Skip to content

Instantly share code, notes, and snippets.

@tristanmorgan
Created December 22, 2021 04:59
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tristanmorgan/e70d689e13b95bd331fada678c2376f8 to your computer and use it in GitHub Desktop.
Save tristanmorgan/e70d689e13b95bd331fada678c2376f8 to your computer and use it in GitHub Desktop.
$ TF_LOG=debug terraform apply -auto-approve -no-color
2021-12-22T15:49:42.089+1100 [INFO] Terraform version: 1.1.2
2021-12-22T15:49:42.089+1100 [INFO] Go runtime version: go1.17.2
2021-12-22T15:49:42.089+1100 [INFO] CLI args: []string{"terraform", "apply", "-auto-approve", "-no-color"}
2021-12-22T15:49:42.089+1100 [DEBUG] Attempting to open CLI config file: /Users/tristanmorgan/.terraformrc
2021-12-22T15:49:42.089+1100 [INFO] Loading CLI configuration from /Users/tristanmorgan/.terraformrc
2021-12-22T15:49:42.090+1100 [DEBUG] checking for credentials in "/Users/tristanmorgan/.terraform.d/plugins"
2021-12-22T15:49:42.090+1100 [DEBUG] found credentials "terraform-credentials-keychain_v1.0.0"
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2021-12-22T15:49:42.090+1100 [DEBUG] will search for provider plugins in /Users/tristanmorgan/.terraform.d/plugins
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory /Users/tristanmorgan/Library/Application Support/io.terraform/plugins
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins
2021-12-22T15:49:42.090+1100 [INFO] Checkpoint disabled. Not running.
2021-12-22T15:49:42.090+1100 [INFO] CLI command args: []string{"apply", "-auto-approve", "-no-color"}
2021-12-22T15:49:42.091+1100 [DEBUG] New state was assigned lineage "4a1fbb4c-b09c-c6dd-54f7-acc52c412593"
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "."
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "/Users/tristanmorgan/bin"
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "/Users/tristanmorgan/.terraform.d/plugins"
2021-12-22T15:49:42.111+1100 [INFO] backend/local: starting Apply operation
2021-12-22T15:49:42.111+1100 [DEBUG] created provider logger: level=debug
2021-12-22T15:49:42.111+1100 [INFO] provider: configuring client automatic mTLS
2021-12-22T15:49:42.120+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4]
2021-12-22T15:49:42.121+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26378
2021-12-22T15:49:42.121+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4
2021-12-22T15:49:42.135+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.135+1100
2021-12-22T15:49:42.157+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: network=unix address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin273300169 timestamp=2021-12-22T15:49:42.157+1100
2021-12-22T15:49:42.158+1100 [DEBUG] provider: using plugin: version=5
2021-12-22T15:49:42.181+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-12-22T15:49:42.181+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26378
2021-12-22T15:49:42.182+1100 [DEBUG] provider: plugin exited
2021-12-22T15:49:42.182+1100 [DEBUG] Building and walking validate graph
2021-12-22T15:49:42.182+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_policy.admin
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_policy.admin" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: [data.vault_policy_document.admin]
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: []
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: [vault_policy.admin]
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: [vault_identity_group.company_engineers vault_github_auth_backend.github]
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin" references: []
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: []
2021-12-22T15:49:42.182+1100 [DEBUG] Starting graph walk: walkValidate
2021-12-22T15:49:42.182+1100 [DEBUG] created provider logger: level=debug
2021-12-22T15:49:42.183+1100 [INFO] provider: configuring client automatic mTLS
2021-12-22T15:49:42.189+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4]
2021-12-22T15:49:42.191+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26379
2021-12-22T15:49:42.191+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4
2021-12-22T15:49:42.204+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.203+1100
2021-12-22T15:49:42.225+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin980510646 network=unix timestamp=2021-12-22T15:49:42.225+1100
2021-12-22T15:49:42.225+1100 [DEBUG] provider: using plugin: version=5
2021-12-22T15:49:42.250+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-12-22T15:49:42.251+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26379
2021-12-22T15:49:42.251+1100 [DEBUG] provider: plugin exited
2021-12-22T15:49:42.251+1100 [INFO] backend/local: apply calling Plan
2021-12-22T15:49:42.251+1100 [DEBUG] Building and walking plan graph for NormalMode
2021-12-22T15:49:42.251+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_identity_group.company_engineers (expand)
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_policy.admin (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers (expand)" references: [vault_policy.admin (expand)]
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers (expand)" references: [vault_identity_group.company_engineers (expand) vault_github_auth_backend.github (expand)]
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin (expand)" references: [data.vault_policy_document.admin (expand)]
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github (expand)" references: []
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin (expand)" references: []
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: []
2021-12-22T15:49:42.251+1100 [DEBUG] Starting graph walk: walkPlan
2021-12-22T15:49:42.251+1100 [DEBUG] created provider logger: level=debug
2021-12-22T15:49:42.252+1100 [INFO] provider: configuring client automatic mTLS
2021-12-22T15:49:42.258+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4]
2021-12-22T15:49:42.260+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26380
2021-12-22T15:49:42.260+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4
2021-12-22T15:49:42.273+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.273+1100
2021-12-22T15:49:42.294+1100 [DEBUG] provider: using plugin: version=5
2021-12-22T15:49:42.294+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin126397059 network=unix timestamp=2021-12-22T15:49:42.294+1100
2021-12-22T15:49:42.321+1100 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/vault\"]" changed the config value, but that value is unused
2021-12-22T15:49:42.348+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/auth/token/lookup-self HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:805ea53c924845278d3defb42d8105ac353472f4ff8b5eb3ca1d92b41deaa0b2
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.348+1100
2021-12-22T15:49:42.349+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 461
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:42 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.349+1100
2021-12-22T15:49:42.349+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
POST /v1/auth/token/create HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 128
X-Vault-Request: true
X-Vault-Token: hmac-sha256:7e64bc8d6d677cf37c876915f7944f5a5fbe6dd693eae374dd2be7233ea88549
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.349+1100
2021-12-22T15:49:42.648+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 396
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:42 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.648+1100
2021-12-22T15:49:42.648+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [INFO] Using Vault token with the following policies: root: timestamp=2021-12-22T15:49:42.648+1100
2021-12-22T15:49:42.649+1100 [DEBUG] Resource instance state not found for node "vault_github_auth_backend.github", instance vault_github_auth_backend.github
2021-12-22T15:49:42.650+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: []
2021-12-22T15:49:42.650+1100 [DEBUG] Resource instance state not found for node "data.vault_policy_document.admin", instance data.vault_policy_document.admin
2021-12-22T15:49:42.650+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin" references: []
2021-12-22T15:49:42.650+1100 [DEBUG] refresh: vault_github_auth_backend.github: no state, so not refreshing
2021-12-22T15:49:42.653+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Rule is: &vault.PolicyRule{Path:"*", Description:"", MinWrappingTTL:"", MaxWrappingTTL:"", Capabilities:[]string{"create", "read", "update", "delete", "list", "sudo"}, RequiredParameters:[]string(nil), AllowedParameters:map[string][]string(nil), DeniedParameters:map[string][]string(nil)}: timestamp=2021-12-22T15:49:42.653+1100
2021-12-22T15:49:42.653+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Policy HCL is: path "*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}: timestamp=2021-12-22T15:49:42.653+1100
2021-12-22T15:49:42.654+1100 [DEBUG] Resource instance state not found for node "vault_policy.admin", instance vault_policy.admin
2021-12-22T15:49:42.654+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: []
2021-12-22T15:49:42.654+1100 [DEBUG] refresh: vault_policy.admin: no state, so not refreshing
2021-12-22T15:49:42.656+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_type: planned value cty.StringVal("default") for a non-computed attribute
- .tune: planned value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.ListValEmpty(cty.String), "audit_non_hmac_request_keys":cty.ListValEmpty(cty.String), "audit_non_hmac_response_keys":cty.ListValEmpty(cty.String), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.StringVal(""), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.ListValEmpty(cty.String), "token_type":cty.StringVal("default-service")})}) does not match config value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_request_keys":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_response_keys":cty.NullVal(cty.List(cty.String)), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.NullVal(cty.String), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.NullVal(cty.List(cty.String)), "token_type":cty.StringVal("default-service")})})
2021-12-22T15:49:42.657+1100 [DEBUG] Resource instance state not found for node "vault_identity_group.company_engineers", instance vault_identity_group.company_engineers
2021-12-22T15:49:42.657+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: []
2021-12-22T15:49:42.657+1100 [DEBUG] refresh: vault_identity_group.company_engineers: no state, so not refreshing
2021-12-22T15:49:42.659+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_identity_group.company_engineers, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .external_member_entity_ids: planned value cty.False for a non-computed attribute
- .external_policies: planned value cty.False for a non-computed attribute
2021-12-22T15:49:42.660+1100 [DEBUG] Resource instance state not found for node "vault_identity_group_alias.company_engineers", instance vault_identity_group_alias.company_engineers
2021-12-22T15:49:42.660+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: []
2021-12-22T15:49:42.660+1100 [DEBUG] refresh: vault_identity_group_alias.company_engineers: no state, so not refreshing
2021-12-22T15:49:42.662+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-12-22T15:49:42.664+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26380
2021-12-22T15:49:42.664+1100 [DEBUG] provider: plugin exited
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated
with the following symbols:
+ create
Terraform will perform the following actions:
# vault_github_auth_backend.github will be created
+ resource "vault_github_auth_backend" "github" {
+ accessor = (known after apply)
+ description = "Authenticate using GitHub"
+ id = (known after apply)
+ organization = "company"
+ path = "github"
+ token_policies = [
+ "default",
]
+ token_type = "default"
+ tune = [
+ {
+ allowed_response_headers = []
+ audit_non_hmac_request_keys = []
+ audit_non_hmac_response_keys = []
+ default_lease_ttl = "1h"
+ listing_visibility = ""
+ max_lease_ttl = "2h"
+ passthrough_request_headers = []
+ token_type = "default-service"
},
]
}
# vault_identity_group.company_engineers will be created
+ resource "vault_identity_group" "company_engineers" {
+ external_member_entity_ids = false
+ external_policies = false
+ id = (known after apply)
+ name = "company-engineers"
+ policies = [
+ "admin",
]
+ type = "external"
}
# vault_identity_group_alias.company_engineers will be created
+ resource "vault_identity_group_alias" "company_engineers" {
+ canonical_id = (known after apply)
+ id = (known after apply)
+ mount_accessor = (known after apply)
+ name = "company-engineers"
}
# vault_policy.admin will be created
+ resource "vault_policy" "admin" {
+ id = (known after apply)
+ name = "admin"
+ policy = <<-EOT
path "*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
EOT
}
Plan: 4 to add, 0 to change, 0 to destroy.
2021-12-22T15:49:42.665+1100 [INFO] backend/local: apply calling Apply
2021-12-22T15:49:42.665+1100 [DEBUG] Building and walking apply graph for NormalMode plan
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_github_auth_backend.github", instance vault_github_auth_backend.github
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_identity_group_alias.company_engineers", instance vault_identity_group_alias.company_engineers
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_policy.admin", instance vault_policy.admin
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_identity_group.company_engineers", instance vault_identity_group.company_engineers
2021-12-22T15:49:42.666+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_github_auth_backend.github
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_policy.admin (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_policy.admin" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: []
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: [vault_identity_group.company_engineers vault_identity_group.company_engineers vault_identity_group.company_engineers (expand) vault_github_auth_backend.github vault_github_auth_backend.github vault_github_auth_backend.github (expand)]
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: []
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers (expand)" references: []
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin (expand)" references: []
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: [data.vault_policy_document.admin (expand)]
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: [vault_policy.admin vault_policy.admin vault_policy.admin (expand)]
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin (expand)" references: []
2021-12-22T15:49:42.667+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github (expand)" references: []
2021-12-22T15:49:42.667+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers (expand)" references: []
2021-12-22T15:49:42.667+1100 [DEBUG] Starting graph walk: walkApply
2021-12-22T15:49:42.668+1100 [DEBUG] created provider logger: level=debug
2021-12-22T15:49:42.668+1100 [INFO] provider: configuring client automatic mTLS
2021-12-22T15:49:42.684+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4]
2021-12-22T15:49:42.687+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26384
2021-12-22T15:49:42.688+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4
2021-12-22T15:49:42.708+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.708+1100
2021-12-22T15:49:42.735+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin871131135 network=unix timestamp=2021-12-22T15:49:42.735+1100
2021-12-22T15:49:42.735+1100 [DEBUG] provider: using plugin: version=5
2021-12-22T15:49:42.762+1100 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/vault\"]" changed the config value, but that value is unused
2021-12-22T15:49:42.791+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/auth/token/lookup-self HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:ccdc36d445f20703bd955a5a10b28db922e3ca6e6dcae9eeb74b05ba594cbe2b
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.791+1100
2021-12-22T15:49:42.791+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 461
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:42 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.791+1100
2021-12-22T15:49:42.792+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
POST /v1/auth/token/create HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 128
X-Vault-Request: true
X-Vault-Token: hmac-sha256:b3aa0e2f9b734e66f57b58b668a80ed1207e62c22dc041b4b51b7b6b4442cd9b
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.792+1100
2021-12-22T15:49:43.087+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 396
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.087+1100
2021-12-22T15:49:43.087+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Using Vault token with the following policies: root: timestamp=2021-12-22T15:49:43.087+1100
vault_policy.admin: Creating...
2021-12-22T15:49:43.092+1100 [INFO] Starting apply for vault_policy.admin
2021-12-22T15:49:43.092+1100 [DEBUG] vault_policy.admin: applying the planned Create change
2021-12-22T15:49:43.093+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing policy admin to Vault: timestamp=2021-12-22T15:49:43.093+1100
2021-12-22T15:49:43.093+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_type: planned value cty.StringVal("default") for a non-computed attribute
- .tune: planned value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.ListValEmpty(cty.String), "audit_non_hmac_request_keys":cty.ListValEmpty(cty.String), "audit_non_hmac_response_keys":cty.ListValEmpty(cty.String), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.StringVal(""), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.ListValEmpty(cty.String), "token_type":cty.StringVal("default-service")})}) does not match config value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_request_keys":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_response_keys":cty.NullVal(cty.List(cty.String)), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.NullVal(cty.String), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.NullVal(cty.List(cty.String)), "token_type":cty.StringVal("default-service")})})
2021-12-22T15:49:43.093+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
PUT /v1/sys/policies/acl/admin HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 115
X-Vault-Request: true
X-Vault-Token: hmac-sha256:efb465745bcb8a48e53a5300dca39527ae58e8969b2e5b29c4dc23952984d6a6
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.093+1100
vault_github_auth_backend.github: Creating...
2021-12-22T15:49:43.093+1100 [INFO] Starting apply for vault_github_auth_backend.github
2021-12-22T15:49:43.093+1100 [DEBUG] vault_github_auth_backend.github: applying the planned Create change
2021-12-22T15:49:43.095+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Enabling github auth backend at 'github': timestamp=2021-12-22T15:49:43.095+1100
2021-12-22T15:49:43.095+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
POST /v1/sys/auth/github HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 229
X-Vault-Request: true
X-Vault-Token: hmac-sha256:ca3d078ce9827161ebf186dd994e0c0686702321e668e47ddf3fffad0f228733
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.095+1100
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 204 No Content
Content-Length: 0
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.205+1100
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Enabled github auth backend at 'github': timestamp=2021-12-22T15:49:43.205+1100
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 204 No Content
Content-Length: 0
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.205+1100
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing github auth config to '"auth/github/config"': timestamp=2021-12-22T15:49:43.206+1100
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/sys/policies/acl/admin HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:2506faa995b486e31a2a3ee32e3b2a10a357caf66bdfff113066b2c275bea050
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.206+1100
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
PUT /v1/auth/github/config HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 78
X-Vault-Request: true
X-Vault-Token: hmac-sha256:eae8387a9502f59d83d1003e5222a642fdbfa05cdb80caa8e11cc2f4b4817d7a
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.206+1100
2021-12-22T15:49:43.207+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 288
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.207+1100
vault_policy.admin: Creation complete after 0s [id=admin]
2021-12-22T15:49:43.284+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_identity_group.company_engineers, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .external_policies: planned value cty.False for a non-computed attribute
- .external_member_entity_ids: planned value cty.False for a non-computed attribute
vault_identity_group.company_engineers: Creating...
2021-12-22T15:49:43.284+1100 [INFO] Starting apply for vault_identity_group.company_engineers
2021-12-22T15:49:43.285+1100 [DEBUG] vault_identity_group.company_engineers: applying the planned Create change
2021-12-22T15:49:43.286+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
PUT /v1/identity/group HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 67
X-Vault-Request: true
X-Vault-Token: hmac-sha256:641eb7259270526022f68597af3e1859a4858776d1a96fdab25c195933cfbafa
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.286+1100
2021-12-22T15:49:43.298+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 204 No Content
Content-Length: 0
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.298+1100
2021-12-22T15:49:43.298+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Github auth config successfully written to '"auth/github/config"': timestamp=2021-12-22T15:49:43.298+1100
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Github Auth '"github"' tune configuration changed: timestamp=2021-12-22T15:49:43.299+1100
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing github auth tune to '"auth/github"': timestamp=2021-12-22T15:49:43.299+1100
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
POST /v1/sys/mounts/auth/github/tune HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 254
X-Vault-Request: true
X-Vault-Token: hmac-sha256:501dd0c0e8ee2cab02d0cba5ad5b3457829ca1a2d46c0056e8cff4936466adab
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.299+1100
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 230
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.390+1100
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Wrote IdentityGroup "company-engineers": timestamp=2021-12-22T15:49:43.391+1100
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading IdentityGroup f62ebd4f-6089-ae64-9137-5762266f31b0 from "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0": timestamp=2021-12-22T15:49:43.391+1100
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading Entity from "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0": timestamp=2021-12-22T15:49:43.391+1100
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0 HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.391+1100
2021-12-22T15:49:43.409+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 400 Bad Request
Content-Length: 36
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.409+1100
2021-12-22T15:49:43.444+1100 [ERROR] vertex "vault_identity_group.company_engineers" error: error reading IdentityGroup "f62ebd4f-6089-ae64-9137-5762266f31b0": failed reading "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0"
2021-12-22T15:49:43.812+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 204 No Content
Content-Length: 0
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.812+1100
2021-12-22T15:49:43.812+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Written github auth tune to '"auth/github"': timestamp=2021-12-22T15:49:43.812+1100
2021-12-22T15:49:43.813+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
POST /v1/sys/mounts/auth/github/tune HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
Content-Length: 123
X-Vault-Request: true
X-Vault-Token: hmac-sha256:6d71bc7f934febbdb09dcbce61d920f0babe73efbff556bc90338786916f70db
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.813+1100
2021-12-22T15:49:43.888+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 204 No Content
Content-Length: 0
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.888+1100
2021-12-22T15:49:43.888+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth mount from '"auth/github"': timestamp=2021-12-22T15:49:43.888+1100
2021-12-22T15:49:43.889+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/sys/auth HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:9472c3b702c70063bcbecb42c932727c63d1b6fa6f3c2576cca5ba898502e8bf
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.888+1100
2021-12-22T15:49:43.890+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Transfer-Encoding: chunked
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.890+1100
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Read github auth mount from '"auth/github"': timestamp=2021-12-22T15:49:43.891+1100
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth config from '"auth/github/config"': timestamp=2021-12-22T15:49:43.891+1100
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/auth/github/config HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:b21603df0610ecd15ec671f62e07724900c327ef3ec8ab0cad91e2dd082ca5e5
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.891+1100
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 400
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.892+1100
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Read github auth config from '"auth/github/config"': timestamp=2021-12-22T15:49:43.892+1100
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth tune from '"auth/github"/tune': timestamp=2021-12-22T15:49:43.892+1100
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details:
---[ REQUEST ]---------------------------------------
GET /v1/sys/mounts/auth/github/tune HTTP/1.1
Host: 10.10.10.132:8200
User-Agent: Go-http-client/1.1
X-Vault-Request: true
X-Vault-Token: hmac-sha256:78f3ea0c6a2617a92335cc5e4f3474807ab0db3ac587afe8bedbddf2efa08491
Accept-Encoding: gzip
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.892+1100
2021-12-22T15:49:43.893+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Content-Length: 719
Cache-Control: no-store
Content-Type: application/json
Date: Wed, 22 Dec 2021 04:49:43 GMT
Strict-Transport-Security: max-age=31536000; includeSubDomains
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.893+1100
2021-12-22T15:49:43.895+1100 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/vault\"]" produced an unexpected new value for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .token_max_ttl: was null, but now cty.NumberIntVal(0)
- .token_num_uses: was null, but now cty.NumberIntVal(0)
- .base_url: was null, but now cty.StringVal("")
- .token_explicit_max_ttl: was null, but now cty.NumberIntVal(0)
- .token_no_default_policy: was null, but now cty.False
- .token_ttl: was null, but now cty.NumberIntVal(0)
- .token_period: was null, but now cty.NumberIntVal(0)
vault_github_auth_backend.github: Creation complete after 1s [id=github]
Error: error reading IdentityGroup "f62ebd4f-6089-ae64-9137-5762266f31b0": failed reading "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0"
with vault_identity_group.company_engineers,
on auth_github.tf line 27, in resource "vault_identity_group" "company_engineers":
27: resource "vault_identity_group" "company_engineers" {
2021-12-22T15:49:43.936+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-12-22T15:49:43.937+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26384
2021-12-22T15:49:43.937+1100 [DEBUG] provider: plugin exited
Wed Dec 22 15:49:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment