Created
August 4, 2019 23:06
-
-
Save kinghrothgar/a5a246d5c4e3145e50efcd541c209ce8 to your computer and use it in GitHub Desktop.
apply crash.log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/08/04 19:05:57 [INFO] Terraform version: 0.12.6 | |
2019/08/04 19:05:57 [INFO] Go runtime version: go1.12.4 | |
2019/08/04 19:05:57 [INFO] CLI args: []string{"/Users/lukejolly/bin/terraform", "apply"} | |
2019/08/04 19:05:57 [DEBUG] Attempting to open CLI config file: /Users/lukejolly/.terraformrc | |
2019/08/04 19:05:57 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2019/08/04 19:05:57 [INFO] CLI command args: []string{"apply"} | |
2019/08/04 19:05:57 [TRACE] Meta.Backend: built configuration for "gcs" backend with hash value 2667143533 | |
2019/08/04 19:05:57 [TRACE] Preserving existing state lineage "bcb665e8-e54e-2055-65d4-d58e55ad3b6c" | |
2019/08/04 19:05:57 [TRACE] Preserving existing state lineage "bcb665e8-e54e-2055-65d4-d58e55ad3b6c" | |
2019/08/04 19:05:57 [TRACE] Meta.Backend: working directory was previously initialized for "gcs" backend | |
2019/08/04 19:05:57 [TRACE] Meta.Backend: using already-initialized, unchanged "gcs" backend configuration | |
2019/08/04 19:05:57 [TRACE] Meta.Backend: instantiated backend of type *gcs.Backend | |
2019/08/04 19:05:57 [DEBUG] checking for provider in "." | |
2019/08/04 19:05:57 [DEBUG] checking for provider in "/Users/lukejolly/bin" | |
2019/08/04 19:05:57 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64" | |
2019/08/04 19:05:57 [DEBUG] found provider "terraform-provider-google-beta_v2.12.0_x4" | |
2019/08/04 19:05:57 [DEBUG] found provider "terraform-provider-google_v2.12.0_x4" | |
2019/08/04 19:05:57 [DEBUG] found provider "terraform-provider-vault_v2.1.0_x4" | |
2019/08/04 19:05:57 [DEBUG] found valid plugin: "google", "2.12.0", "/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4" | |
2019/08/04 19:05:57 [DEBUG] found valid plugin: "vault", "2.1.0", "/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4" | |
2019/08/04 19:05:57 [DEBUG] found valid plugin: "google-beta", "2.12.0", "/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4" | |
2019/08/04 19:05:57 [DEBUG] checking for provisioner in "." | |
2019/08/04 19:05:57 [DEBUG] checking for provisioner in "/Users/lukejolly/bin" | |
2019/08/04 19:05:57 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64" | |
2019/08/04 19:05:57 [TRACE] Meta.Backend: backend *gcs.Backend does not support operations, so wrapping it in a local backend | |
2019/08/04 19:05:57 [INFO] backend/local: starting Apply operation | |
2019/08/04 19:05:57 [TRACE] backend/local: requesting state manager for workspace "vault-config" | |
2019/08/04 19:05:58 [TRACE] backend/local: requesting state lock for workspace "vault-config" | |
2019/08/04 19:05:58 [TRACE] backend/local: reading remote state for workspace "vault-config" | |
2019/08/04 19:05:58 [TRACE] backend/local: retrieving local state snapshot for workspace "vault-config" | |
2019/08/04 19:05:58 [TRACE] backend/local: building context for current working directory | |
2019/08/04 19:05:58 [TRACE] terraform.NewContext: starting | |
2019/08/04 19:05:58 [TRACE] terraform.NewContext: resolving provider version selections | |
2019/08/04 19:05:59 [TRACE] terraform.NewContext: loading provider schemas | |
2019/08/04 19:05:59 [TRACE] LoadSchemas: retrieving schema for provider type "google" | |
2019-08-04T19:05:59.226-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:05:59.249-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4] | |
2019-08-04T19:05:59.255-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4 pid=56601 | |
2019-08-04T19:05:59.255-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4 | |
2019-08-04T19:05:59.267-0400 [INFO] plugin.terraform-provider-google_v2.12.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:05:59.267-0400 | |
2019-08-04T19:05:59.289-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:05:59.289-0400 [DEBUG] plugin.terraform-provider-google_v2.12.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin951508012 network=unix timestamp=2019-08-04T19:05:59.289-0400 | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: Close | |
2019-08-04T19:05:59.351-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google_v2.12.0_x4 pid=56601 | |
2019-08-04T19:05:59.351-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:05:59 [TRACE] LoadSchemas: retrieving schema for provider type "google-beta" | |
2019-08-04T19:05:59.351-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:05:59.373-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4] | |
2019-08-04T19:05:59.380-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4 pid=56603 | |
2019-08-04T19:05:59.380-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4 | |
2019-08-04T19:05:59.392-0400 [INFO] plugin.terraform-provider-google-beta_v2.12.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:05:59.392-0400 | |
2019-08-04T19:05:59.415-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:05:59.415-0400 [DEBUG] plugin.terraform-provider-google-beta_v2.12.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin834268886 network=unix timestamp=2019-08-04T19:05:59.414-0400 | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: Close | |
2019-08-04T19:05:59.477-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-google-beta_v2.12.0_x4 pid=56603 | |
2019-08-04T19:05:59.477-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:05:59 [TRACE] LoadSchemas: retrieving schema for provider type "vault" | |
2019-08-04T19:05:59.477-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:05:59.498-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4] | |
2019-08-04T19:05:59.503-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56606 | |
2019-08-04T19:05:59.503-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 | |
2019-08-04T19:05:59.513-0400 [INFO] plugin.terraform-provider-vault_v2.1.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:05:59.513-0400 | |
2019-08-04T19:05:59.535-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:05:59.535-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin332945317 network=unix timestamp=2019-08-04T19:05:59.535-0400 | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: Close | |
2019-08-04T19:05:59.585-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56606 | |
2019-08-04T19:05:59.585-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:05:59 [TRACE] terraform.NewContext: complete | |
2019/08/04 19:05:59 [TRACE] backend/local: finished building terraform.Context | |
2019/08/04 19:05:59 [TRACE] backend/local: requesting interactive input, if necessary | |
2019/08/04 19:05:59 [TRACE] Context.Input: Prompting for variables | |
2019/08/04 19:05:59 [TRACE] Context.Input: Prompting for provider arguments | |
2019/08/04 19:05:59 [TRACE] Context.Input: Provider provider.google declared at google.tf:1,1-18 | |
2019/08/04 19:05:59 [TRACE] Context.Input: Provider provider.google-beta declared at google.tf:5,1-23 | |
2019/08/04 19:05:59 [TRACE] Context.Input: Provider provider.vault implied by resource block at auth_backends.tf:1,1-48 | |
2019/08/04 19:05:59 [TRACE] Context.Input: Input for provider.google: map[string]cty.Value{} | |
2019/08/04 19:05:59 [TRACE] Context.Input: Input for provider.google-beta: map[string]cty.Value{} | |
2019/08/04 19:05:59 [TRACE] Context.Input: Input for provider.vault: map[string]cty.Value{} | |
2019/08/04 19:05:59 [TRACE] backend/local: running validation operation | |
2019/08/04 19:05:59 [INFO] terraform: building graph: GraphTypeValidate | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/04 19:05:59 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.StateTransformer | |
2019/08/04 19:05:59 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodeValidatableResource) config from pki_backends.tf:13,1-64 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) config from pki_backends.tf:20,1-68 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_staging" (*terraform.NodeValidatableResource) config from auth_backends.tf:1,1-48 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_production" (*terraform.NodeValidatableResource) config from auth_backends.tf:6,1-51 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_staging" (*terraform.NodeValidatableResource) config from pki_backends.tf:7,1-54 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_policy.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) config from policies.tf:9,1-51 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) config from auth_backends.tf:11,1-70 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_production" (*terraform.NodeValidatableResource) config from pki_backends.tf:1,1-57 | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2019/08/04 19:05:59 [TRACE] ProviderConfigTransformer: attaching to "provider.google" provider configuration from google.tf:1,1-18 | |
2019/08/04 19:05:59 [TRACE] ProviderConfigTransformer: attaching to "provider.google-beta" provider configuration from google.tf:5,1-23 | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2019/08/04 19:05:59 [DEBUG] adding implicit provider configuration provider.vault, implied first by vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: data.vault_policy_document.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_policy.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend_config_ca.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_auth_backend.approle_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_auth_backend.approle_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_staging" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_production" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_staging" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_policy.staging_grpc_ssl_example" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_production" (*terraform.NodeValidatableResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2019/08/04 19:05:59 [DEBUG] pruning unused provider.google | |
2019/08/04 19:05:59 [DEBUG] pruning unused provider.google-beta | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example" references: [data.vault_policy_document.staging_grpc_ssl_example] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [vault_policy.staging_grpc_ssl_example vault_auth_backend.approle_production vault_auth_backend.approle_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_auth_backend.approle_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeValidatableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeValidatableResource | |
------ | |
2019/08/04 19:05:59 [DEBUG] Starting graph walk: walkValidate | |
2019/08/04 19:05:59 [TRACE] dag/walk: updating graph | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "root" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_config_ca.pki_int_staging" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_staging" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_production" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_production" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_policy.staging_grpc_ssl_example" waiting on "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_role.staging_grpc_ssl_example" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "data.vault_policy_document.staging_grpc_ssl_example" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_staging" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_production", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_production", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_policy.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "data.vault_policy_document.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_config_ca.pki_int_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "provider.vault" | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: provider.vault | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019-08-04T19:05:59.588-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:05:59.609-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4] | |
2019-08-04T19:05:59.613-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56608 | |
2019-08-04T19:05:59.613-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 | |
2019-08-04T19:05:59.624-0400 [INFO] plugin.terraform-provider-vault_v2.1.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:05:59.624-0400 | |
2019-08-04T19:05:59.645-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin119393543 network=unix timestamp=2019-08-04T19:05:59.645-0400 | |
2019-08-04T19:05:59.645-0400 [DEBUG] plugin: using plugin: version=5 | |
2019/08/04 19:05:59 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2019/08/04 19:05:59 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateProvider | |
2019/08/04 19:05:59 [TRACE] buildProviderConfig for provider.vault: no configuration at all | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: PrepareProviderConfig | |
2019/08/04 19:05:59 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:05:59 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: provider.vault | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": evaluating | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production" | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_staging": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_production": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_production": evaluating | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_staging": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": visit complete | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_staging": visit complete | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [TRACE] vertex "vault_auth_backend.approle_production": visit complete | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": evaluating | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeValidatableResource) | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": visit complete | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault (close)": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: provider.vault (close) | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2019/08/04 19:05:59 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2019/08/04 19:05:59 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: Close | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (EachMode fixup) | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (EachMode fixup) | |
2019/08/04 19:05:59 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2019-08-04T19:05:59.703-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56608 | |
2019-08-04T19:05:59.703-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:05:59 [TRACE] [walkValidate] Exiting eval tree: provider.vault (close) | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault (close)": visit complete | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "root" | |
2019/08/04 19:05:59 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2019/08/04 19:05:59 [TRACE] vertex "root": visit complete | |
2019/08/04 19:05:59 [INFO] backend/local: apply calling Refresh | |
2019/08/04 19:05:59 [INFO] terraform: building graph: GraphTypeRefresh | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/04 19:05:59 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/04 19:05:59 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.StateTransformer | |
2019/08/04 19:05:59 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_staging" (*terraform.NodeRefreshableManagedResource) config from pki_backends.tf:7,1-54 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodeRefreshableManagedResource) config from pki_backends.tf:13,1-64 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_policy.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) config from policies.tf:9,1-51 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_production" (*terraform.NodeRefreshableManagedResource) config from auth_backends.tf:6,1-51 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) config from auth_backends.tf:11,1-70 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_production" (*terraform.NodeRefreshableManagedResource) config from pki_backends.tf:1,1-57 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_staging" (*terraform.NodeRefreshableManagedResource) config from auth_backends.tf:1,1-48 | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodeRefreshableDataResource) config from hcl.Range{Filename:"policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2019/08/04 19:05:59 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) config from pki_backends.tf:20,1-68 | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2019/08/04 19:05:59 [TRACE] ProviderConfigTransformer: attaching to "provider.google" provider configuration from google.tf:1,1-18 | |
2019/08/04 19:05:59 [TRACE] ProviderConfigTransformer: attaching to "provider.google-beta" provider configuration from google.tf:5,1-23 | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2019/08/04 19:05:59 [DEBUG] adding implicit provider configuration provider.vault, implied first by vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_auth_backend.approle_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend_config_ca.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_policy.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_pki_secret_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: vault_auth_backend.approle_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: data.vault_policy_document.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_staging" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_production" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_staging" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_policy.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_production" (*terraform.NodeRefreshableManagedResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] ProviderTransformer: exact match for provider.vault serving data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [DEBUG] ProviderTransformer: "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodeRefreshableDataResource) needs provider.vault | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2019/08/04 19:05:59 [DEBUG] pruning unused provider.google | |
2019/08/04 19:05:59 [DEBUG] pruning unused provider.google-beta | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2019/08/04 19:05:59 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_production | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_staging | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching resource schema to data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:05:59 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [vault_policy.staging_grpc_ssl_example vault_auth_backend.approle_production vault_auth_backend.approle_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging" references: [] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:05:59 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example" references: [data.vault_policy_document.staging_grpc_ssl_example] | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:05:59 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2019/08/04 19:05:59 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResource | |
------ | |
2019/08/04 19:05:59 [DEBUG] Starting graph walk: walkRefresh | |
2019/08/04 19:05:59 [TRACE] dag/walk: updating graph | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_production" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_staging" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_production" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_config_ca.pki_int_staging" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "data.vault_policy_document.staging_grpc_ssl_example" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_role.staging_grpc_ssl_example" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_policy.staging_grpc_ssl_example" waiting on "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:05:59 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_staging" waiting on "provider.vault" | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_production", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_config_ca.pki_int_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "data.vault_policy_document.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_policy.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_production", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_staging", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/08/04 19:05:59 [TRACE] dag/walk: visiting "provider.vault" | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/04 19:05:59 [TRACE] vertex "provider.vault": evaluating | |
2019/08/04 19:05:59 [TRACE] [walkRefresh] Entering eval tree: provider.vault | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019-08-04T19:05:59.705-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:05:59.726-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4] | |
2019-08-04T19:05:59.731-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56611 | |
2019-08-04T19:05:59.731-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 | |
2019-08-04T19:05:59.742-0400 [INFO] plugin.terraform-provider-vault_v2.1.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:05:59.742-0400 | |
2019-08-04T19:05:59.765-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:05:59.765-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin332504038 network=unix timestamp=2019-08-04T19:05:59.764-0400 | |
2019/08/04 19:05:59 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2019/08/04 19:05:59 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:05:59 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:05:59 [TRACE] <root>: eval: *terraform.EvalConfigProvider | |
2019/08/04 19:05:59 [TRACE] buildProviderConfig for provider.vault: no configuration at all | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:05:59 [TRACE] GRPCProvider: Configure | |
2019-08-04T19:06:01.077-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [INFO] Using Vault token with the following policies: root | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: provider.vault | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault": visit complete | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableDataResource) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_auth_backend.approle_production - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production" | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend.pki_int_production - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_auth_backend.approle_production will be refreshed | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_auth_backend.approle_production is still 1; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_pki_secret_backend.pki_int_production will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodeRefreshableDataResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend.pki_int_production is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableDataResourceInstance) | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_auth_backend.approle_staging - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: removing state object for data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:01 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadData | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_auth_backend.approle_staging will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": evaluating | |
2019/08/04 19:06:01 [TRACE] EvalReadData: working on data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_auth_backend.approle_staging is still 1; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_pki_secret_backend.pki_int_staging will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend.pki_int_staging is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] Re-validating config for data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] EvalReadData: data.vault_policy_document.staging_grpc_ssl_example configuration is complete, so reading from provider | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadDataSource | |
2019-08-04T19:06:01.081-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checking if PKI backend exists at "pki_int_staging" | |
2019-08-04T19:06:01.081-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checking if PKI backend exists at "pki_int_production" | |
2019-08-04T19:06:01.082-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Rule is: &vault.PolicyRule{Path:"pki_int_staging/issue/grpc_ssl_example", Description:"Allow cert generation for grpc-ssl-example", MinWrappingTTL:"", MaxWrappingTTL:"", Capabilities:[]string{"create", "update"}, RequiredParameters:[]string(nil), AllowedParameters:map[string][]string(nil), DeniedParameters:map[string][]string(nil)} | |
2019-08-04T19:06:01.082-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Policy HCL is: # Allow cert generation for grpc-ssl-example | |
2019-08-04T19:06:01.082-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: path "pki_int_staging/issue/grpc_ssl_example" { | |
2019-08-04T19:06:01.082-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: capabilities = ["create", "update"] | |
2019-08-04T19:06:01.082-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: } | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalUpdateStateHook | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_policy.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_policy.staging_grpc_ssl_example will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_policy.staging_grpc_ssl_example is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019-08-04T19:06:01.154-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checked if PKI backend exists at "pki_int_staging" | |
2019-08-04T19:06:01.154-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Reading PKI backend mount "pki_int_staging" from Vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_staging": visit complete | |
2019-08-04T19:06:01.189-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checked if PKI backend exists at "pki_int_production" | |
2019-08-04T19:06:01.189-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Reading PKI backend mount "pki_int_production" from Vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_auth_backend.approle_production": visit complete | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role.staging_grpc_ssl_example", instance vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_approle_auth_backend_role.staging_grpc_ssl_example has no existing state to refresh | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:01 [TRACE] GetResourceInstance: vault_auth_backend.approle_staging is a single instance | |
2019/08/04 19:06:01 [TRACE] Re-validating config for "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:01 [WARN] Provider "vault" produced an invalid plan for vault_approle_auth_backend_role.staging_grpc_ssl_example, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool) | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:01 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019-08-04T19:06:01.224-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Read PKI backend mount "pki_int_staging" from Vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": visit complete | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResource) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": expanding dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodeRefreshableManagedResourceInstance | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_pki_secret_backend_role.staging_grpc_ssl_example will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" references: [] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": entering dynamic subgraph | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend_role.staging_grpc_ssl_example is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": starting visit (*terraform.NodeRefreshableManagedResourceInstance) | |
2019/08/04 19:06:01 [TRACE] NodeRefreshableManagedResourceInstance: vault_pki_secret_backend_config_ca.pki_int_staging will be refreshed | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:01 [TRACE] EvalReadState: reading state for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend_config_ca.pki_int_staging is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalRefresh | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: ReadResource | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": visit complete | |
2019-08-04T19:06:01.230-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checking if role "pki_int_staging/roles/grpc_ssl_example" exists | |
2019-08-04T19:06:01.258-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Read PKI backend mount "pki_int_production" from Vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": visit complete | |
2019-08-04T19:06:01.299-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Checked if role "pki_int_staging/roles/grpc_ssl_example" exists | |
2019-08-04T19:06:01.299-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Reading role from "pki_int_staging/roles/grpc_ssl_example" | |
2019-08-04T19:06:01.367-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:01 [DEBUG] Read role from "pki_int_staging/roles/grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:01 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:01 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault (close)": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Entering eval tree: provider.vault (close) | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: Close | |
2019-08-04T19:06:01.373-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56611 | |
2019-08-04T19:06:01.373-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:06:01 [TRACE] [walkRefresh] Exiting eval tree: provider.vault (close) | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault (close)": visit complete | |
2019/08/04 19:06:01 [INFO] backend/local: apply calling Plan | |
2019/08/04 19:06:01 [INFO] terraform: building graph: GraphTypePlan | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/04 19:06:01 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.StateTransformer | |
2019/08/04 19:06:01 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodePlannableResource) config from hcl.Range{Filename:"policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_staging" (*terraform.NodePlannableResource) config from auth_backends.tf:1,1-48 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) config from auth_backends.tf:11,1-70 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_staging" (*terraform.NodePlannableResource) config from pki_backends.tf:7,1-54 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodePlannableResource) config from pki_backends.tf:13,1-64 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_production" (*terraform.NodePlannableResource) config from auth_backends.tf:6,1-51 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_production" (*terraform.NodePlannableResource) config from pki_backends.tf:1,1-57 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) config from pki_backends.tf:20,1-68 | |
2019/08/04 19:06:01 [TRACE] AttachResourceConfigTransformer: attaching to "vault_policy.staging_grpc_ssl_example" (*terraform.NodePlannableResource) config from policies.tf:9,1-51 | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2019/08/04 19:06:01 [TRACE] ProviderConfigTransformer: attaching to "provider.google-beta" provider configuration from google.tf:5,1-23 | |
2019/08/04 19:06:01 [TRACE] ProviderConfigTransformer: attaching to "provider.google" provider configuration from google.tf:1,1-18 | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
------ | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2019/08/04 19:06:01 [DEBUG] adding implicit provider configuration provider.vault, implied first by vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
------ | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_pki_secret_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_policy.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_auth_backend.approle_production is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_pki_secret_backend_config_ca.pki_int_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: data.vault_policy_document.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: vault_auth_backend.approle_staging is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_staging" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_policy.staging_grpc_ssl_example" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_staging" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_production" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_production" (*terraform.NodePlannableResource) needs provider.vault | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2019/08/04 19:06:01 [DEBUG] pruning unused provider.google-beta | |
2019/08/04 19:06:01 [DEBUG] pruning unused provider.google | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2019/08/04 19:06:01 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_production | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_staging | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:01 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example" references: [data.vault_policy_document.staging_grpc_ssl_example] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" references: [vault_pki_secret_backend.pki_int_staging] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging" references: [] | |
2019/08/04 19:06:01 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [vault_policy.staging_grpc_ssl_example vault_auth_backend.approle_production vault_auth_backend.approle_staging] | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "data.vault_policy_document.staging_grpc_ssl_example" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_auth_backend.approle_staging" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_pki_secret_backend.pki_int_staging" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_policy.staging_grpc_ssl_example" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_auth_backend.approle_production" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_pki_secret_backend.pki_int_production" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] ForcedCBDTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" (*terraform.NodePlannableResource) has no CBD descendent, so skipping | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:01 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2019/08/04 19:06:01 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_auth_backend.approle_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResource | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResource | |
------ | |
2019/08/04 19:06:01 [DEBUG] Starting graph walk: walkPlan | |
2019/08/04 19:06:01 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "root" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_policy.staging_grpc_ssl_example" waiting on "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_staging" waiting on "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_role.staging_grpc_ssl_example" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_production" waiting on "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "data.vault_policy_document.staging_grpc_ssl_example" waiting on "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_production" waiting on "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_config_ca.pki_int_staging" waiting on "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_staging" waiting on "provider.vault" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:01 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_staging", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "data.vault_policy_document.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_policy.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_production", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_production", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_config_ca.pki_int_staging", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_staging", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/08/04 19:06:01 [TRACE] dag/walk: visiting "provider.vault" | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/04 19:06:01 [TRACE] vertex "provider.vault": evaluating | |
2019/08/04 19:06:01 [TRACE] [walkPlan] Entering eval tree: provider.vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019-08-04T19:06:01.376-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:06:01.399-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4] | |
2019-08-04T19:06:01.403-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56640 | |
2019-08-04T19:06:01.403-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 | |
2019-08-04T19:06:01.413-0400 [INFO] plugin.terraform-provider-vault_v2.1.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:06:01.413-0400 | |
2019-08-04T19:06:01.434-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:06:01.434-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin031092783 network=unix timestamp=2019-08-04T19:06:01.434-0400 | |
2019/08/04 19:06:01 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2019/08/04 19:06:01 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:01 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:01 [TRACE] <root>: eval: *terraform.EvalConfigProvider | |
2019/08/04 19:06:01 [TRACE] buildProviderConfig for provider.vault: no configuration at all | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:06:01 [TRACE] GRPCProvider: Configure | |
2019-08-04T19:06:02.652-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [INFO] Using Vault token with the following policies: root | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: provider.vault | |
2019/08/04 19:06:02 [TRACE] vertex "provider.vault": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production" | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend.pki_int_staging - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend.pki_int_staging is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend.pki_int_production - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_auth_backend.approle_staging - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging" references: [] | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalIf, early exit err: early exit | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence, early exit err: early exit | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: data.vault_policy_document.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend.pki_int_production is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_auth_backend.approle_production - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production" references: [] | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_pki_secret_backend.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_auth_backend.approle_staging is still 1; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production" | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_policy.staging_grpc_ssl_example - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_auth_backend.approle_production is still 1; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_policy.staging_grpc_ssl_example is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_pki_secret_backend.pki_int_production" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_auth_backend.approle_staging" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019-08-04T19:06:02.658-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_auth_backend.approle_production" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019-08-04T19:06:02.659-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_pki_secret_backend_config_ca.pki_int_staging - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] GetResourceInstance: data.vault_policy_document.staging_grpc_ssl_example is a single instance | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging" references: [] | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019-08-04T19:06:02.659-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_policy.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend_role.staging_grpc_ssl_example is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] UpgradeResourceState: schema version of vault_pki_secret_backend_config_ca.pki_int_staging is still 0; calling provider "vault" for any other minor fixups | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: UpgradeResourceState | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": visit complete | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend.pki_int_production": visit complete | |
2019-08-04T19:06:02.660-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_auth_backend.approle_staging | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_auth_backend.approle_production | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_auth_backend.approle_production": visit complete | |
2019-08-04T19:06:02.660-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_policy.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResource) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": expanding dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodePlannableResourceInstance | |
------ | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.OrphanResourceCountTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.OrphanResourceCountTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:02 [DEBUG] Resource instance state not found for node "vault_approle_auth_backend_role.staging_grpc_ssl_example", instance vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:02 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [] | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:02 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": entering dynamic subgraph | |
2019/08/04 19:06:02 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:02 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodePlannableResourceInstance) | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:02 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_pki_secret_backend_config_ca.pki_int_staging" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:02 [TRACE] GetResourceInstance: vault_auth_backend.approle_staging is a single instance | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalValidateSelfRef | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019-08-04T19:06:02.663-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_pki_secret_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging": visit complete | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:02 [TRACE] Re-validating config for "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: PlanResourceChange | |
2019-08-04T19:06:02.665-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:02 [DEBUG] Instance Diff is nil in SimpleDiff() | |
2019/08/04 19:06:02 [WARN] Provider "vault" produced an invalid plan for vault_approle_auth_backend_role.staging_grpc_ssl_example, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded Create change for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCheckPreventDestroy | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:02 [TRACE] EvalWriteState: writing current state object for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:02 [TRACE] EvalWriteDiff: recorded NoOp change for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": dynamic subgraph completed successfully | |
2019/08/04 19:06:02 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "provider.vault (close)" | |
2019/08/04 19:06:02 [TRACE] vertex "provider.vault (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2019/08/04 19:06:02 [TRACE] vertex "provider.vault (close)": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: provider.vault (close) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCloseProvider | |
2019/08/04 19:06:02 [TRACE] GRPCProvider: Close | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:06:02 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2019/08/04 19:06:02 [TRACE] vertex "meta.count-boundary (EachMode fixup)": evaluating | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (EachMode fixup) | |
2019/08/04 19:06:02 [TRACE] <root>: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (EachMode fixup) | |
2019/08/04 19:06:02 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2019-08-04T19:06:02.668-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56640 | |
2019-08-04T19:06:02.668-0400 [DEBUG] plugin: plugin exited | |
2019/08/04 19:06:02 [TRACE] [walkPlan] Exiting eval tree: provider.vault (close) | |
2019/08/04 19:06:02 [TRACE] vertex "provider.vault (close)": visit complete | |
2019/08/04 19:06:02 [TRACE] dag/walk: visiting "root" | |
2019/08/04 19:06:02 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2019/08/04 19:06:02 [TRACE] vertex "root": visit complete | |
2019/08/04 19:06:02 [DEBUG] command: asking for input: "Do you want to perform these actions in workspace \"vault-config\"?" | |
2019/08/04 19:06:03 [INFO] backend/local: apply calling Apply | |
2019/08/04 19:06:03 [INFO] terraform: building graph: GraphTypeApply | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/04 19:06:03 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.DiffTransformer | |
2019/08/04 19:06:03 [TRACE] DiffTransformer starting | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_pki_secret_backend.pki_int_staging | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_pki_secret_backend.pki_int_production | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_auth_backend.approle_staging | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_auth_backend.approle_production | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_policy.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_pki_secret_backend_config_ca.pki_int_staging | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found Create change for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example will be represented by vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] DiffTransformer: found NoOp change for vault_pki_secret_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] DiffTransformer complete | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.OrphanResourceTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.OrphanResourceTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeApplyableResourceInstance) config from auth_backends.tf:11,1-70 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_staging (prepare state)" (*terraform.NodeApplyableResource) config from pki_backends.tf:7,1-54 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_policy.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) config from policies.tf:9,1-51 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_staging (prepare state)" (*terraform.NodeApplyableResource) config from auth_backends.tf:1,1-48 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_auth_backend.approle_production (prepare state)" (*terraform.NodeApplyableResource) config from auth_backends.tf:6,1-51 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) config from hcl.Range{Filename:"policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend.pki_int_production (prepare state)" (*terraform.NodeApplyableResource) config from pki_backends.tf:1,1-57 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" (*terraform.NodeApplyableResource) config from pki_backends.tf:13,1-64 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) config from pki_backends.tf:20,1-68 | |
2019/08/04 19:06:03 [TRACE] AttachResourceConfigTransformer: attaching to "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) config from auth_backends.tf:11,1-70 | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/04 19:06:03 [DEBUG] Resource state not found for node "vault_approle_auth_backend_role.staging_grpc_ssl_example", instance vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2019/08/04 19:06:03 [TRACE] ProviderConfigTransformer: attaching to "provider.google" provider configuration from google.tf:1,1-18 | |
2019/08/04 19:06:03 [TRACE] ProviderConfigTransformer: attaching to "provider.google-beta" provider configuration from google.tf:5,1-23 | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2019/08/04 19:06:03 [DEBUG] adding implicit provider configuration provider.vault, implied first by vault_pki_secret_backend.pki_int_production (prepare state) | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
------ | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_staging (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_policy.staging_grpc_ssl_example (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_auth_backend.approle_staging (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_auth_backend.approle_production (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_pki_secret_backend.pki_int_production (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: data.vault_policy_document.staging_grpc_ssl_example (prepare state) is provided by provider.vault or inherited equivalent | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_policy.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_policy.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_production (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_production (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving data.vault_policy_document.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_pki_secret_backend.pki_int_staging (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_pki_secret_backend.pki_int_staging (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_staging (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_staging (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_auth_backend.approle_production (prepare state) | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_auth_backend.approle_production (prepare state)" (*terraform.NodeApplyableResource) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] ProviderTransformer: exact match for provider.vault serving vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [DEBUG] ProviderTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" (*terraform.NodeApplyableResourceInstance) needs provider.vault | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.google - *terraform.NodeApplyableProvider | |
provider.google-beta - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2019/08/04 19:06:03 [DEBUG] pruning unused provider.google | |
2019/08/04 19:06:03 [DEBUG] pruning unused provider.google-beta | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2019/08/04 19:06:03 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_staging (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_policy.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_staging (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_auth_backend.approle_production (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.vault | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend.pki_int_production (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [TRACE] AttachSchemaTransformer: attaching resource schema to data.vault_policy_document.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_policy.staging_grpc_ssl_example (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_staging (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_auth_backend.approle_production (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example" references: [vault_policy.staging_grpc_ssl_example (prepare state) vault_auth_backend.approle_production (prepare state) vault_auth_backend.approle_staging (prepare state)] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_staging (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "provider.vault" references: [] | |
2019/08/04 19:06:03 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend.pki_int_production (prepare state)" references: [] | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2019/08/04 19:06:03 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
data.vault_policy_document.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.vault (close) - *terraform.graphNodeCloseProvider | |
vault_approle_auth_backend_role.staging_grpc_ssl_example - *terraform.NodeApplyableResourceInstance | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_auth_backend.approle_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_production (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
vault_policy.staging_grpc_ssl_example (prepare state) - *terraform.NodeApplyableResource | |
provider.vault - *terraform.NodeApplyableProvider | |
------ | |
2019/08/04 19:06:03 [DEBUG] Starting graph walk: walkApply | |
2019/08/04 19:06:03 [TRACE] dag/walk: updating graph | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_auth_backend.approle_production (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "provider.vault (close)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_policy.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend.pki_int_production (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added new vertex: "root" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend.pki_int_production (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_staging (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend.pki_int_production (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_policy.staging_grpc_ssl_example (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "root" waiting on "provider.vault (close)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_staging (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_auth_backend.approle_production (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_approle_auth_backend_role.staging_grpc_ssl_example" waiting on "vault_policy.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_auth_backend.approle_production (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "vault_pki_secret_backend.pki_int_production (prepare state)" waiting on "provider.vault" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:03 [TRACE] dag/walk: added edge: "provider.vault (close)" waiting on "vault_pki_secret_backend.pki_int_staging (prepare state)" | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_staging (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_production (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "data.vault_policy_document.staging_grpc_ssl_example (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_policy.staging_grpc_ssl_example (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_approle_auth_backend_role.staging_grpc_ssl_example", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_auth_backend.approle_production (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend.pki_int_staging (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "provider.vault (close)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: dependencies changed for "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)", sending new deps | |
2019/08/04 19:06:03 [TRACE] dag/walk: visiting "provider.vault" | |
2019/08/04 19:06:03 [TRACE] vertex "provider.vault": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/04 19:06:03 [TRACE] vertex "provider.vault": evaluating | |
2019/08/04 19:06:03 [TRACE] [walkApply] Entering eval tree: provider.vault | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019-08-04T19:06:03.811-0400 [INFO] plugin: configuring client automatic mTLS | |
2019-08-04T19:06:03.836-0400 [DEBUG] plugin: starting plugin: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 args=[/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4] | |
2019-08-04T19:06:03.840-0400 [DEBUG] plugin: plugin started: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56658 | |
2019-08-04T19:06:03.841-0400 [DEBUG] plugin: waiting for RPC address: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 | |
2019-08-04T19:06:03.852-0400 [INFO] plugin.terraform-provider-vault_v2.1.0_x4: configuring server automatic mTLS: timestamp=2019-08-04T19:06:03.851-0400 | |
2019-08-04T19:06:03.873-0400 [DEBUG] plugin: using plugin: version=5 | |
2019-08-04T19:06:03.873-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: plugin address: address=/var/folders/3j/p7z22z_11l3b5xsbbv3s_wz40000gq/T/plugin817852745 network=unix timestamp=2019-08-04T19:06:03.873-0400 | |
2019/08/04 19:06:03 [TRACE] BuiltinEvalContext: Initialized "vault" provider for provider.vault | |
2019/08/04 19:06:03 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:03 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:03 [TRACE] <root>: eval: *terraform.EvalConfigProvider | |
2019/08/04 19:06:03 [TRACE] buildProviderConfig for provider.vault: no configuration at all | |
2019/08/04 19:06:03 [TRACE] GRPCProvider: GetSchema | |
2019/08/04 19:06:03 [TRACE] GRPCProvider: Configure | |
2019-08-04T19:06:05.013-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:05 [INFO] Using Vault token with the following policies: root | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: provider.vault | |
2019/08/04 19:06:05 [TRACE] vertex "provider.vault": visit complete | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_auth_backend.approle_staging (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_staging (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)" | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_auth_backend.approle_production (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "data.vault_policy_document.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_production (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_pki_secret_backend_config_ca.pki_int_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_production (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_config_ca.pki_int_staging (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_staging (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_auth_backend.approle_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_auth_backend.approle_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_staging (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_production (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_production (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_pki_secret_backend.pki_int_staging (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_pki_secret_backend.pki_int_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_pki_secret_backend.pki_int_staging (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_staging (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_policy.staging_grpc_ssl_example (prepare state)" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_policy.staging_grpc_ssl_example (prepare state)": starting visit (*terraform.NodeApplyableResource) | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: data.vault_policy_document.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] vertex "vault_policy.staging_grpc_ssl_example (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: data.vault_policy_document.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_policy.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_production (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] vertex "data.vault_policy_document.staging_grpc_ssl_example (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_pki_secret_backend.pki_int_production (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)": evaluating | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend_role.staging_grpc_ssl_example (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_auth_backend.approle_production (prepare state) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_auth_backend.approle_production (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_auth_backend.approle_production (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteResourceState | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_pki_secret_backend.pki_int_production (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_pki_secret_backend.pki_int_production (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_policy.staging_grpc_ssl_example (prepare state) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_policy.staging_grpc_ssl_example (prepare state)": visit complete | |
2019/08/04 19:06:05 [TRACE] dag/walk: visiting "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": starting visit (*terraform.NodeApplyableResourceInstance) | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": evaluating | |
2019/08/04 19:06:05 [TRACE] [walkApply] Entering eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2019/08/04 19:06:05 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:05 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:05 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalReadDiff | |
2019/08/04 19:06:05 [TRACE] EvalReadDiff: Read Create change from plan for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalDiff | |
2019/08/04 19:06:05 [TRACE] GetResourceInstance: vault_auth_backend.approle_staging is a single instance | |
2019/08/04 19:06:05 [TRACE] Re-validating config for "vault_approle_auth_backend_role.staging_grpc_ssl_example" | |
2019/08/04 19:06:05 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/04 19:06:05 [TRACE] GRPCProvider: PlanResourceChange | |
2019/08/04 19:06:05 [WARN] Provider "vault" produced an invalid plan for vault_approle_auth_backend_role.staging_grpc_ssl_example, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .bind_secret_id: planned value cty.True does not match config value cty.NullVal(cty.Bool) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalCheckPlannedChange | |
2019/08/04 19:06:05 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Create) matches planned change (action Create) | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalReadState | |
2019/08/04 19:06:05 [TRACE] EvalReadState: reading state for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] EvalReadState: no state present for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalReduceDiff | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:05 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalApplyPre | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalApply | |
2019/08/04 19:06:05 [TRACE] GetResourceInstance: vault_auth_backend.approle_staging is a single instance | |
2019/08/04 19:06:05 [DEBUG] vault_approle_auth_backend_role.staging_grpc_ssl_example: applying the planned Create change | |
2019/08/04 19:06:05 [TRACE] GRPCProvider: ApplyResourceChange | |
2019-08-04T19:06:05.020-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:05 [DEBUG] Writing AppRole auth backend role "auth/approle_staging/role/grpc_ssl_example" | |
2019-08-04T19:06:05.275-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:05 [DEBUG] Wrote AppRole auth backend role "auth/approle_staging/role/grpc_ssl_example" | |
2019-08-04T19:06:05.275-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:05 [DEBUG] Reading AppRole auth backend role "auth/approle_staging/role/grpc_ssl_example" | |
2019-08-04T19:06:05.366-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: 2019/08/04 19:06:05 [DEBUG] Read AppRole auth backend role "auth/approle_staging/role/grpc_ssl_example" | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: panic: interface conversion: interface {} is nil, not json.Number | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: goroutine 10 [running]: | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vault.approleAuthBackendRoleRead(0xc0001ee7e0, 0x1eb1bc0, 0xc000484700, 0x1cc2180, 0x2c5fb20) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vault/resource_approle_auth_backend_role.go:254 +0x1f8c | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vault.approleAuthBackendRoleCreate(0xc0001ee7e0, 0x1eb1bc0, 0xc000484700, 0x2, 0x2c5fb20) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vault/resource_approle_auth_backend_role.go:181 +0xc15 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc00015c600, 0xc000644320, 0xc0002bd0a0, 0x1eb1bc0, 0xc000484700, 0xc0005bef01, 0xc0005ac580, 0x1d2a9e0) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:286 +0x3b4 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc00033f700, 0xc00009fa30, 0xc000644320, 0xc0002bd0a0, 0xc0005ac568, 0xc00021a018, 0x1d2cae0) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:285 +0x18f | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/plugin.(*GRPCProviderServer).ApplyResourceChange(0xc00000e210, 0x21772e0, 0xc0002aab40, 0xc00056c660, 0xc00000e210, 0xc0002aab40, 0xc0004e8ba8) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/plugin/grpc_provider.go:851 +0x894 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/internal/tfplugin5._Provider_ApplyResourceChange_Handler(0x1e8d680, 0xc00000e210, 0x21772e0, 0xc0002aab40, 0xc000644050, 0x0, 0x21772e0, 0xc0002aab40, 0xc000462000, 0x21d) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/internal/tfplugin5/tfplugin5.pb.go:3217 +0x23e | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).processUnaryRPC(0xc000001500, 0x2183fe0, 0xc000552c00, 0xc000191f00, 0xc0003e6990, 0x2c345a0, 0x0, 0x0, 0x0) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:972 +0x470 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).handleStream(0xc000001500, 0x2183fe0, 0xc000552c00, 0xc000191f00, 0x0) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:1252 +0xda6 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc000036090, 0xc000001500, 0x2183fe0, 0xc000552c00, 0xc000191f00) | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:691 +0x9f | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: created by github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).serveStreams.func1 | |
2019-08-04T19:06:05.369-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:689 +0xa1 | |
2019/08/04 19:06:05 [DEBUG] vault_approle_auth_backend_role.staging_grpc_ssl_example: apply errored, but we're indicating that via the Error pointer rather than returning it: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/08/04 19:06:05 [TRACE] EvalMaybeTainted: vault_approle_auth_backend_role.staging_grpc_ssl_example encountered an error during creation, so it is now marked as tainted | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:05 [TRACE] EvalWriteState: removing state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners | |
2019/08/04 19:06:05 [TRACE] EvalApplyProvisioners: vault_approle_auth_backend_role.staging_grpc_ssl_example has no state, so skipping provisioners | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/08/04 19:06:05 [TRACE] EvalMaybeTainted: vault_approle_auth_backend_role.staging_grpc_ssl_example encountered an error during creation, so it is now marked as tainted | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 19:06:05 [TRACE] EvalWriteState: removing state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 19:06:05 [TRACE] <root>: eval: *terraform.EvalApplyPost | |
2019/08/04 19:06:05 [ERROR] <root>: eval: *terraform.EvalApplyPost, err: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 19:06:05 [ERROR] <root>: eval: *terraform.EvalSequence, err: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 19:06:05 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 19:06:05 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019/08/04 19:06:05 [TRACE] dag/walk: upstream of "meta.count-boundary (EachMode fixup)" errored, so skipping | |
2019/08/04 19:06:05 [TRACE] dag/walk: upstream of "provider.vault (close)" errored, so skipping | |
2019/08/04 19:06:05 [TRACE] dag/walk: upstream of "root" errored, so skipping | |
2019-08-04T19:06:05.371-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=56658 error="exit status 2" | |
2019-08-04T19:06:05.585-0400 [DEBUG] plugin: plugin exited |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment