6f0","SecurityGroupIds":["sg-23cf3055"],"SubnetIds":["subnet-ee6f6e8a","subnet-e8702bc7"]},"DeadLetterConfig":null,"Timeout":30,"Handler":"lambda.handler","CodeSha256":"Ntw+EZ5Ew8yVMCEUryMNGA8Bs8GCEnArVqjH2lUcJDU=","RevisionId":"e2a80950-bbef-44da-ad28-af356fe1afe4","LastModified":"2019-04-02T16:47:54.689+0000","Role":"arn:aws:iam::057922691035:role/envconfig-reader","FunctionName":"envconfig-test","MasterArn":null,"Runtime":"python3.6","CodeSize":1363325,"Version":"$LATEST","Environment":{"Variables":{"VAULT_TOKEN":""},"Error":null},"Layers":null},"Concurrency":null,"Code":{"RepositoryType":"S3","Location":"https://prod-04-2014-tasks.s3.amazonaws.com/snapshots/057922691035/envconfig-test-48a7c3b2-5e7f-4d53-bdc8-50dc89098847?versionId=RLJxfrVZM7bVeiQg5k5tOtSgm4hFxb8Q&X-Amz-Security-Token=AgoJb3JpZ2luX2VjEPH%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJIMEYCIQCbdQsAEUDGk50uaoJrEiAdxzaab7t%2BJ2WVx5Sn9b5usgIhAORbV3w%2BVki3CqAzG4g7UBlaKVk7e3%2BJyCFyxRGLBk2lKuMDCKn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQABoMNzQ5Njc4OTAyODM5IgzejlX8mp6CgYm31aEqtwPcX8XxeEJKrquTNELyRyvWpZBsnKqWw9eblsv%2Fz9ZgUdTylADEfYLJezgwjRlYZzV68%2BuiayE0LJa3WcPL9hH2TBRqHA03JkERhCzDusF4OQi%2FECp49KeiL1O%2F1UiAlIiGJpLpgBbUuLuN6BsokuE4ajXX%2Bzn4d8%2BYkkAfASgSUYkNm605AGaaCE%2F8b78YR91PPkwhtDrb3T438nNPBC8ACMGS7w6MUZDfco5CI4QCnDBLmq%2Fc0Ig%2B%2Fvv3toj9UkF9lRCbeHR63EwBXW7BJSQK6h4cEGzDDQFuQni86AVXaaFQZbKoRSodJQZRlbhWo%2FXLn39Ry%2BVv0Z9XDLkhNrLyvIjRGkSI%2BHMP0OF3rGgGiPCdtT51i1in1C0Kq7js%2FPdEb3RiZF993lgJ4%2Fa8HUVphNomxyXUwvNjY4pkEsEiEP%2BcRk977vO9jnHwcNtA%2BENQUihK0v8YohsX73NIXFpvy5%2FtTfGtJ137hb43oJQ2w9YQLzmCsiWXiNa8KV71ODkWERIixOKWM6crdyjfx%2FzvSHQFsWCKre5X%2FbBHMITicKdGB76q0I5YxXcdQzcmDxf46%2BjxO5KgMMiTjuUFOrMB12wai%2BWZKtgjosyUE6r5%2FZFFLCgB2%2FUnRLq2xWD%2BUsVmuhhc2FddU8P08yCValmbWCll6%2FYs8c4A48YXDZgo8%2BWzJH6%2FyY9Hp5tn0qgu6sL%2BBSxJro%2Bebpi2UkgXgpzr3ff7gwIjnRxP%2FyRipTP9d1vovmxZ5adX6gXNZ7o2SV%2FXjl2iewNT98LnLbEDEdCCehp%2BXBeMTHlCS7wOzHy3vTAqiQI6X2BDNQLqwh%2B8gg9su78%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190402T170031Z&X-Amz-SignedHeaders=host&X-Amz-Expires=600&X-Amz-Credential=ASIA25DCYHY32UWFDXM2%2F20190402%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=73d32d52c86bf57a5ded5984c26b006ec3f52362dbe46995f2dddeed0ec26367"},"Tags":null}
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test Layers []interface {}{} from API
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test VPC config []map[string]interface {}{map[string]interface {}{"subnet_ids":*Set(map[string]interface {}{"2681154614":"subnet-ee6f6e8a", "4037590019":"subnet-e8702bc7"}), "security_group_ids":*Set(map[string]interface {}{"3099877247":"sg-23cf3055"}), "vpc_id":"vpc-8b43e6f0"}} from API
2019-04-02T12:00:31.528-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting Lambda envconfig-test environment []interface {}{map[string]interface {}{"variables":map[string]string{"VAULT_TOKEN":""}}} from API
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/ListVersionsByFunction Details:
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: GET /2015-03-31/functions/envconfig-test/versions?MaxItems=10000 HTTP/1.1
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: lambda.us-east-1.amazonaws.com
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/lambda/aws4_request, SignedHeaders=content-type;host;x-amz-date;x-amz-security-token, Signature=45b26b92fbe28afda1e3eca97d3c5e7be64a71b4755e9f555c9ef18dac918ef7
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170031Z
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.530-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/ListVersionsByFunction Details:
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 795
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/json
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT
2019-04-02T12:00:31.701-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d2ff7f7c-5568-11e9-acc9-03fbf5ca9dd5
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.702-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [DEBUG] [aws-sdk-go] {"Versions":[{"FunctionArn":"arn:aws:lambda:us-east-1:057922691035:function:envconfig-test:$LATEST","KMSKeyArn":null,"MemorySize":128,"Description":"","TracingConfig":{"Mode":"PassThrough"},"VpcConfig":{"VpcId":"vpc-8b43e6f0","SecurityGroupIds":["sg-23cf3055"],"SubnetIds":["subnet-ee6f6e8a","subnet-e8702bc7"]},"DeadLetterConfig":null,"Timeout":30,"Handler":"lambda.handler","CodeSha256":"Ntw+EZ5Ew8yVMCEUryMNGA8Bs8GCEnArVqjH2lUcJDU=","RevisionId":"e2a80950-bbef-44da-ad28-af356fe1afe4","LastModified":"2019-04-02T16:47:54.689+0000","Role":"arn:aws:iam::057922691035:role/envconfig-reader","FunctionName":"envconfig-test","MasterArn":null,"Runtime":"python3.6","CodeSize":1363325,"Version":"$LATEST","Environment":{"Variables":{"VAULT_TOKEN":""},"Error":null},"Layers":null}],"NextMarker":null}
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.aws (close)"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws (close)': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws (close)': evaluating
2019/04/02 12:00:31 [TRACE] [walkRefresh] Entering eval tree: provider.aws (close)
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:31 [TRACE] [walkRefresh] Exiting eval tree: provider.aws (close)
2019/04/02 12:00:31 [TRACE] dag/walk: walking "root"
2019/04/02 12:00:31 [TRACE] vertex 'root.root': walking
2019/04/02 12:00:31 [INFO] backend/local: apply calling Plan
2019/04/02 12:00:31 [INFO] terraform: building graph: GraphTypePlan
2019/04/02 12:00:31 [TRACE] ConfigTransformer: Starting for path: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.LocalTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_instance_profile.envconfig
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_instance_profile", RawCount:(*config.RawConfig)(0xc0003a5110), RawConfig:(*config.RawConfig)(0xc0003a50a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-basic", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a51f0), RawConfig:(*config.RawConfig)(0xc0003a5180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig-vpc", Type:"aws_iam_role_policy_attachment", RawCount:(*config.RawConfig)(0xc0003a52d0), RawConfig:(*config.RawConfig)(0xc0003a5260), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.launcher
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"launcher", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc0003a4460), RawConfig:(*config.RawConfig)(0xc0003a43f0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string{"null_resource.lambda"}, Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string{"source_code_hash", "last_modified"}}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: null_resource.lambda
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"lambda", Type:"null_resource", RawCount:(*config.RawConfig)(0xc0003a4690), RawConfig:(*config.RawConfig)(0xc0003a4620), Provisioners:[]*config.Provisioner{(*config.Provisioner)(0xc00037cc00)}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:1, Name:"assume_role", Type:"aws_iam_policy_document", RawCount:(*config.RawConfig)(0xc0003a53b0), RawConfig:(*config.RawConfig)(0xc0003a5340), Provisioners:[]*config.Provisioner{}, Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_policy.envconfig
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_policy", RawCount:(*config.RawConfig)(0xc0003a4e70), RawConfig:(*config.RawConfig)(0xc0003a4e00), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.envconfig
2019/04/02 12:00:31 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc0003a5030), RawConfig:(*config.RawConfig)(0xc0003a4fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00002c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c730), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c8c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00002c960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} vault
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)}
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} aws
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)}
2019/04/02 12:00:31 [TRACE] Attach provider request: []string{} null
2019/04/02 12:00:31 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.MissingProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role.envconfig using provider provider.aws
2019/04/02 12:00:31 [DEBUG] resource aws_lambda_function.launcher using provider provider.aws
2019/04/02 12:00:31 [DEBUG] resource null_resource.lambda using provider provider.null
2019/04/02 12:00:31 [DEBUG] resource data.aws_iam_policy_document.assume_role using provider provider.aws
2019/04/02 12:00:31 [DEBUG] resource vault_policy.envconfig using provider provider.vault
2019/04/02 12:00:31 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault
2019/04/02 12:00:31 [DEBUG] resource aws_iam_instance_profile.envconfig using provider provider.aws
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-basic using provider provider.aws
2019/04/02 12:00:31 [DEBUG] resource aws_iam_role_policy_attachment.envconfig-vpc using provider provider.aws
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.PruneProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ParentProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.graphTransformerMulti:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: [data.aws_iam_policy_document.assume_role]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: [aws_iam_role.envconfig]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: [aws_iam_role.envconfig]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: [aws_iam_role.envconfig null_resource.lambda]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: [aws_iam_instance_profile.envconfig aws_iam_role.envconfig vault_policy.envconfig]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: [aws_iam_role.envconfig]
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.aws" references: []
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "provider.null" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CloseProviderTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
aws_iam_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResource
provider.aws - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
null_resource.lambda - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResource
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResource
aws_lambda_function.launcher - *terraform.NodePlannableResource
provider.null - *terraform.NodeApplyableProvider
provider.null (close) - *terraform.graphNodeCloseProvider
null_resource.lambda - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
null_resource.lambda - *terraform.NodePlannableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.null (close) - *terraform.graphNodeCloseProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provisioner.local-exec (close) - *terraform.graphNodeCloseProvisioner
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResource
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
vault_policy.envconfig - *terraform.NodePlannableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:31 [DEBUG] Starting graph walk: walkPlan
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.aws (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provisioner.local-exec (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.null (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "root"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.aws"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.null"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "provider.vault"
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provisioner.local-exec (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role.envconfig" waiting on "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.null (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-basic" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "null_resource.lambda" waiting on "provider.null"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "vault_policy.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "data.aws_iam_policy_document.assume_role" waiting on "provider.aws"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_instance_profile.envconfig" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_iam_role_policy_attachment.envconfig-vpc" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.null (close)" waiting on "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "aws_lambda_function.launcher" waiting on "aws_iam_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "root" waiting on "provisioner.local-exec (close)"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "vault_policy.envconfig" waiting on "provider.vault"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.launcher"
2019/04/02 12:00:31 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role.envconfig", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "null_resource.lambda", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_instance_profile.envconfig", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-vpc", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.null (close)", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provisioner.local-exec (close)", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy_attachment.envconfig-basic", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.launcher", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "data.aws_iam_policy_document.assume_role", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: dependencies changed for "vault_policy.envconfig", sending new deps
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.null"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null': evaluating
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.aws"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws': walking
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.vault"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.aws': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.aws
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.null
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.vault': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.vault
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalConfigProvider
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.null
2019/04/02 12:00:31 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: null_resource.lambda
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019-04-02T12:00:31.727-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] No assume_role block read from configuration
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: null_resource.lambda
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Building AWS auth structure
2019-04-02T12:00:31.728-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:31.729-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:31 [INFO] Setting AWS metadata API timeout to 100ms
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Vault API Request Details:
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]---------------------------------------
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED
2019-04-02T12:00:31.733-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:31.734-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:31.734-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "null_resource.lambda": &terraform.ResourceState{Type:"null_resource", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c9b0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.null", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "null_resource.lambda" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
null_resource.lambda - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "null_resource.lambda"
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.null_resource.lambda': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: null_resource.lambda
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff
2019-04-02T12:00:31.737-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: 2019/04/02 12:00:31 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: null_resource.lambda
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provisioner.local-exec (close)"
2019/04/02 12:00:31 [TRACE] vertex 'root.provisioner.local-exec (close)': walking
2019/04/02 12:00:31 [TRACE] dag/walk: walking "provider.null (close)"
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null (close)': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.provisioner.local-exec (close)': evaluating
2019/04/02 12:00:31 [TRACE] vertex 'root.provider.null (close)': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provider.null (close)
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: provisioner.local-exec (close)
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCloseProvisioner
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provisioner.local-exec (close)
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.null (close)
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Vault API Response Details:
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:31.889-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [INFO] Using Vault token with the following policies: root
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: provider.vault
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: vault_policy.envconfig
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:31 [TRACE] OrphanResourceCount: Checking: vault_policy.envconfig
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [DEBUG] Attaching resource state to "vault_policy.envconfig": &terraform.ResourceState{Type:"vault_policy", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.vault", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [DEBUG] ReferenceTransformer: "vault_policy.envconfig" references: []
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] Graph after step *terraform.RootTransformer:
vault_policy.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:31 [TRACE] dag/walk: added new vertex: "vault_policy.envconfig"
2019/04/02 12:00:31 [TRACE] dag/walk: walking "vault_policy.envconfig"
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': walking
2019/04/02 12:00:31 [TRACE] vertex 'root.vault_policy.envconfig': evaluating
2019/04/02 12:00:31 [TRACE] [walkPlan] Entering eval tree: vault_policy.envconfig
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalDiff
2019-04-02T12:00:31.892-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:31 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:31 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:31 [TRACE] [walkPlan] Exiting eval tree: vault_policy.envconfig
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [INFO] AWS Auth provider used: "EnvProvider"
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Trying to get account information via sts:GetCallerIdentity
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details:
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=988a6aef9d03c4da48a640b598134e6b91f5d4d5be0d776dfd9dbffb087c5949
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:32.456-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15
2019-04-02T12:00:32.457-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details:
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:31 GMT
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d38a5a5d-5568-11e9-ab89-53ded3900b52
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d38a5a5d-5568-11e9-ab89-53ded3900b52</RequestId>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse>
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Trying to get account information via sts:GetCallerIdentity
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details:
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: sts.amazonaws.com
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 43
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=988a6aef9d03c4da48a640b598134e6b91f5d4d5be0d776dfd9dbffb087c5949
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=GetCallerIdentity&Version=2011-06-15
2019-04-02T12:00:32.596-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details:
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 452
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:32 GMT
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amzn-Requestid: d3a2282c-5568-11e9-8f70-fd3117f4b5bc
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <GetCallerIdentityResult>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Arn>arn:aws:sts::057922691035:assumed-role/Administrator/gmyer1@amfam.com</Arn>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <UserId>AROAJHVZI3DZRWJA7TMS6:gmyer1@amfam.com</UserId>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <Account>057922691035</Account>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResult>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <ResponseMetadata>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <RequestId>d3a2282c-5568-11e9-8f70-fd3117f4b5bc</RequestId>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </ResponseMetadata>
2019-04-02T12:00:32.749-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </GetCallerIdentityResponse>
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details:
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ REQUEST POST-SIGN ]-----------------------------
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: POST / HTTP/1.1
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Host: ec2.us-east-1.amazonaws.com
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: User-Agent: aws-sdk-go/1.19.4 (go1.11.5; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.12
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 87
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAQ27DWD7NXLI5GBGX/20190402/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=a206f8eea639ebd1d561b02fbe19fc54f4720a40ad67ff8a3533b82069fbc7a5
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Date: 20190402T170032Z
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: X-Amz-Security-Token: FQoGZXIvYXdzEAIaDMPeOSeD01c5umABNyKiAuFJkEPThlaWIoxy/iXJOhxKMiamUdKj/D3uGdwHtFbMgcIaVqN6NCsXmJIj8zTgC4iOn91fu/RY035DcvsZfDs0kzQWLWNpFwT8zbl472W0WqL4DKJSiKHShjCvYj/mtIOOj0D0zlAZxIenmnKqnq0gJ2eEcV/VH6nZjEyayNe7OsT954OAgA2cWjlUu1iWGu0qXh7YGuaVGxXKOhc7Fo7vKyC1MilktfOThlGr4v16/+aMPgHSsxKR5SzquhisI3UBQqTmyFNyEYBssB2+pVq2k7GNFna3BWpjQcWoZ8gTRt2IM8d9qt1uyjIVVdCCz5IJqbhcvJBLCEVqCcAdm19CZ7wFzYtXgSdRdCL5Xb08cpqclVIFaj86a+UC4ePw+z9FKPqhjuUF
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15
2019-04-02T12:00:32.756-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details:
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: HTTP/1.1 200 OK
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Connection: close
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Length: 540
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Content-Type: text/xml;charset=UTF-8
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Date: Tue, 02 Apr 2019 17:00:32 GMT
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: Server: AmazonEC2
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4:
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: -----------------------------------------------------
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?>
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/">
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <requestId>6b3ad07b-ba24-4a27-8df2-ccd9336fc031</requestId>
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <accountAttributeSet>
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item>
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeName>supported-platforms</attributeName>
2019-04-02T12:00:32.931-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValueSet>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <item>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: <attributeValue>VPC</attributeValue>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </attributeValueSet>
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.aws
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </item>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </accountAttributeSet>
2019-04-02T12:00:32.932-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: </DescribeAccountAttributesResponse>
2019/04/02 12:00:32 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "data.aws_iam_policy_document.assume_role": &terraform.ResourceState{Type:"aws_iam_policy_document", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc00002c730), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.data.aws_iam_policy_document.assume_role': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf, err: early exit
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence, err: early exit
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: data.aws_iam_policy_document.assume_role
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role.envconfig
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role.envconfig": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{"data.aws_iam_policy_document.assume_role"}, Primary:(*terraform.InstanceState)(0xc00002c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role.envconfig" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role.envconfig"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019-04-02T12:00:32.962-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.envconfig
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.launcher
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.launcher
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_lambda_function.launcher": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.envconfig", "null_resource.lambda"}, Primary:(*terraform.InstanceState)(0xc00002c960), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_lambda_function.launcher" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
aws_lambda_function.launcher - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_lambda_function.launcher"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_lambda_function.launcher"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': walking
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-vpc": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c690), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-vpc" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-vpc - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_lambda_function.launcher': evaluating
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': walking
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.launcher
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-vpc': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_instance_profile.envconfig
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_instance_profile.envconfig": &terraform.ResourceState{Type:"aws_iam_instance_profile", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.envconfig" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_instance_profile.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': walking
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_instance_profile.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] Attaching resource state to "aws_iam_role_policy_attachment.envconfig-basic": &terraform.ResourceState{Type:"aws_iam_role_policy_attachment", Dependencies:[]string{"aws_iam_role.envconfig"}, Primary:(*terraform.InstanceState)(0xc00002c8c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}}
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.envconfig-basic" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
aws_iam_role_policy_attachment.envconfig-basic - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.aws_iam_role_policy_attachment.envconfig-basic': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-vpc
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_instance_profile.envconfig
2019/04/02 12:00:32 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountCheckComputed
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': expanding/walking dynamic subgraph
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ResourceCountTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] OrphanResourceCount: Starting...
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.TargetsTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: []
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.ReferenceTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] Graph after step *terraform.RootTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodePlannableResourceInstance
2019/04/02 12:00:32 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:32 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalDiff
2019-04-02T12:00:32.979-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff()
2019-04-02T12:00:32.979-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:32 [TRACE] dag/walk: walking "provider.vault (close)"
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.vault (close)': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.vault (close)': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: provider.vault (close)
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close)
2019-04-02T12:00:32.980-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:32 [DEBUG] Removing 'id' diff and setting Destroy to false because after ignore_changes, this diff no longer requires replacement
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.launcher
2019-04-02T12:00:32.981-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:32 [DEBUG] Instance Diff is nil in Diff()
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy_attachment.envconfig-basic
2019/04/02 12:00:32 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:32 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.envconfig.0", replace "aws_iam_role.envconfig"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.launcher.0", replace "aws_lambda_function.launcher"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "null_resource.lambda.0", replace "null_resource.lambda"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-vpc.0", replace "aws_iam_role_policy_attachment.envconfig-vpc"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "data.aws_iam_policy_document.assume_role.0", replace "data.aws_iam_policy_document.assume_role"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "vault_policy.envconfig.0", replace "vault_policy.envconfig"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_instance_profile.envconfig.0", replace "aws_iam_instance_profile.envconfig"
2019/04/02 12:00:32 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy_attachment.envconfig-basic.0", replace "aws_iam_role_policy_attachment.envconfig-basic"
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (count boundary fixup)
2019/04/02 12:00:32 [TRACE] dag/walk: walking "provider.aws (close)"
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.aws (close)': walking
2019/04/02 12:00:32 [TRACE] vertex 'root.provider.aws (close)': evaluating
2019/04/02 12:00:32 [TRACE] [walkPlan] Entering eval tree: provider.aws (close)
2019/04/02 12:00:32 [TRACE] root: eval: *terraform.EvalCloseProvider
2019/04/02 12:00:32 [TRACE] [walkPlan] Exiting eval tree: provider.aws (close)
2019/04/02 12:00:32 [TRACE] dag/walk: walking "root"
2019/04/02 12:00:32 [TRACE] vertex 'root.root': walking
An execution plan has been generated and is shown below.
2019/04/02 12:00:32 [DEBUG] command: asking for input: "Do you want to perform these actions?"
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
+ vault_aws_auth_backend_role.envconfig
id: <computed>
allow_instance_migration: "false"
auth_type: "iam"
backend: "aws"
bound_iam_instance_profile_arns.#: "1"
bound_iam_instance_profile_arns.0: "arn:aws:iam::057922691035:instance-profile/envconfig-reader"
bound_iam_role_arns.#: "1"
bound_iam_role_arns.0: "arn:aws:iam::057922691035:role/envconfig-reader"
disallow_reauthentication: "false"
max_ttl: "120"
policies.#: "1"
policies.0: "envconfig-reader"
resolve_aws_unique_ids: "true"
role: "envconfig-reader"
ttl: "60"
Plan: 1 to add, 0 to change, 0 to destroy.
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
2019/04/02 12:00:37 [INFO] terraform: building graph: GraphTypeApply
2019/04/02 12:00:37 [TRACE] DiffTransformer: starting
2019/04/02 12:00:37 [TRACE] DiffTransformer: Module: CREATE: vault_aws_auth_backend_role.envconfig
allow_instance_migration: "" => "false"
auth_type: "" => "iam" (forces new resource)
backend: "" => "aws" (forces new resource)
bound_iam_instance_profile_arns.#: "" => "1"
bound_iam_instance_profile_arns.0: "" => "arn:aws:iam::057922691035:instance-profile/envconfig-reader"
bound_iam_role_arns.#: "" => "1"
bound_iam_role_arns.0: "" => "arn:aws:iam::057922691035:role/envconfig-reader"
disallow_reauthentication: "" => "false"
max_ttl: "" => "120"
policies.#: "" => "1"
policies.0: "" => "envconfig-reader"
resolve_aws_unique_ids: "" => "true"
role: "" => "envconfig-reader" (forces new resource)
ttl: "" => "60"
2019/04/02 12:00:37 [TRACE] DiffTransformer: Resource "vault_aws_auth_backend_role.envconfig": *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"policies.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "auth_type":*terraform.ResourceAttrDiff{Old:"", New:"iam", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, "bound_iam_instance_profile_arns.0":*terraform.ResourceAttrDiff{Old:"", New:"arn:aws:iam::057922691035:instance-profile/envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "bound_iam_role_arns.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "role":*terraform.ResourceAttrDiff{Old:"", New:"envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, "backend":*terraform.ResourceAttrDiff{Old:"", New:"aws", NewComputed:false, NewRemoved:false, NewExtra:"aws", RequiresNew:true, Sensitive:false, Type:0x0}, "bound_iam_role_arns.0":*terraform.ResourceAttrDiff{Old:"", New:"arn:aws:iam::057922691035:role/envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "allow_instance_migration":*terraform.ResourceAttrDiff{Old:"", New:"false", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "max_ttl":*terraform.ResourceAttrDiff{Old:"", New:"120", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "disallow_reauthentication":*terraform.ResourceAttrDiff{Old:"", New:"false", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "ttl":*terraform.ResourceAttrDiff{Old:"", New:"60", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "resolve_aws_unique_ids":*terraform.ResourceAttrDiff{Old:"", New:"true", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "bound_iam_instance_profile_arns.#":*terraform.ResourceAttrDiff{Old:"", New:"1", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "policies.0":*terraform.ResourceAttrDiff{Old:"", New:"envconfig-reader", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "id":*terraform.ResourceAttrDiff{Old:"", New:"", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x2}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)}
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.DiffTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.OrphanOutputTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [TRACE] AttachResourceConfigTransformer: Beginning...
2019/04/02 12:00:37 [TRACE] AttachResourceConfigTransformer: Attach resource config request: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:37 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"envconfig", Type:"vault_aws_auth_backend_role", RawCount:(*config.RawConfig)(0xc0003a4f50), RawConfig:(*config.RawConfig)(0xc0003a4ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [DEBUG] Resource state not found for "vault_aws_auth_backend_role.envconfig": vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.AttachStateTransformer:
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [TRACE] ProviderConfigTransformer: Starting for path: []
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} aws
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"aws", Alias:"", Version:">= 2.4.0", RawConfig:(*config.RawConfig)(0xc0003a49a0)}
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} null
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"null", Alias:"", Version:">= 2.1.0", RawConfig:(*config.RawConfig)(0xc0003a4a10)}
2019/04/02 12:00:37 [TRACE] Attach provider request: []string{} vault
2019/04/02 12:00:37 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"vault", Alias:"", Version:"", RawConfig:(*config.RawConfig)(0xc0003a4a80)}
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProviderConfigTransformer:
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.MissingProviderTransformer:
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
2019/04/02 12:00:37 [DEBUG] resource vault_aws_auth_backend_role.envconfig using provider provider.vault
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProviderTransformer:
provider.aws - *terraform.NodeApplyableProvider
provider.null - *terraform.NodeApplyableProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [DEBUG] pruning unused provider provider.aws
2019/04/02 12:00:37 [DEBUG] pruning unused provider provider.null
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.PruneProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ParentProviderTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.graphTransformerMulti:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] DestroyEdgeTransformer: Beginning destroy edge transformation...
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.DestroyEdgeTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] CBDEdgeTransformer: Beginning CBD transformation...
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CBDEdgeTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.MissingProvisionerTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ProvisionerTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RootVariableTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.LocalTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.OutputTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ModuleVariableTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RemovedModuleTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [DEBUG] ReferenceTransformer: "provider.vault" references: []
2019/04/02 12:00:37 [DEBUG] ReferenceTransformer: "vault_aws_auth_backend_role.envconfig" references: []
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.ReferenceTransformer:
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CountBoundaryTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.TargetsTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CloseProviderTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.RootTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
provider.vault - *terraform.NodeApplyableProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
root - terraform.graphNodeRoot
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
provider.vault (close) - *terraform.graphNodeCloseProvider
vault_aws_auth_backend_role.envconfig - *terraform.NodeApplyableResource
provider.vault - *terraform.NodeApplyableProvider
2019/04/02 12:00:37 [DEBUG] Starting graph walk: walkApply
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "provider.vault (close)"
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "provider.vault"
2019/04/02 12:00:37 [TRACE] dag/walk: added new vertex: "root"
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)"
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "vault_aws_auth_backend_role.envconfig" waiting on "provider.vault"
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:37 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "vault_aws_auth_backend_role.envconfig", sending new deps
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps
2019/04/02 12:00:37 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/04/02 12:00:37 [TRACE] dag/walk: walking "provider.vault"
2019/04/02 12:00:37 [TRACE] vertex 'root.provider.vault': walking
2019/04/02 12:00:37 [TRACE] vertex 'root.provider.vault': evaluating
2019/04/02 12:00:37 [TRACE] [walkApply] Entering eval tree: provider.vault
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInitProvider
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalOpFilter
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalConfigProvider
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Request Details:
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]---------------------------------------
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: POST /v1/auth/token/create HTTP/1.1
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 100
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.601-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Response Details:
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 200 OK
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 381
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:37 GMT
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.765-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:37.766-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [INFO] Using Vault token with the following policies: root
2019/04/02 12:00:37 [TRACE] [walkApply] Exiting eval tree: provider.vault
2019/04/02 12:00:37 [TRACE] dag/walk: walking "vault_aws_auth_backend_role.envconfig"
2019/04/02 12:00:37 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': walking
2019/04/02 12:00:37 [TRACE] vertex 'root.vault_aws_auth_backend_role.envconfig': evaluating
2019/04/02 12:00:37 [TRACE] [walkApply] Entering eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalSequence
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInstanceInfo
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadDiff
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:37 [TRACE] root: eval: terraform.EvalNoop
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalInterpolate
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadState
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalValidateResource
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalDiff
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadDiff
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalCompareDiff
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalGetProvider
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalReadState
vault_aws_auth_backend_role.envconfig: Creating...
allow_instance_migration: "" => "false"
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyPre
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApply
2019/04/02 12:00:37 [DEBUG] apply: vault_aws_auth_backend_role.envconfig: executing Apply
auth_type: "" => "iam"
backend: "" => "aws"
bound_iam_instance_profile_arns.#: "" => "1"
bound_iam_instance_profile_arns.0: "" => "arn:aws:iam::057922691035:instance-profile/envconfig-reader"
bound_iam_role_arns.#: "" => "1"
bound_iam_role_arns.0: "" => "arn:aws:iam::057922691035:role/envconfig-reader"
2019-04-02T12:00:37.794-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Writing AWS auth backend role "auth/aws/role/envconfig-reader"
disallow_reauthentication: "" => "false"
max_ttl: "" => "120"
policies.#: "" => "1"
policies.0: "" => "envconfig-reader"
resolve_aws_unique_ids: "" => "true"
role: "" => "envconfig-reader"
ttl: "" => "60"
2019-04-02T12:00:37.798-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Request Details:
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ REQUEST ]---------------------------------------
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: PUT /v1/auth/aws/role/envconfig-reader HTTP/1.1
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Host: vault.REDACTED.com
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: User-Agent: Go-http-client/1.1
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 104
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: X-Vault-Token: REDACTED
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Accept-Encoding: gzip
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.799-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [WARN] Invalid log level: "1". Defaulting to level: TRACE. Valid levels are: [TRACE DEBUG INFO WARN ERROR]
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:37 [DEBUG] Vault API Response Details:
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: ---[ RESPONSE ]--------------------------------------
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: HTTP/2.0 400 Bad Request
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Length: 79
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Cache-Control: no-store
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Content-Type: application/json
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: Date: Tue, 02 Apr 2019 17:00:37 GMT
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4:
2019-04-02T12:00:37.925-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: -----------------------------------------------------
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyProvisioners
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalIf
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteState
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalWriteDiff
2019/04/02 12:00:37 [TRACE] root: eval: *terraform.EvalApplyPost
2019/04/02 12:00:37 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request.
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader
Code: 400. Errors:
* at least be one bound parameter should be specified on the role
2019/04/02 12:00:37 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred:
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request.
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader
Code: 400. Errors:
* at least be one bound parameter should be specified on the role
2019/04/02 12:00:37 [TRACE] [walkApply] Exiting eval tree: vault_aws_auth_backend_role.envconfig
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)"
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "provider.vault (close)"
2019/04/02 12:00:37 [TRACE] dag/walk: upstream errored, not walking "root"
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:37 [TRACE] Preserving existing state lineage "dd7fd372-4dd7-238c-4a05-3b9a1cf92aa8"
2019/04/02 12:00:38 [DEBUG] plugin: waiting for all plugin processes to complete...
2019-04-02T12:00:38.005-0500 [DEBUG] plugin.terraform-provider-vault_v1.6.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin864157245: use of closed network connection
2019-04-02T12:00:38.005-0500 [DEBUG] plugin.terraform-provider-null_v2.1.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin551759210: use of closed network connection
Error: Error applying plan:
1 error(s) occurred:
* vault_aws_auth_backend_role.envconfig: 1 error(s) occurred:
* vault_aws_auth_backend_role.envconfig: error writing AWS auth backend role "auth/aws/role/envconfig-reader": Error making API request.
URL: PUT https://vault.REDACTED.com/v1/auth/aws/role/envconfig-reader
Code: 400. Errors:
* at least be one bound parameter should be specified on the role
2019-04-02T12:00:38.013-0500 [DEBUG] plugin.terraform-provider-aws_v2.4.0_x4: 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin478572781: use of closed network connection
2019-04-02T12:00:38.013-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-null_v2.1.0_x4
2019-04-02T12:00:38.014-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:38 [ERR] plugin: plugin server: accept unix /tmp/plugin566928270: use of closed network connection
2019-04-02T12:00:38.014-0500 [DEBUG] plugin.terraform: local-exec-provisioner (internal) 2019/04/02 12:00:38 [DEBUG] plugin: waiting for all plugin processes to complete...
Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.
2019-04-02T12:00:38.020-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-vault_v1.6.0_x4
2019-04-02T12:00:38.025-0500 [DEBUG] plugin: plugin process exited: path=/home/gmyers/src/vault-test/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.4.0_x4
2019-04-02T12:00:38.031-0500 [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform
exit status 1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment