Created
December 22, 2021 04:59
-
-
Save tristanmorgan/e70d689e13b95bd331fada678c2376f8 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ TF_LOG=debug terraform apply -auto-approve -no-color | |
2021-12-22T15:49:42.089+1100 [INFO] Terraform version: 1.1.2 | |
2021-12-22T15:49:42.089+1100 [INFO] Go runtime version: go1.17.2 | |
2021-12-22T15:49:42.089+1100 [INFO] CLI args: []string{"terraform", "apply", "-auto-approve", "-no-color"} | |
2021-12-22T15:49:42.089+1100 [DEBUG] Attempting to open CLI config file: /Users/tristanmorgan/.terraformrc | |
2021-12-22T15:49:42.089+1100 [INFO] Loading CLI configuration from /Users/tristanmorgan/.terraformrc | |
2021-12-22T15:49:42.090+1100 [DEBUG] checking for credentials in "/Users/tristanmorgan/.terraform.d/plugins" | |
2021-12-22T15:49:42.090+1100 [DEBUG] found credentials "terraform-credentials-keychain_v1.0.0" | |
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2021-12-22T15:49:42.090+1100 [DEBUG] will search for provider plugins in /Users/tristanmorgan/.terraform.d/plugins | |
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory /Users/tristanmorgan/Library/Application Support/io.terraform/plugins | |
2021-12-22T15:49:42.090+1100 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2021-12-22T15:49:42.090+1100 [INFO] Checkpoint disabled. Not running. | |
2021-12-22T15:49:42.090+1100 [INFO] CLI command args: []string{"apply", "-auto-approve", "-no-color"} | |
2021-12-22T15:49:42.091+1100 [DEBUG] New state was assigned lineage "4a1fbb4c-b09c-c6dd-54f7-acc52c412593" | |
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "." | |
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "/Users/tristanmorgan/bin" | |
2021-12-22T15:49:42.110+1100 [DEBUG] checking for provisioner in "/Users/tristanmorgan/.terraform.d/plugins" | |
2021-12-22T15:49:42.111+1100 [INFO] backend/local: starting Apply operation | |
2021-12-22T15:49:42.111+1100 [DEBUG] created provider logger: level=debug | |
2021-12-22T15:49:42.111+1100 [INFO] provider: configuring client automatic mTLS | |
2021-12-22T15:49:42.120+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4] | |
2021-12-22T15:49:42.121+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26378 | |
2021-12-22T15:49:42.121+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 | |
2021-12-22T15:49:42.135+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.135+1100 | |
2021-12-22T15:49:42.157+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: network=unix address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin273300169 timestamp=2021-12-22T15:49:42.157+1100 | |
2021-12-22T15:49:42.158+1100 [DEBUG] provider: using plugin: version=5 | |
2021-12-22T15:49:42.181+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-12-22T15:49:42.181+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26378 | |
2021-12-22T15:49:42.182+1100 [DEBUG] provider: plugin exited | |
2021-12-22T15:49:42.182+1100 [DEBUG] Building and walking validate graph | |
2021-12-22T15:49:42.182+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_policy.admin | |
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_policy.admin" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: [data.vault_policy_document.admin] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: [] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: [vault_policy.admin] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: [vault_identity_group.company_engineers vault_github_auth_backend.github] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin" references: [] | |
2021-12-22T15:49:42.182+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: [] | |
2021-12-22T15:49:42.182+1100 [DEBUG] Starting graph walk: walkValidate | |
2021-12-22T15:49:42.182+1100 [DEBUG] created provider logger: level=debug | |
2021-12-22T15:49:42.183+1100 [INFO] provider: configuring client automatic mTLS | |
2021-12-22T15:49:42.189+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4] | |
2021-12-22T15:49:42.191+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26379 | |
2021-12-22T15:49:42.191+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 | |
2021-12-22T15:49:42.204+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.203+1100 | |
2021-12-22T15:49:42.225+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin980510646 network=unix timestamp=2021-12-22T15:49:42.225+1100 | |
2021-12-22T15:49:42.225+1100 [DEBUG] provider: using plugin: version=5 | |
2021-12-22T15:49:42.250+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-12-22T15:49:42.251+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26379 | |
2021-12-22T15:49:42.251+1100 [DEBUG] provider: plugin exited | |
2021-12-22T15:49:42.251+1100 [INFO] backend/local: apply calling Plan | |
2021-12-22T15:49:42.251+1100 [DEBUG] Building and walking plan graph for NormalMode | |
2021-12-22T15:49:42.251+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_identity_group.company_engineers (expand) | |
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_policy.admin (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers (expand)" references: [vault_policy.admin (expand)] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers (expand)" references: [vault_identity_group.company_engineers (expand) vault_github_auth_backend.github (expand)] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin (expand)" references: [data.vault_policy_document.admin (expand)] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github (expand)" references: [] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin (expand)" references: [] | |
2021-12-22T15:49:42.251+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: [] | |
2021-12-22T15:49:42.251+1100 [DEBUG] Starting graph walk: walkPlan | |
2021-12-22T15:49:42.251+1100 [DEBUG] created provider logger: level=debug | |
2021-12-22T15:49:42.252+1100 [INFO] provider: configuring client automatic mTLS | |
2021-12-22T15:49:42.258+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4] | |
2021-12-22T15:49:42.260+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26380 | |
2021-12-22T15:49:42.260+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 | |
2021-12-22T15:49:42.273+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.273+1100 | |
2021-12-22T15:49:42.294+1100 [DEBUG] provider: using plugin: version=5 | |
2021-12-22T15:49:42.294+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin126397059 network=unix timestamp=2021-12-22T15:49:42.294+1100 | |
2021-12-22T15:49:42.321+1100 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/vault\"]" changed the config value, but that value is unused | |
2021-12-22T15:49:42.348+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/auth/token/lookup-self HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:805ea53c924845278d3defb42d8105ac353472f4ff8b5eb3ca1d92b41deaa0b2 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.348+1100 | |
2021-12-22T15:49:42.349+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 461 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:42 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.349+1100 | |
2021-12-22T15:49:42.349+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
POST /v1/auth/token/create HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 128 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:7e64bc8d6d677cf37c876915f7944f5a5fbe6dd693eae374dd2be7233ea88549 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.349+1100 | |
2021-12-22T15:49:42.648+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 396 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:42 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.648+1100 | |
2021-12-22T15:49:42.648+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [INFO] Using Vault token with the following policies: root: timestamp=2021-12-22T15:49:42.648+1100 | |
2021-12-22T15:49:42.649+1100 [DEBUG] Resource instance state not found for node "vault_github_auth_backend.github", instance vault_github_auth_backend.github | |
2021-12-22T15:49:42.650+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: [] | |
2021-12-22T15:49:42.650+1100 [DEBUG] Resource instance state not found for node "data.vault_policy_document.admin", instance data.vault_policy_document.admin | |
2021-12-22T15:49:42.650+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin" references: [] | |
2021-12-22T15:49:42.650+1100 [DEBUG] refresh: vault_github_auth_backend.github: no state, so not refreshing | |
2021-12-22T15:49:42.653+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Rule is: &vault.PolicyRule{Path:"*", Description:"", MinWrappingTTL:"", MaxWrappingTTL:"", Capabilities:[]string{"create", "read", "update", "delete", "list", "sudo"}, RequiredParameters:[]string(nil), AllowedParameters:map[string][]string(nil), DeniedParameters:map[string][]string(nil)}: timestamp=2021-12-22T15:49:42.653+1100 | |
2021-12-22T15:49:42.653+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Policy HCL is: path "*" { | |
capabilities = ["create", "read", "update", "delete", "list", "sudo"] | |
}: timestamp=2021-12-22T15:49:42.653+1100 | |
2021-12-22T15:49:42.654+1100 [DEBUG] Resource instance state not found for node "vault_policy.admin", instance vault_policy.admin | |
2021-12-22T15:49:42.654+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: [] | |
2021-12-22T15:49:42.654+1100 [DEBUG] refresh: vault_policy.admin: no state, so not refreshing | |
2021-12-22T15:49:42.656+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_type: planned value cty.StringVal("default") for a non-computed attribute | |
- .tune: planned value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.ListValEmpty(cty.String), "audit_non_hmac_request_keys":cty.ListValEmpty(cty.String), "audit_non_hmac_response_keys":cty.ListValEmpty(cty.String), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.StringVal(""), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.ListValEmpty(cty.String), "token_type":cty.StringVal("default-service")})}) does not match config value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_request_keys":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_response_keys":cty.NullVal(cty.List(cty.String)), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.NullVal(cty.String), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.NullVal(cty.List(cty.String)), "token_type":cty.StringVal("default-service")})}) | |
2021-12-22T15:49:42.657+1100 [DEBUG] Resource instance state not found for node "vault_identity_group.company_engineers", instance vault_identity_group.company_engineers | |
2021-12-22T15:49:42.657+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: [] | |
2021-12-22T15:49:42.657+1100 [DEBUG] refresh: vault_identity_group.company_engineers: no state, so not refreshing | |
2021-12-22T15:49:42.659+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_identity_group.company_engineers, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .external_member_entity_ids: planned value cty.False for a non-computed attribute | |
- .external_policies: planned value cty.False for a non-computed attribute | |
2021-12-22T15:49:42.660+1100 [DEBUG] Resource instance state not found for node "vault_identity_group_alias.company_engineers", instance vault_identity_group_alias.company_engineers | |
2021-12-22T15:49:42.660+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: [] | |
2021-12-22T15:49:42.660+1100 [DEBUG] refresh: vault_identity_group_alias.company_engineers: no state, so not refreshing | |
2021-12-22T15:49:42.662+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-12-22T15:49:42.664+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26380 | |
2021-12-22T15:49:42.664+1100 [DEBUG] provider: plugin exited | |
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated | |
with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
# vault_github_auth_backend.github will be created | |
+ resource "vault_github_auth_backend" "github" { | |
+ accessor = (known after apply) | |
+ description = "Authenticate using GitHub" | |
+ id = (known after apply) | |
+ organization = "company" | |
+ path = "github" | |
+ token_policies = [ | |
+ "default", | |
] | |
+ token_type = "default" | |
+ tune = [ | |
+ { | |
+ allowed_response_headers = [] | |
+ audit_non_hmac_request_keys = [] | |
+ audit_non_hmac_response_keys = [] | |
+ default_lease_ttl = "1h" | |
+ listing_visibility = "" | |
+ max_lease_ttl = "2h" | |
+ passthrough_request_headers = [] | |
+ token_type = "default-service" | |
}, | |
] | |
} | |
# vault_identity_group.company_engineers will be created | |
+ resource "vault_identity_group" "company_engineers" { | |
+ external_member_entity_ids = false | |
+ external_policies = false | |
+ id = (known after apply) | |
+ name = "company-engineers" | |
+ policies = [ | |
+ "admin", | |
] | |
+ type = "external" | |
} | |
# vault_identity_group_alias.company_engineers will be created | |
+ resource "vault_identity_group_alias" "company_engineers" { | |
+ canonical_id = (known after apply) | |
+ id = (known after apply) | |
+ mount_accessor = (known after apply) | |
+ name = "company-engineers" | |
} | |
# vault_policy.admin will be created | |
+ resource "vault_policy" "admin" { | |
+ id = (known after apply) | |
+ name = "admin" | |
+ policy = <<-EOT | |
path "*" { | |
capabilities = ["create", "read", "update", "delete", "list", "sudo"] | |
} | |
EOT | |
} | |
Plan: 4 to add, 0 to change, 0 to destroy. | |
2021-12-22T15:49:42.665+1100 [INFO] backend/local: apply calling Apply | |
2021-12-22T15:49:42.665+1100 [DEBUG] Building and walking apply graph for NormalMode plan | |
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_github_auth_backend.github", instance vault_github_auth_backend.github | |
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_identity_group_alias.company_engineers", instance vault_identity_group_alias.company_engineers | |
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_policy.admin", instance vault_policy.admin | |
2021-12-22T15:49:42.665+1100 [DEBUG] Resource state not found for node "vault_identity_group.company_engineers", instance vault_identity_group.company_engineers | |
2021-12-22T15:49:42.666+1100 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/vault"], implied first by vault_github_auth_backend.github | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_policy.admin (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group.company_engineers (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_github_auth_backend.github" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_identity_group_alias.company_engineers" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "data.vault_policy_document.admin (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ProviderTransformer: "vault_policy.admin" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github" references: [] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers" references: [vault_identity_group.company_engineers vault_identity_group.company_engineers vault_identity_group.company_engineers (expand) vault_github_auth_backend.github vault_github_auth_backend.github vault_github_auth_backend.github (expand)] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/vault\"]" references: [] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group_alias.company_engineers (expand)" references: [] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "data.vault_policy_document.admin (expand)" references: [] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin" references: [data.vault_policy_document.admin (expand)] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers" references: [vault_policy.admin vault_policy.admin vault_policy.admin (expand)] | |
2021-12-22T15:49:42.666+1100 [DEBUG] ReferenceTransformer: "vault_policy.admin (expand)" references: [] | |
2021-12-22T15:49:42.667+1100 [DEBUG] ReferenceTransformer: "vault_github_auth_backend.github (expand)" references: [] | |
2021-12-22T15:49:42.667+1100 [DEBUG] ReferenceTransformer: "vault_identity_group.company_engineers (expand)" references: [] | |
2021-12-22T15:49:42.667+1100 [DEBUG] Starting graph walk: walkApply | |
2021-12-22T15:49:42.668+1100 [DEBUG] created provider logger: level=debug | |
2021-12-22T15:49:42.668+1100 [INFO] provider: configuring client automatic mTLS | |
2021-12-22T15:49:42.684+1100 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 args=[.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4] | |
2021-12-22T15:49:42.687+1100 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26384 | |
2021-12-22T15:49:42.688+1100 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 | |
2021-12-22T15:49:42.708+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: configuring server automatic mTLS: timestamp=2021-12-22T15:49:42.708+1100 | |
2021-12-22T15:49:42.735+1100 [DEBUG] provider.terraform-provider-vault_v3.1.0_x4: plugin address: address=/var/folders/90/xk6_568966zfxhrww0rdhl2c0000gp/T/plugin871131135 network=unix timestamp=2021-12-22T15:49:42.735+1100 | |
2021-12-22T15:49:42.735+1100 [DEBUG] provider: using plugin: version=5 | |
2021-12-22T15:49:42.762+1100 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/vault\"]" changed the config value, but that value is unused | |
2021-12-22T15:49:42.791+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/auth/token/lookup-self HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:ccdc36d445f20703bd955a5a10b28db922e3ca6e6dcae9eeb74b05ba594cbe2b | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.791+1100 | |
2021-12-22T15:49:42.791+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 461 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:42 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.791+1100 | |
2021-12-22T15:49:42.792+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:42 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
POST /v1/auth/token/create HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 128 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:b3aa0e2f9b734e66f57b58b668a80ed1207e62c22dc041b4b51b7b6b4442cd9b | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:42.792+1100 | |
2021-12-22T15:49:43.087+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 396 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.087+1100 | |
2021-12-22T15:49:43.087+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Using Vault token with the following policies: root: timestamp=2021-12-22T15:49:43.087+1100 | |
vault_policy.admin: Creating... | |
2021-12-22T15:49:43.092+1100 [INFO] Starting apply for vault_policy.admin | |
2021-12-22T15:49:43.092+1100 [DEBUG] vault_policy.admin: applying the planned Create change | |
2021-12-22T15:49:43.093+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing policy admin to Vault: timestamp=2021-12-22T15:49:43.093+1100 | |
2021-12-22T15:49:43.093+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_type: planned value cty.StringVal("default") for a non-computed attribute | |
- .tune: planned value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.ListValEmpty(cty.String), "audit_non_hmac_request_keys":cty.ListValEmpty(cty.String), "audit_non_hmac_response_keys":cty.ListValEmpty(cty.String), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.StringVal(""), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.ListValEmpty(cty.String), "token_type":cty.StringVal("default-service")})}) does not match config value cty.SetVal([]cty.Value{cty.ObjectVal(map[string]cty.Value{"allowed_response_headers":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_request_keys":cty.NullVal(cty.List(cty.String)), "audit_non_hmac_response_keys":cty.NullVal(cty.List(cty.String)), "default_lease_ttl":cty.StringVal("1h"), "listing_visibility":cty.NullVal(cty.String), "max_lease_ttl":cty.StringVal("2h"), "passthrough_request_headers":cty.NullVal(cty.List(cty.String)), "token_type":cty.StringVal("default-service")})}) | |
2021-12-22T15:49:43.093+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
PUT /v1/sys/policies/acl/admin HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 115 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:efb465745bcb8a48e53a5300dca39527ae58e8969b2e5b29c4dc23952984d6a6 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.093+1100 | |
vault_github_auth_backend.github: Creating... | |
2021-12-22T15:49:43.093+1100 [INFO] Starting apply for vault_github_auth_backend.github | |
2021-12-22T15:49:43.093+1100 [DEBUG] vault_github_auth_backend.github: applying the planned Create change | |
2021-12-22T15:49:43.095+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Enabling github auth backend at 'github': timestamp=2021-12-22T15:49:43.095+1100 | |
2021-12-22T15:49:43.095+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
POST /v1/sys/auth/github HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 229 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:ca3d078ce9827161ebf186dd994e0c0686702321e668e47ddf3fffad0f228733 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.095+1100 | |
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 204 No Content | |
Content-Length: 0 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.205+1100 | |
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Enabled github auth backend at 'github': timestamp=2021-12-22T15:49:43.205+1100 | |
2021-12-22T15:49:43.205+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 204 No Content | |
Content-Length: 0 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.205+1100 | |
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing github auth config to '"auth/github/config"': timestamp=2021-12-22T15:49:43.206+1100 | |
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/sys/policies/acl/admin HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:2506faa995b486e31a2a3ee32e3b2a10a357caf66bdfff113066b2c275bea050 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.206+1100 | |
2021-12-22T15:49:43.206+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
PUT /v1/auth/github/config HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 78 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:eae8387a9502f59d83d1003e5222a642fdbfa05cdb80caa8e11cc2f4b4817d7a | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.206+1100 | |
2021-12-22T15:49:43.207+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 288 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.207+1100 | |
vault_policy.admin: Creation complete after 0s [id=admin] | |
2021-12-22T15:49:43.284+1100 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_identity_group.company_engineers, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .external_policies: planned value cty.False for a non-computed attribute | |
- .external_member_entity_ids: planned value cty.False for a non-computed attribute | |
vault_identity_group.company_engineers: Creating... | |
2021-12-22T15:49:43.284+1100 [INFO] Starting apply for vault_identity_group.company_engineers | |
2021-12-22T15:49:43.285+1100 [DEBUG] vault_identity_group.company_engineers: applying the planned Create change | |
2021-12-22T15:49:43.286+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
PUT /v1/identity/group HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 67 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:641eb7259270526022f68597af3e1859a4858776d1a96fdab25c195933cfbafa | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.286+1100 | |
2021-12-22T15:49:43.298+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 204 No Content | |
Content-Length: 0 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.298+1100 | |
2021-12-22T15:49:43.298+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Github auth config successfully written to '"auth/github/config"': timestamp=2021-12-22T15:49:43.298+1100 | |
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Github Auth '"github"' tune configuration changed: timestamp=2021-12-22T15:49:43.299+1100 | |
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Writing github auth tune to '"auth/github"': timestamp=2021-12-22T15:49:43.299+1100 | |
2021-12-22T15:49:43.299+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
POST /v1/sys/mounts/auth/github/tune HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 254 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:501dd0c0e8ee2cab02d0cba5ad5b3457829ca1a2d46c0056e8cff4936466adab | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.299+1100 | |
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 230 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.390+1100 | |
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Wrote IdentityGroup "company-engineers": timestamp=2021-12-22T15:49:43.391+1100 | |
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading IdentityGroup f62ebd4f-6089-ae64-9137-5762266f31b0 from "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0": timestamp=2021-12-22T15:49:43.391+1100 | |
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading Entity from "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0": timestamp=2021-12-22T15:49:43.391+1100 | |
2021-12-22T15:49:43.391+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0 HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.391+1100 | |
2021-12-22T15:49:43.409+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 400 Bad Request | |
Content-Length: 36 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.409+1100 | |
2021-12-22T15:49:43.444+1100 [ERROR] vertex "vault_identity_group.company_engineers" error: error reading IdentityGroup "f62ebd4f-6089-ae64-9137-5762266f31b0": failed reading "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0" | |
2021-12-22T15:49:43.812+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 204 No Content | |
Content-Length: 0 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.812+1100 | |
2021-12-22T15:49:43.812+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Written github auth tune to '"auth/github"': timestamp=2021-12-22T15:49:43.812+1100 | |
2021-12-22T15:49:43.813+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
POST /v1/sys/mounts/auth/github/tune HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
Content-Length: 123 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:6d71bc7f934febbdb09dcbce61d920f0babe73efbff556bc90338786916f70db | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.813+1100 | |
2021-12-22T15:49:43.888+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 204 No Content | |
Content-Length: 0 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.888+1100 | |
2021-12-22T15:49:43.888+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth mount from '"auth/github"': timestamp=2021-12-22T15:49:43.888+1100 | |
2021-12-22T15:49:43.889+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/sys/auth HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:9472c3b702c70063bcbecb42c932727c63d1b6fa6f3c2576cca5ba898502e8bf | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.888+1100 | |
2021-12-22T15:49:43.890+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Transfer-Encoding: chunked | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.890+1100 | |
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Read github auth mount from '"auth/github"': timestamp=2021-12-22T15:49:43.891+1100 | |
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth config from '"auth/github/config"': timestamp=2021-12-22T15:49:43.891+1100 | |
2021-12-22T15:49:43.891+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/auth/github/config HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:b21603df0610ecd15ec671f62e07724900c327ef3ec8ab0cad91e2dd082ca5e5 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.891+1100 | |
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 400 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.892+1100 | |
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [INFO] Read github auth config from '"auth/github/config"': timestamp=2021-12-22T15:49:43.892+1100 | |
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Reading github auth tune from '"auth/github"/tune': timestamp=2021-12-22T15:49:43.892+1100 | |
2021-12-22T15:49:43.892+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Request Details: | |
---[ REQUEST ]--------------------------------------- | |
GET /v1/sys/mounts/auth/github/tune HTTP/1.1 | |
Host: 10.10.10.132:8200 | |
User-Agent: Go-http-client/1.1 | |
X-Vault-Request: true | |
X-Vault-Token: hmac-sha256:78f3ea0c6a2617a92335cc5e4f3474807ab0db3ac587afe8bedbddf2efa08491 | |
Accept-Encoding: gzip | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.892+1100 | |
2021-12-22T15:49:43.893+1100 [INFO] provider.terraform-provider-vault_v3.1.0_x4: 2021/12/22 15:49:43 [DEBUG] Vault API Response Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Content-Length: 719 | |
Cache-Control: no-store | |
Content-Type: application/json | |
Date: Wed, 22 Dec 2021 04:49:43 GMT | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
-----------------------------------------------------: timestamp=2021-12-22T15:49:43.893+1100 | |
2021-12-22T15:49:43.895+1100 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/vault\"]" produced an unexpected new value for vault_github_auth_backend.github, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .token_max_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_num_uses: was null, but now cty.NumberIntVal(0) | |
- .base_url: was null, but now cty.StringVal("") | |
- .token_explicit_max_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_no_default_policy: was null, but now cty.False | |
- .token_ttl: was null, but now cty.NumberIntVal(0) | |
- .token_period: was null, but now cty.NumberIntVal(0) | |
vault_github_auth_backend.github: Creation complete after 1s [id=github] | |
Error: error reading IdentityGroup "f62ebd4f-6089-ae64-9137-5762266f31b0": failed reading "/identity/group/id/f62ebd4f-6089-ae64-9137-5762266f31b0" | |
with vault_identity_group.company_engineers, | |
on auth_github.tf line 27, in resource "vault_identity_group" "company_engineers": | |
27: resource "vault_identity_group" "company_engineers" { | |
2021-12-22T15:49:43.936+1100 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-12-22T15:49:43.937+1100 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/vault/3.1.0/darwin_arm64/terraform-provider-vault_v3.1.0_x4 pid=26384 | |
2021-12-22T15:49:43.937+1100 [DEBUG] provider: plugin exited | |
Wed Dec 22 15:49:43 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment