Created
December 21, 2017 12:37
-
-
Save grahamlyons/fb8dd4664a1769f6cc008ff6d252e1f9 to your computer and use it in GitHub Desktop.
Lambda VPC Panic
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2017/12/21 12:35:40 [INFO] Terraform version: 0.11.1 a42fdb08a43c7fabb8898fe8c286b793bbaa4835+CHANGES | |
2017/12/21 12:35:40 [INFO] Go runtime version: go1.9 | |
2017/12/21 12:35:40 [INFO] CLI args: []string{"/bin/terraform", "apply", "-auto-approve"} | |
2017/12/21 12:35:40 [DEBUG] Attempting to open CLI config file: /root/.terraformrc | |
2017/12/21 12:35:40 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2017/12/21 12:35:40 [INFO] CLI command args: []string{"apply", "-auto-approve"} | |
2017/12/21 12:35:40 [INFO] command: empty terraform config, returning nil | |
2017/12/21 12:35:40 [DEBUG] command: no data state file found for backend config | |
2017/12/21 12:35:40 [DEBUG] New state was assigned lineage "eccad70b-25a5-464c-ae79-fcc8e0f8ff7d" | |
2017/12/21 12:35:40 [INFO] command: backend initialized: <nil> | |
2017/12/21 12:35:40 [DEBUG] checking for provider in "." | |
2017/12/21 12:35:40 [DEBUG] checking for provider in "/bin" | |
2017/12/21 12:35:40 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" | |
2017/12/21 12:35:40 [DEBUG] found provider "terraform-provider-aws_v1.6.0_x4" | |
2017/12/21 12:35:40 [DEBUG] found valid plugin: "aws" | |
2017/12/21 12:35:40 [DEBUG] checking for provisioner in "." | |
2017/12/21 12:35:40 [DEBUG] checking for provisioner in "/bin" | |
2017/12/21 12:35:40 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" | |
2017/12/21 12:35:40 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2017/12/21 12:35:40 [INFO] backend/local: starting Apply operation | |
2017/12/21 12:35:40 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:40 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:41 [INFO] terraform: building graph: GraphTypeInput | |
2017/12/21 12:35:41 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc4203a9d50), RawConfig:(*config.RawConfig)(0xc4203a9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc4203a9e30), RawConfig:(*config.RawConfig)(0xc4203a9dc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc4203a9f10), RawConfig:(*config.RawConfig)(0xc4203a9ea0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc420402000), RawConfig:(*config.RawConfig)(0xc4203a9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c230), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc42044c1e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc42044c2d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c280), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:41 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:41 [DEBUG] Starting graph walk: walkInput | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkInput] Entering eval tree: provider.aws | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017-12-21T12:35:41.546Z [DEBUG] plugin: starting plugin: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 args=[/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4] | |
2017-12-21T12:35:41.549Z [DEBUG] plugin: waiting for RPC address: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 | |
2017-12-21T12:35:41.648Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: plugin address: timestamp=2017-12-21T12:35:41.645Z address=/tmp/plugin717374677 network=unix | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInputProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] [walkInput] Exiting eval tree: provider.aws | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkInput] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:41 [TRACE] [walkInput] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.root': walking | |
2017/12/21 12:35:41 [INFO] terraform: building graph: GraphTypeValidate | |
2017/12/21 12:35:41 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc4203a9d50), RawConfig:(*config.RawConfig)(0xc4203a9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc4203a9e30), RawConfig:(*config.RawConfig)(0xc4203a9dc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc4203a9f10), RawConfig:(*config.RawConfig)(0xc4203a9ea0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc420402000), RawConfig:(*config.RawConfig)(0xc4203a9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc42044c2d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c280), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c230), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc42044c1e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:41 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:41 [DEBUG] Starting graph walk: walkValidate | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: provider.aws | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: provider.aws | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c280), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c230), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc42044c1e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc42044c2d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:41 [TRACE] [walkValidate] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.root': walking | |
2017/12/21 12:35:41 [INFO] backend/local: apply calling Refresh | |
2017/12/21 12:35:41 [INFO] terraform: building graph: GraphTypeRefresh | |
2017/12/21 12:35:41 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c7d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc42044c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc42044c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc4203a9d50), RawConfig:(*config.RawConfig)(0xc4203a9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc4203a9e30), RawConfig:(*config.RawConfig)(0xc4203a9dc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc4203a9f10), RawConfig:(*config.RawConfig)(0xc4203a9ea0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:41 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc420402000), RawConfig:(*config.RawConfig)(0xc4203a9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:41 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:41 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:41 [DEBUG] Starting graph walk: walkRefresh | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:41 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:41 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:41 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:41 [TRACE] [walkRefresh] Entering eval tree: provider.aws | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:41 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2017-12-21T12:35:41.760Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:41 [INFO] No assume_role block read from configuration | |
2017-12-21T12:35:41.760Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:41 [INFO] Building AWS region structure | |
2017-12-21T12:35:41.760Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:41 [INFO] Building AWS auth structure | |
2017-12-21T12:35:41.760Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:41 [INFO] Setting AWS metadata API timeout to 100ms | |
2017-12-21T12:35:42.545Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017-12-21T12:35:42.545Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [INFO] AWS Auth provider used: "EnvProvider" | |
2017-12-21T12:35:42.546Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [INFO] Initializing DeviceFarm SDK connection | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=0713aa8bacec8ab67d24cb8bcee181c67c00f94dce68cc1a7faf68c90594d4e1 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123542Z | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:42.552Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:42 GMT | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 75af2efa-e64b-11e7-92bc-8b274deb7918 | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>75af2efa-e64b-11e7-92bc-8b274deb7918</RequestId> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:42.981Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [DEBUG] Trying to get account ID via iam:GetUser | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:42 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 33 | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=98cf009a1f80222c3fbeddda1adaf9882428a81d8aaddbdc01b3705f441e28bc | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123542Z | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetUser&Version=2010-05-08 | |
2017-12-21T12:35:42.983Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 400 Bad Request | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 307 | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:42 GMT | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 75e225b3-e64b-11e7-a774-d1566d9be330 | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Error> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Type>Sender</Type> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Code>ValidationError</Code> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Message>Must specify userName when calling with non-User credentials</Message> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Error> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>75e225b3-e64b-11e7-a774-d1566d9be330</RequestId> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ErrorResponse> | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Validate Response iam/GetUser failed, not retrying, error ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 75e225b3-e64b-11e7-a774-d1566d9be330 | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] Getting account ID via iam:GetUser failed: ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 75e225b3-e64b-11e7-a774-d1566d9be330 | |
2017-12-21T12:35:43.315Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] Trying to get account ID via sts:GetCallerIdentity | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=7dcead9623e7499f2e74996b5e25070bc1f8a6d7c22774d19191214f0f03ebf1 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123543Z | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:43.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:43 GMT | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 761654e2-e64b-11e7-a2d6-9dab628a5c63 | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>761654e2-e64b-11e7-a2d6-9dab628a5c63</RequestId> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:43.633Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 87 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=1313b7825506c5b4f12b74e5d9d5d1973b2041fb0059413ec2d15777961adef7 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123543Z | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2017-12-21T12:35:43.635Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:43 GMT | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>7bee2219-57f2-4d59-9dc4-15f3369890b6</requestId> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <accountAttributeSet> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeName>supported-platforms</attributeName> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValueSet> | |
2017-12-21T12:35:43.724Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValue>VPC</attributeValue> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </attributeValueSet> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </accountAttributeSet> | |
2017-12-21T12:35:43.725Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeAccountAttributesResponse> | |
[0m[1maws_security_group.test: Refreshing state... (ID: sg-ebe6b990)[0m | |
[0m[1maws_iam_role.iam_for_lambda: Refreshing state... (ID: iam_for_lambda_radek)[0m | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Exiting eval tree: provider.aws | |
2017/12/21 12:35:43 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:43 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:43 [TRACE] OrphanResourceCount: Checking: aws_security_group.test | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c7d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:43 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalRefresh | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:43 [TRACE] OrphanResourceCount: Checking: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc42044c820), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:43 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:43 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:43 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalRefresh | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 63 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=d905c57923738530af5d22c14e16b7fb6e4b0d6ecf16a7d564c0956ff02f8e25 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123543Z | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetRole&RoleName=iam_for_lambda_radek&Version=2010-05-08 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeSecurityGroups Details: | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 70 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c5902e83bb8401497c190a79b70d82919b93935246b2442e49be9bdee48c2cd3 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123543Z | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeSecurityGroups&GroupId.1=sg-ebe6b990&Version=2016-11-15 | |
2017-12-21T12:35:43.743Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeSecurityGroups Details: | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:43 GMT | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:43 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeSecurityGroupsResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>e6f9f7b1-eabd-41dc-a8a8-c42cac08f92b</requestId> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <securityGroupInfo> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ownerId>293314343108</ownerId> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupId>sg-ebe6b990</groupId> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupName>radek-test</groupName> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupDescription>Managed by Terraform</groupDescription> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <vpcId>vpc-bd7094da</vpcId> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ipPermissions/> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ipPermissionsEgress/> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </securityGroupInfo> | |
2017-12-21T12:35:43.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeSecurityGroupsResponse> | |
2017/12/21 12:35:43 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:43 [TRACE] [walkRefresh] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:44 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.test | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc42044c780), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalRefresh | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 776 | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:43 GMT | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 765707ba-e64b-11e7-a774-d1566d9be330 | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetRoleResult> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Role> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Path>/</Path> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22lambda.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleId>AROAJR5DOOBEWRWBXEH54</RoleId> | |
2017-12-21T12:35:44.086Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleName>iam_for_lambda_radek</RoleName> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:iam::293314343108:role/iam_for_lambda_radek</Arn> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <CreateDate>2017-12-21T12:34:42Z</CreateDate> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Role> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRoleResult> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>765707ba-e64b-11e7-a774-d1566d9be330</RequestId> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRoleResponse> | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] Fetching Lambda Function: radek-test | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/GetFunction Details: | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: GET /2015-03-31/functions/radek-test HTTP/1.1 | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: lambda.eu-west-1.amazonaws.com | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/lambda/aws4_request, SignedHeaders=host;x-amz-date;x-amz-security-token, Signature=e31c33a260a2a9f03430d8df9060ab1e6beccc227c022c7fa1d4b300896fab25 | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123544Z | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.087Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
[0m[1maws_lambda_function.test: Refreshing state... (ID: radek-test)[0m | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
[0m[1maws_iam_role_policy.iam_policy_for_lambda: Refreshing state... (ID: iam_for_lambda_radek:iam_policy_for_lambda_radek)[0m | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:44 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc42044c870), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalRefresh | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRolePolicy Details: | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 108 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=0a6959533c04fa4bc8b4b938563b2a403007e8e336baeb935de4090f3d6942f8 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123544Z | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetRolePolicy&PolicyName=iam_policy_for_lambda_radek&RoleName=iam_for_lambda_radek&Version=2010-05-08 | |
2017-12-21T12:35:44.090Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/GetFunction Details: | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/2.0 200 OK | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 1891 | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/json | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:44 GMT | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 76689333-e64b-11e7-be89-0f433ba4eff0 | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.178Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:44.179Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] {"Code":{"Location":"https://awslambda-eu-west-1-tasks.s3.eu-west-1.amazonaws.com/snapshots/293314343108/radek-test-e52d0411-1dc4-44c7-a826-638fc364a738?versionId=JF6EDAKw_uGRbTJcG1Z16kme76K6e7Lh&X-Amz-Security-Token=FQoDYXdzEOz%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDHSIejUAVNMv%2Fey5GyK3Aw376e5Zzhk9fSL94Q4Gc6DTNqN%2BFFecak6egI85S0OXJsv4JrjC8NcIiVT3qcY3QtwNcwEFNqj%2FjvcOhaVUuwekYe3ybnnIm8lKvXyKub7XcOdIhOsMiuq0FfT5z0ls5B4ieYBosGPWiEL%2FA%2FPdW%2B73rI8AQLRfigBNvqN8wBbis5X%2BLXn2RcgNjqFcyCiHk69Uvo7Lsz8cFEjbCtlCSoCTpQcAxGH1HM7CV6GsY7H1aMf1Q4ktyeJm%2BtSBG89RAB76meMpjVvd%2FByPOqPSrdN9FqmYhcfAIpgv0ZynK%2FhWcLMjdcvg4ao1QzfHSV7u71wvFrKpATukxTYgFs9rQDa08OyKEYINrOFey0f8QPLMrAJK%2FvzU4H%2BcT248UbJNofKuiCyi%2FS0dZ4%2F8aj%2FQgFKCPdRceIZzxCR7e1GsQ%2BaPGQRLbIirw545ZnNXqq0WuVVUKkk2KkqawUTLtVihX6nOiBOdhJi2KF8RItUZnj0OeNM9br8fUgmvhGXsUPsctJjqxRguWbm9Ng0b12fH8zzGppOmYAV1%2BX%2BadWDn0lDEU2InouktTGKGLgRR7J8kfj2JocJIwfsogaHu0QU%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20171221T123544Z&X-Amz-SignedHeaders=host&X-Amz-Expires=599&X-Amz-Credential=ASIAIJGAKOCOC2C5NZUA%2F20171221%2Feu-west-1%2Fs3%2Faws4_request&X-Amz-Signature=7a8bd0dedb1f37fac9f4b89294e7055418b912504ae742e02213f6519824ff42","RepositoryType":"S3"},"Concurrency":null,"Configuration":{"CodeSha256":"1KQeb5qJvW/LapyMvThA6VXYPxp46QefZ4YayHrXgcA=","CodeSize":246,"DeadLetterConfig":null,"Description":"","Environment":null,"FunctionArn":"arn:aws:lambda:eu-west-1:293314343108:function:radek-test","FunctionName":"radek-test","Handler":"index.example","KMSKeyArn":null,"LastModified":"2017-12-21T12:34:59.228+0000","MasterArn":null,"MemorySize":128,"RevisionId":null,"Role":"arn:aws:iam::293314343108:role/iam_for_lambda_radek","Runtime":"nodejs4.3","Timeout":3,"TracingConfig":{"Mode":"PassThrough"},"Version":"$LATEST","VpcConfig":{"SecurityGroupIds":["sg-ebe6b990"],"SubnetIds":["subnet-e416fbad"],"VpcId":"vpc-bd7094da"}},"Tags":null} | |
2017-12-21T12:35:44.185Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [INFO] Setting Lambda radek-test VPC config []map[string]interface {}{map[string]interface {}{"subnet_ids":*Set(map[string]interface {}{"3928636147":"subnet-e416fbad"}), "security_group_ids":*Set(map[string]interface {}{"745571262":"sg-ebe6b990"}), "vpc_id":"vpc-bd7094da"}} from API | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/ListVersionsByFunction Details: | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: GET /2015-03-31/functions/radek-test/versions?MaxItems=10000 HTTP/1.1 | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: lambda.eu-west-1.amazonaws.com | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/lambda/aws4_request, SignedHeaders=host;x-amz-date;x-amz-security-token, Signature=8c4830f1d4d5327b9194611eda67cac20fc49dd48504af148e0b44b6ecd5ce21 | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123544Z | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.test | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/ListVersionsByFunction Details: | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/2.0 200 OK | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 678 | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/json | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:44 GMT | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 76862d10-e64b-11e7-82c1-fb7e8bf80d4f | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:44.373Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] {"NextMarker":null,"Versions":[{"CodeSha256":"1KQeb5qJvW/LapyMvThA6VXYPxp46QefZ4YayHrXgcA=","CodeSize":246,"DeadLetterConfig":null,"Description":"","Environment":null,"FunctionArn":"arn:aws:lambda:eu-west-1:293314343108:function:radek-test:$LATEST","FunctionName":"radek-test","Handler":"index.example","KMSKeyArn":null,"LastModified":"2017-12-21T12:34:59.228+0000","MasterArn":null,"MemorySize":128,"RevisionId":null,"Role":"arn:aws:iam::293314343108:role/iam_for_lambda_radek","Runtime":"nodejs4.3","Timeout":3,"TracingConfig":{"Mode":"PassThrough"},"Version":"$LATEST","VpcConfig":{"SecurityGroupIds":["sg-ebe6b990"],"SubnetIds":["subnet-e416fbad"],"VpcId":"vpc-bd7094da"}}]} | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRolePolicy Details: | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 1531 | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:43 GMT | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 76898932-e64b-11e7-993c-c95b441db8aa | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [DEBUG] [aws-sdk-go] <GetRolePolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetRolePolicyResult> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <PolicyDocument>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3ACreateLogGroup%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3ACreateLogStream%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3APutLogEvents%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Alogs%3A%2A%3A%2A%3A%2A%22%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%22ec2%3ACreateNetworkInterface%22%2C%0A%20%20%20%20%20%20%20%20%22ec2%3ADescribeNetworkInterfaces%22%2C%0A%20%20%20%20%20%20%20%20%22ec2%3ADeleteNetworkInterface%22%0A%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%22%2A%22%0A%20%20%20%20%20%20%5D%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D%0A</PolicyDocument> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleName>iam_for_lambda_radek</RoleName> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <PolicyName>iam_policy_for_lambda_radek</PolicyName> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRolePolicyResult> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>76898932-e64b-11e7-993c-c95b441db8aa</RequestId> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:44.419Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRolePolicyResponse> | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:44 [TRACE] [walkRefresh] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:44 [INFO] backend/local: apply calling Plan | |
2017/12/21 12:35:44 [INFO] terraform: building graph: GraphTypePlan | |
2017/12/21 12:35:44 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:44 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:44 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc4203a9e30), RawConfig:(*config.RawConfig)(0xc4203a9dc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:44 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:44 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc4203a9f10), RawConfig:(*config.RawConfig)(0xc4203a9ea0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:44 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:44 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc420402000), RawConfig:(*config.RawConfig)(0xc4203a9f80), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:44 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:44 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc4203a9d50), RawConfig:(*config.RawConfig)(0xc4203a9ce0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420065630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4200655e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4200656d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420065680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:44 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:44 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:44 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:44 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:44 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:44 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:44 [DEBUG] Starting graph walk: walkPlan | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:44 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:44 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:44 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:44 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:44 [TRACE] [walkPlan] Entering eval tree: provider.aws | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:44 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:44 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:44 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2017-12-21T12:35:44.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [INFO] No assume_role block read from configuration | |
2017-12-21T12:35:44.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [INFO] Building AWS region structure | |
2017-12-21T12:35:44.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [INFO] Building AWS auth structure | |
2017-12-21T12:35:44.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:44 [INFO] Setting AWS metadata API timeout to 100ms | |
2017-12-21T12:35:45.133Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [INFO] AWS Auth provider used: "EnvProvider" | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [INFO] Initializing DeviceFarm SDK connection | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=83f074667d278867e50ca73c2347dcb8ae3489e3c4cb9814d48aeaee578de640 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123545Z | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:45.134Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:44 GMT | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 7729725d-e64b-11e7-945b-7b6227ee75ae | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>7729725d-e64b-11e7-945b-7b6227ee75ae</RequestId> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] Trying to get account ID via iam:GetUser | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 33 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=21a5ef1f64433f4c62b752c8374b0160f7e92b693deae55e77784dddf1c8440d | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123545Z | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetUser&Version=2010-05-08 | |
2017-12-21T12:35:45.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 400 Bad Request | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 307 | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:45 GMT | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 77590e17-e64b-11e7-8bbc-2dc829ab32b4 | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Error> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Type>Sender</Type> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Code>ValidationError</Code> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Message>Must specify userName when calling with non-User credentials</Message> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Error> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>77590e17-e64b-11e7-8bbc-2dc829ab32b4</RequestId> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ErrorResponse> | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Validate Response iam/GetUser failed, not retrying, error ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 77590e17-e64b-11e7-8bbc-2dc829ab32b4 | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] Getting account ID via iam:GetUser failed: ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 77590e17-e64b-11e7-8bbc-2dc829ab32b4 | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] Trying to get account ID via sts:GetCallerIdentity | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:45 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:45.768Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=83f074667d278867e50ca73c2347dcb8ae3489e3c4cb9814d48aeaee578de640 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123545Z | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:45.769Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:45 GMT | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 778a578a-e64b-11e7-945b-7b6227ee75ae | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>778a578a-e64b-11e7-945b-7b6227ee75ae</RequestId> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 87 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c848c6308759b91db6a11ae6a8be9fa6c5875c02f1c45de28c3c2c04532a7557 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123546Z | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2017-12-21T12:35:46.081Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:45 GMT | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>ebc8086b-e340-44e0-b2e2-02f2ecaddd5b</requestId> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <accountAttributeSet> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeName>supported-platforms</attributeName> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValueSet> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValue>VPC</attributeValue> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </attributeValueSet> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </accountAttributeSet> | |
2017-12-21T12:35:46.173Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeAccountAttributesResponse> | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: provider.aws | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Checking: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420065680), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Checking: aws_security_group.test | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420065630), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalDiff | |
2017-12-21T12:35:46.180Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017-12-21T12:35:46.183Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4200655e0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:46 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4200656d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017-12-21T12:35:46.186Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:46 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:46 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:46 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:46 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:46 [TRACE] [walkPlan] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.root': walking | |
2017/12/21 12:35:46 [INFO] terraform: building graph: GraphTypeApply | |
2017/12/21 12:35:46 [TRACE] DiffTransformer: starting | |
2017/12/21 12:35:46 [TRACE] DiffTransformer: Module: UPDATE: aws_lambda_function.test | |
vpc_config.#: "1" => "0" | |
vpc_config.0.security_group_ids.#: "1" => "0" | |
vpc_config.0.security_group_ids.745571262: "sg-ebe6b990" => "" | |
vpc_config.0.subnet_ids.#: "1" => "0" | |
vpc_config.0.subnet_ids.3928636147: "subnet-e416fbad" => "" | |
2017/12/21 12:35:46 [TRACE] DiffTransformer: Resource "aws_lambda_function.test": *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"vpc_config.#":*terraform.ResourceAttrDiff{Old:"1", New:"0", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "vpc_config.0.subnet_ids.#":*terraform.ResourceAttrDiff{Old:"1", New:"0", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "vpc_config.0.subnet_ids.3928636147":*terraform.ResourceAttrDiff{Old:"subnet-e416fbad", New:"", NewComputed:false, NewRemoved:true, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "vpc_config.0.security_group_ids.745571262":*terraform.ResourceAttrDiff{Old:"sg-ebe6b990", New:"", NewComputed:false, NewRemoved:true, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "vpc_config.0.security_group_ids.#":*terraform.ResourceAttrDiff{Old:"1", New:"0", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.DiffTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
2017/12/21 12:35:46 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:46 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:46 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc4203a9e30), RawConfig:(*config.RawConfig)(0xc4203a9dc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
2017/12/21 12:35:46 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4205a87d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
2017/12/21 12:35:46 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
2017/12/21 12:35:46 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] DestroyEdgeTransformer: Beginning destroy edge transformation... | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.DestroyEdgeTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] CBDEdgeTransformer: Beginning CBD transformation... | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.CBDEdgeTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:46 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:46 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_lambda_function.test - *terraform.NodeApplyableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:46 [DEBUG] Starting graph walk: walkApply | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "provider.aws" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:46 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:46 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:46 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:46 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:46 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:46 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:46 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:46 [TRACE] [walkApply] Entering eval tree: provider.aws | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:46 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:46 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2017-12-21T12:35:46.192Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] No assume_role block read from configuration | |
2017-12-21T12:35:46.192Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] Building AWS region structure | |
2017-12-21T12:35:46.192Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] Building AWS auth structure | |
2017-12-21T12:35:46.192Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] Setting AWS metadata API timeout to 100ms | |
2017-12-21T12:35:46.791Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017-12-21T12:35:46.791Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] AWS Auth provider used: "EnvProvider" | |
2017-12-21T12:35:46.791Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [INFO] Initializing DeviceFarm SDK connection | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:46 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=01ab46eb825bd14fa5dfb06ac29a6fe170a0d6bad0ec7f98aca3cbc61600f159 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123546Z | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:46.792Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:46 GMT | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 7824e9d7-e64b-11e7-95bf-9183ee761e55 | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.108Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>7824e9d7-e64b-11e7-95bf-9183ee761e55</RequestId> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] Trying to get account ID via iam:GetUser | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 33 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=fa3d628052254e5f5b058a25690b375d98bbe241ef0e9c59d3c5576ab6c5e678 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123547Z | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetUser&Version=2010-05-08 | |
2017-12-21T12:35:47.109Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 400 Bad Request | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 307 | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:47 GMT | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 78571d4f-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Error> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Type>Sender</Type> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Code>ValidationError</Code> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Message>Must specify userName when calling with non-User credentials</Message> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Error> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>78571d4f-e64b-11e7-92ee-6397a1f7f9b9</RequestId> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ErrorResponse> | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Validate Response iam/GetUser failed, not retrying, error ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 78571d4f-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] Getting account ID via iam:GetUser failed: ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 78571d4f-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] Trying to get account ID via sts:GetCallerIdentity | |
2017-12-21T12:35:47.428Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=fdac44df68473a5306271c6cc0a33d2b222b74ac22d0f5e322beaa76c0d4efc7 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123547Z | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:47.429Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:47 GMT | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 7887552d-e64b-11e7-9cad-372b4f37eb82 | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:47.749Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>7887552d-e64b-11e7-9cad-372b4f37eb82</RequestId> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 87 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=41c587ccb85440acaf9dcb42cadddb2b1b7089bff9121238e86022aec2dc07a3 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123547Z | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2017-12-21T12:35:47.750Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:47 GMT | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:47 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>5cee07fa-5579-4837-ab50-f63de0a4c06d</requestId> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <accountAttributeSet> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeName>supported-platforms</attributeName> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValueSet> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValue>VPC</attributeValue> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </attributeValueSet> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </accountAttributeSet> | |
2017-12-21T12:35:47.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeAccountAttributesResponse> | |
2017/12/21 12:35:47 [TRACE] [walkApply] Exiting eval tree: provider.aws | |
2017/12/21 12:35:47 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:47 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:47 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:47 [TRACE] [walkApply] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalInstanceInfo | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalReadDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:47 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalReadDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalCompareDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApplyPre | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApply | |
2017/12/21 12:35:47 [DEBUG] apply: aws_lambda_function.test: executing Apply | |
[0m[1maws_lambda_function.test: Modifying... (ID: radek-test)[0m | |
vpc_config.#: "1" => "0" | |
vpc_config.0.security_group_ids.#: "1" => "0" | |
vpc_config.0.security_group_ids.745571262: "sg-ebe6b990" => "" | |
vpc_config.0.subnet_ids.#: "1" => "0" | |
vpc_config.0.subnet_ids.3928636147: "subnet-e416fbad" => ""[0m | |
2017-12-21T12:35:47.851Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: [31m | |
[1m[31mError: [0m[0m[1mError applying plan: | |
1 error(s) occurred: | |
* aws_lambda_function.test: 1 error(s) occurred: | |
* aws_lambda_function.test: unexpected EOF | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure.[0m | |
[0m[0m[0m | |
panic: runtime error: index out of range | |
2017-12-21T12:35:47.851Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.851Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: goroutine 320 [running]: | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsLambdaFunctionUpdate(0xc420e64700, 0x2380a00, 0xc420ed0000, 0x0, 0x0) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_lambda_function.go:588 +0x3120 | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc420b94d90, 0xc420a82190, 0xc420ad51c0, 0x2380a00, 0xc420ed0000, 0x1, 0xc420d3b3b0, 0xc420944150) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:233 +0x2ab | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc420eaa620, 0xc420a82140, 0xc420a82190, 0xc420ad51c0, 0x7f2dc154f000, 0x0, 0x18) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0xa4 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Apply(0xc420a80780, 0xc420ad4d60, 0xc420ac8630, 0x0, 0x0) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: reflect.Value.call(0xc4202e8c60, 0xc4208b0240, 0x13, 0x27421dc, 0x4, 0xc420046f20, 0x3, 0x3, 0x403a23, 0xc42002e700, ...) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/reflect/value.go:434 +0x906 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: reflect.Value.Call(0xc4202e8c60, 0xc4208b0240, 0x13, 0xc420655720, 0x3, 0x3, 0xc420655720, 0xc420655728, 0xc420cf2940) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/reflect/value.go:302 +0xa4 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: net/rpc.(*service).call(0xc4207dd5c0, 0xc420a825f0, 0xc420a462b0, 0xc420934280, 0xc420a80d40, 0x1f362c0, 0xc420ad4d60, 0x16, 0x1f36300, 0xc420ac8630, ...) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/net/rpc/server.go:381 +0x142 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: created by net/rpc.(*Server).ServeCodec | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/net/rpc/server.go:475 +0x36b | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApplyProvisioners | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApplyPost | |
2017/12/21 12:35:47 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred: | |
* aws_lambda_function.test: unexpected EOF | |
2017/12/21 12:35:47 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* aws_lambda_function.test: unexpected EOF | |
2017/12/21 12:35:47 [TRACE] [walkApply] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "provider.aws (close)" | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "root" | |
2017-12-21T12:35:47.857Z [DEBUG] plugin: plugin process exited: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [DEBUG] plugin: waiting for all plugin processes to complete... | |
2017-12-21T12:35:47.862Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" | |
panic: runtime error: index out of range | |
2017-12-21T12:35:47.851Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:47.851Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: goroutine 320 [running]: | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsLambdaFunctionUpdate(0xc420e64700, 0x2380a00, 0xc420ed0000, 0x0, 0x0) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_lambda_function.go:588 +0x3120 | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc420b94d90, 0xc420a82190, 0xc420ad51c0, 0x2380a00, 0xc420ed0000, 0x1, 0xc420d3b3b0, 0xc420944150) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:233 +0x2ab | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc420eaa620, 0xc420a82140, 0xc420a82190, 0xc420ad51c0, 0x7f2dc154f000, 0x0, 0x18) | |
2017-12-21T12:35:47.852Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0xa4 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Apply(0xc420a80780, 0xc420ad4d60, 0xc420ac8630, 0x0, 0x0) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: reflect.Value.call(0xc4202e8c60, 0xc4208b0240, 0x13, 0x27421dc, 0x4, 0xc420046f20, 0x3, 0x3, 0x403a23, 0xc42002e700, ...) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/reflect/value.go:434 +0x906 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: reflect.Value.Call(0xc4202e8c60, 0xc4208b0240, 0x13, 0xc420655720, 0x3, 0x3, 0xc420655720, 0xc420655728, 0xc420cf2940) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/reflect/value.go:302 +0xa4 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: net/rpc.(*service).call(0xc4207dd5c0, 0xc420a825f0, 0xc420a462b0, 0xc420934280, 0xc420a80d40, 0x1f362c0, 0xc420ad4d60, 0x16, 0x1f36300, 0xc420ac8630, ...) | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/net/rpc/server.go:381 +0x142 | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: created by net/rpc.(*Server).ServeCodec | |
2017-12-21T12:35:47.853Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: /usr/local/go/src/net/rpc/server.go:475 +0x36b | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApplyProvisioners | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:47 [TRACE] root: eval: *terraform.EvalApplyPost | |
2017/12/21 12:35:47 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred: | |
* aws_lambda_function.test: unexpected EOF | |
2017/12/21 12:35:47 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred: | |
* aws_lambda_function.test: unexpected EOF | |
2017/12/21 12:35:47 [TRACE] [walkApply] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "provider.aws (close)" | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:47 [TRACE] dag/walk: upstream errored, not walking "root" | |
2017-12-21T12:35:47.857Z [DEBUG] plugin: plugin process exited: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:47 [DEBUG] plugin: waiting for all plugin processes to complete... | |
2017-12-21T12:35:47.862Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
Terraform crashed! This is always indicative of a bug within Terraform. | |
A crash log has been placed at "crash.log" relative to your current | |
working directory. It would be immensely helpful if you could please | |
report the crash with Terraform[1] so that we can fix this. | |
When reporting bugs, please include your terraform version. That | |
information is available on the first line of crash.log. You can also | |
get it by running 'terraform --version' on the command line. | |
[1]: https://github.com/hashicorp/terraform/issues | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2017/12/21 12:35:18 [INFO] Terraform version: 0.11.1 a42fdb08a43c7fabb8898fe8c286b793bbaa4835+CHANGES | |
2017/12/21 12:35:18 [INFO] Go runtime version: go1.9 | |
2017/12/21 12:35:18 [INFO] CLI args: []string{"/bin/terraform", "plan"} | |
2017/12/21 12:35:18 [DEBUG] Attempting to open CLI config file: /root/.terraformrc | |
2017/12/21 12:35:18 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2017/12/21 12:35:18 [INFO] CLI command args: []string{"plan"} | |
2017/12/21 12:35:18 [INFO] command: empty terraform config, returning nil | |
2017/12/21 12:35:18 [DEBUG] command: no data state file found for backend config | |
2017/12/21 12:35:18 [DEBUG] New state was assigned lineage "3d78c8d2-fc59-4c45-be2b-827e4ce3df0f" | |
2017/12/21 12:35:18 [INFO] command: backend initialized: <nil> | |
2017/12/21 12:35:18 [DEBUG] checking for provider in "." | |
2017/12/21 12:35:18 [DEBUG] checking for provider in "/bin" | |
2017/12/21 12:35:18 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" | |
2017/12/21 12:35:18 [DEBUG] found provider "terraform-provider-aws_v1.6.0_x4" | |
2017/12/21 12:35:18 [DEBUG] found valid plugin: "aws" | |
2017/12/21 12:35:18 [DEBUG] checking for provisioner in "." | |
2017/12/21 12:35:18 [DEBUG] checking for provisioner in "/bin" | |
2017/12/21 12:35:18 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" | |
2017/12/21 12:35:18 [INFO] command: backend <nil> is not enhanced, wrapping in local | |
2017/12/21 12:35:18 [INFO] backend/local: starting Plan operation | |
2017/12/21 12:35:18 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:18 [TRACE] Preserving existing state lineage "39213a94-8666-4c37-95be-5cc9f3ed183d" | |
2017/12/21 12:35:18 [INFO] terraform: building graph: GraphTypeInput | |
2017/12/21 12:35:18 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420348f50), RawConfig:(*config.RawConfig)(0xc420348ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc420349030), RawConfig:(*config.RawConfig)(0xc420348fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc420349110), RawConfig:(*config.RawConfig)(0xc4203490a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc4203491f0), RawConfig:(*config.RawConfig)(0xc420349180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387220), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4203871d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4203872c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
2017/12/21 12:35:18 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeAbstractResource | |
aws_lambda_function.test - *terraform.NodeAbstractResource | |
aws_security_group.test - *terraform.NodeAbstractResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:18 [DEBUG] Starting graph walk: walkInput | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkInput] Entering eval tree: provider.aws | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017-12-21T12:35:18.731Z [DEBUG] plugin: starting plugin: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 args=[/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4] | |
2017-12-21T12:35:18.732Z [DEBUG] plugin: waiting for RPC address: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 | |
2017-12-21T12:35:18.839Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: plugin address: timestamp=2017-12-21T12:35:18.837Z address=/tmp/plugin272136261 network=unix | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInputProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] [walkInput] Exiting eval tree: provider.aws | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkInput] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:18 [TRACE] [walkInput] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.root': walking | |
2017/12/21 12:35:18 [INFO] terraform: building graph: GraphTypeValidate | |
2017/12/21 12:35:18 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420348f50), RawConfig:(*config.RawConfig)(0xc420348ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc420349030), RawConfig:(*config.RawConfig)(0xc420348fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc420349110), RawConfig:(*config.RawConfig)(0xc4203490a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc4203491f0), RawConfig:(*config.RawConfig)(0xc420349180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387220), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4203871d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4203872c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
2017/12/21 12:35:18 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.MissingProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResource | |
aws_lambda_function.test - *terraform.NodeValidatableResource | |
aws_security_group.test - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:18 [DEBUG] Starting graph walk: walkValidate | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: provider.aws | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: provider.aws | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387270), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420387220), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4203872c0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateCount | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4203871d0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodeValidatableResourceInstance | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.root': walking | |
[0m[1mRefreshing Terraform state in-memory prior to plan...[0m | |
The refreshed state will be used to calculate this plan, but will not be | |
persisted to local or remote state storage. | |
[0m | |
2017/12/21 12:35:18 [INFO] backend/local: plan calling Refresh | |
2017/12/21 12:35:18 [INFO] terraform: building graph: GraphTypeRefresh | |
2017/12/21 12:35:18 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420064dc0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc420064d20), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc420064cd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420064e10), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420348f50), RawConfig:(*config.RawConfig)(0xc420348ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc420349030), RawConfig:(*config.RawConfig)(0xc420348fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc420349110), RawConfig:(*config.RawConfig)(0xc4203490a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:18 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc4203491f0), RawConfig:(*config.RawConfig)(0xc420349180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:18 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:18 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResource | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResource | |
aws_security_group.test - *terraform.NodeRefreshableManagedResource | |
2017/12/21 12:35:18 [DEBUG] Starting graph walk: walkRefresh | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:18 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:18 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:18 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:18 [TRACE] [walkRefresh] Entering eval tree: provider.aws | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:18 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2017-12-21T12:35:18.946Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:18 [INFO] No assume_role block read from configuration | |
2017-12-21T12:35:18.947Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:18 [INFO] Building AWS region structure | |
2017-12-21T12:35:18.947Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:18 [INFO] Building AWS auth structure | |
2017-12-21T12:35:18.947Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:18 [INFO] Setting AWS metadata API timeout to 100ms | |
2017-12-21T12:35:19.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017-12-21T12:35:19.316Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [INFO] AWS Auth provider used: "EnvProvider" | |
2017-12-21T12:35:19.317Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [INFO] Initializing DeviceFarm SDK connection | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=ed51175543bb965261b5eb417cd4747af53c6f145ea8e208a14010a90c34ded3 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123519Z | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:19.323Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:18 GMT | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 67d97693-e64b-11e7-90a1-0fa008c5a157 | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>67d97693-e64b-11e7-90a1-0fa008c5a157</RequestId> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:19.763Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [DEBUG] Trying to get account ID via iam:GetUser | |
2017-12-21T12:35:19.764Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:19 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
2017-12-21T12:35:19.764Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:19.764Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 33 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c65f8078fb7ce63d8073290ffffafc7c6d939486ff092fb4a030a602f75ef598 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123519Z | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetUser&Version=2010-05-08 | |
2017-12-21T12:35:19.765Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 400 Bad Request | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 307 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:19 GMT | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 680dcd52-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Error> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Type>Sender</Type> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Code>ValidationError</Code> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Message>Must specify userName when calling with non-User credentials</Message> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Error> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>680dcd52-e64b-11e7-92ee-6397a1f7f9b9</RequestId> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ErrorResponse> | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] DEBUG: Validate Response iam/GetUser failed, not retrying, error ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 680dcd52-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] Getting account ID via iam:GetUser failed: ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 680dcd52-e64b-11e7-92ee-6397a1f7f9b9 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] Trying to get account ID via sts:GetCallerIdentity | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=23b393ff69a36f7acde1c5749bf276a241bceb398a75341b9e271af4b0d0dfb0 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123520Z | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:20.104Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:20.449Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:20 GMT | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 68435c05-e64b-11e7-a1c3-33356a0040e0 | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>68435c05-e64b-11e7-a1c3-33356a0040e0</RequestId> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:20.450Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:20 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 87 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=f3c7bbe4e7d3620cbe768f87d115e267fc2e294ee69b8445e9bec4f30ada4258 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123520Z | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2017-12-21T12:35:20.452Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:21 GMT | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>b702d4f3-78bf-470b-9f6f-9d0072509755</requestId> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <accountAttributeSet> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeName>supported-platforms</attributeName> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValueSet> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValue>VPC</attributeValue> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </attributeValueSet> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </accountAttributeSet> | |
2017-12-21T12:35:21.592Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeAccountAttributesResponse> | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: provider.aws | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Checking: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:21 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420064e10), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:21 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Checking: aws_security_group.test | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalRefresh | |
2017/12/21 12:35:21 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc420064dc0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_security_group.test': e[0m[1maws_iam_role.iam_for_lambda: Refreshing state... (ID: iam_for_lambda_radek)[0m | |
[0m[1maws_security_group.test: Refreshing state... (ID: sg-ebe6b990)[0m | |
valuating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalRefresh | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 63 | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=bbd53f557ea794f5529771f2a302a42d56748084d20f1f702cd59eb2afb9c05b | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:21.607Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123521Z | |
2017-12-21T12:35:21.608Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:21.608Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:21.608Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.608Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetRole&RoleName=iam_for_lambda_radek&Version=2010-05-08 | |
2017-12-21T12:35:21.608Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeSecurityGroups Details: | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 70 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=f8109d34d662bf35ea5c1bdebe155c6c72d0ecb4f004e99782497eba09dd20a6 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123521Z | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeSecurityGroups&GroupId.1=sg-ebe6b990&Version=2016-11-15 | |
2017-12-21T12:35:21.610Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeSecurityGroups Details: | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:21 GMT | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeSecurityGroupsResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>5d78e7d1-0037-4be8-8f32-370a098cd696</requestId> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <securityGroupInfo> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ownerId>293314343108</ownerId> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupId>sg-ebe6b990</groupId> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupName>radek-test</groupName> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <groupDescription>Managed by Terraform</groupDescription> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <vpcId>vpc-bd7094da</vpcId> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ipPermissions/> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ipPermissionsEgress/> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </securityGroupInfo> | |
2017-12-21T12:35:21.710Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeSecurityGroupsResponse> | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_security_group.test | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 776 | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:21 GMT | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 69235c66-e64b-11e7-993c-c95b441db8aa | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetRoleResult> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Role> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Path>/</Path> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22lambda.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleId>AROAJR5DOOBEWRWBXEH54</RoleId> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleName>iam_for_lambda_radek</RoleName> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:iam::293314343108:role/iam_for_lambda_radek</Arn> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <CreateDate>2017-12-21T12:34:42Z</CreateDate> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Role> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRoleResult> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>69235c66-e64b-11e7-993c-c95b441db8aa</RequestId> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:21.945Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRoleResponse> | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:21 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc420064cd0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:21 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalRefresh | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:21 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.test | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc420064d20), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodeRefreshableManagedResourceInstance | |
2017/12/21 12:35:21 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:21 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:21 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:21 [TRACE] [walkRefresh] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:21 [TRACE] root: eval: *terraform.EvalRefresh | |
[0m[1maws_iam_role_policy.iam_policy_for_lambda: Refreshing state... (ID: iam_for_lambda_radek:iam_policy_for_lambda_radek)[0m | |
[0m[1maws_lambda_function.test: Refreshing state... (ID: radek-test)[0m | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] Fetching Lambda Function: radek-test | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRolePolicy Details: | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 108 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=b264b8e9b14c9cc9f10f3b9dca12650c8df3186552236ad3ca3814dcc9fdb6f6 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123521Z | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetRolePolicy&PolicyName=iam_policy_for_lambda_radek&RoleName=iam_for_lambda_radek&Version=2010-05-08 | |
2017-12-21T12:35:21.949Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:21 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/GetFunction Details: | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: GET /2015-03-31/functions/radek-test HTTP/1.1 | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: lambda.eu-west-1.amazonaws.com | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/lambda/aws4_request, SignedHeaders=host;x-amz-date;x-amz-security-token, Signature=d7b38c0f2d359f520324590122dbd3f3187c3cb6084b6087e7ef5d1d6d77b971 | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123521Z | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:21.951Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.053Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/GetFunction Details: | |
2017-12-21T12:35:22.053Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:22.053Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/2.0 200 OK | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 1877 | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/json | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:22 GMT | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 6938b90b-e64b-11e7-a252-5b1772665989 | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.054Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] {"Code":{"Location":"https://awslambda-eu-west-1-tasks.s3.eu-west-1.amazonaws.com/snapshots/293314343108/radek-test-e52d0411-1dc4-44c7-a826-638fc364a738?versionId=JF6EDAKw_uGRbTJcG1Z16kme76K6e7Lh&X-Amz-Security-Token=FQoDYXdzEOz%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDB104Jt%2BU5YPZNzfDCK3A1HU99xmU2vhtmmxzAzr11vBYD4bWLXmRzOW76vMAARHxmsqpKm5UidijjaUMrXAbaV8zeiJObBGHv8o7PMRKeXAbBPyywuTGmg5XUvW0HX611hCoVv9u3bIjAxLawTkK8zhNTEBsx7sx4P0iFIrRjJRMrtnNaIKGubOvZ5VUom7j2Aa5cZWSMf2wUILW8Go%2B2Zq9xN47XVcEhOPvq4w1YwrcuOoZ7l72oVx84J7Nr3twsalDlViLuzms21pYTFh3xi3Ep2ZO3Lw1m1jAkN1TpEX3%2BqGY0Gv%2FkxnKLx%2BmPGynNf8HCS7Q1PNpKAyuK8UYVFXpXWiZ8csPWLyYTUjH7WXE9YZp%2BjKSDEadWmUZwWsazp9TO7hmtRMDxRvbJhTc7GnYrVJ1fn3gcEkw0Sv%2F57BfUETnA9NZAsuog6DBiY0hZisBUEO6vrNcWsXZaOuHd3VN%2FugtO6o6fWuBkAJJnjmvGN1qnQOAwRUiectl4zGeBtS2KXgNk%2F3OEHzkaXxWKqXyXJH%2F4bpUlqvejNegroyHJyGxmJ7UIrkfhAQSPhXUB%2F4ZoJCE9JZqVEbLivlqhjHWhrsSAMo3LDu0QU%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20171221T123522Z&X-Amz-SignedHeaders=host&X-Amz-Expires=600&X-Amz-Credential=ASIAJQZ7CVP7ZGUDGVOQ%2F20171221%2Feu-west-1%2Fs3%2Faws4_request&X-Amz-Signature=9ddac536c2ab127d964c39aff28d67de452706fe68e6c87d01fbb91bbe0088d7","RepositoryType":"S3"},"Concurrency":null,"Configuration":{"CodeSha256":"1KQeb5qJvW/LapyMvThA6VXYPxp46QefZ4YayHrXgcA=","CodeSize":246,"DeadLetterConfig":null,"Description":"","Environment":null,"FunctionArn":"arn:aws:lambda:eu-west-1:293314343108:function:radek-test","FunctionName":"radek-test","Handler":"index.example","KMSKeyArn":null,"LastModified":"2017-12-21T12:34:59.228+0000","MasterArn":null,"MemorySize":128,"RevisionId":null,"Role":"arn:aws:iam::293314343108:role/iam_for_lambda_radek","Runtime":"nodejs4.3","Timeout":3,"TracingConfig":{"Mode":"PassThrough"},"Version":"$LATEST","VpcConfig":{"SecurityGroupIds":["sg-ebe6b990"],"SubnetIds":["subnet-e416fbad"],"VpcId":"vpc-bd7094da"}},"Tags":null} | |
2017-12-21T12:35:22.055Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Setting Lambda radek-test VPC config []map[string]interface {}{map[string]interface {}{"security_group_ids":*Set(map[string]interface {}{"745571262":"sg-ebe6b990"}), "vpc_id":"vpc-bd7094da", "subnet_ids":*Set(map[string]interface {}{"3928636147":"subnet-e416fbad"})}} from API | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Request lambda/ListVersionsByFunction Details: | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: GET /2015-03-31/functions/radek-test/versions?MaxItems=10000 HTTP/1.1 | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: lambda.eu-west-1.amazonaws.com | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/lambda/aws4_request, SignedHeaders=host;x-amz-date;x-amz-security-token, Signature=099ca6cb1794c3658d53bc0253706d49ea43c5fd1e6fc6c122b0e8f9c7e36bc6 | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123522Z | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.056Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Response lambda/ListVersionsByFunction Details: | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/2.0 200 OK | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 678 | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/json | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:22 GMT | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 6948496c-e64b-11e7-afa9-13226be5ad67 | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.157Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] {"NextMarker":null,"Versions":[{"CodeSha256":"1KQeb5qJvW/LapyMvThA6VXYPxp46QefZ4YayHrXgcA=","CodeSize":246,"DeadLetterConfig":null,"Description":"","Environment":null,"FunctionArn":"arn:aws:lambda:eu-west-1:293314343108:function:radek-test:$LATEST","FunctionName":"radek-test","Handler":"index.example","KMSKeyArn":null,"LastModified":"2017-12-21T12:34:59.228+0000","MasterArn":null,"MemorySize":128,"RevisionId":null,"Role":"arn:aws:iam::293314343108:role/iam_for_lambda_radek","Runtime":"nodejs4.3","Timeout":3,"TracingConfig":{"Mode":"PassThrough"},"Version":"$LATEST","VpcConfig":{"SecurityGroupIds":["sg-ebe6b990"],"SubnetIds":["subnet-e416fbad"],"VpcId":"vpc-bd7094da"}}]} | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:22 [TRACE] [walkRefresh] Exiting eval tree: aws_lambda_function.test | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRolePolicy Details: | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 1531 | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:21 GMT | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 6956ef63-e64b-11e7-bb10-2519febcdfff | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
------------------------------------------------------------------------ | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] <GetRolePolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetRolePolicyResult> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <PolicyDocument>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3ACreateLogGroup%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3ACreateLogStream%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22logs%3APutLogEvents%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Alogs%3A%2A%3A%2A%3A%2A%22%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%22ec2%3ACreateNetworkInterface%22%2C%0A%20%20%20%20%20%20%20%20%22ec2%3ADescribeNetworkInterfaces%22%2C%0A%20%20%20%20%20%20%20%20%22ec2%3ADeleteNetworkInterface%22%0A%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%22%2A%22%0A%20%20%20%20%20%20%5D%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D%0A</PolicyDocument> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RoleName>iam_for_lambda_radek</RoleName> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <PolicyName>iam_policy_for_lambda_radek</PolicyName> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRolePolicyResult> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>6956ef63-e64b-11e7-bb10-2519febcdfff</RequestId> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:22.277Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetRolePolicyResponse> | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:22 [TRACE] [walkRefresh] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:22 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:22 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:22 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:22 [TRACE] [walkRefresh] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:22 [TRACE] [walkRefresh] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:22 [INFO] backend/local: plan calling Plan | |
2017/12/21 12:35:22 [INFO] terraform: building graph: GraphTypePlan | |
2017/12/21 12:35:22 [TRACE] ConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.LocalTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.OutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.OrphanResourceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.OrphanOutputTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] AttachResourceConfigTransformer: Beginning... | |
2017/12/21 12:35:22 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_security_group.test | |
2017/12/21 12:35:22 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_security_group", RawCount:(*config.RawConfig)(0xc420348f50), RawConfig:(*config.RawConfig)(0xc420348ee0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:22 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_lambda_function.test | |
2017/12/21 12:35:22 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"test", Type:"aws_lambda_function", RawCount:(*config.RawConfig)(0xc420349030), RawConfig:(*config.RawConfig)(0xc420348fc0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:22 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:22 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_policy_for_lambda", Type:"aws_iam_role_policy", RawCount:(*config.RawConfig)(0xc420349110), RawConfig:(*config.RawConfig)(0xc4203490a0), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:22 [TRACE] AttachResourceConfigTransformer: Attach resource config request: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:22 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"iam_for_lambda", Type:"aws_iam_role", RawCount:(*config.RawConfig)(0xc4203491f0), RawConfig:(*config.RawConfig)(0xc420349180), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}} | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d9ae0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:22 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4202d9a90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:22 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4202d9b80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:22 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d9b30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.RootVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [TRACE] ProviderConfigTransformer: Starting for path: [] | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ProviderConfigTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
2017/12/21 12:35:22 [DEBUG] adding missing provider: aws | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.MissingProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [DEBUG] resource aws_security_group.test using provider provider.aws | |
2017/12/21 12:35:22 [DEBUG] resource aws_lambda_function.test using provider provider.aws | |
2017/12/21 12:35:22 [DEBUG] resource aws_iam_role_policy.iam_policy_for_lambda using provider provider.aws | |
2017/12/21 12:35:22 [DEBUG] resource aws_iam_role.iam_for_lambda using provider provider.aws | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.PruneProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ParentProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.graphTransformerMulti: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ModuleVariableTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.RemovedModuleTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:22 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:22 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [aws_iam_role.iam_for_lambda] | |
2017/12/21 12:35:22 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:22 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.CountBoundaryTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.CloseProviderTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.CloseProvisionerTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:22 [TRACE] Graph after step *terraform.TransitiveReductionTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResource | |
aws_lambda_function.test - *terraform.NodePlannableResource | |
aws_security_group.test - *terraform.NodePlannableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
2017/12/21 12:35:22 [DEBUG] Starting graph walk: walkPlan | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "root" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "aws_lambda_function.test" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "aws_security_group.test" waiting on "provider.aws" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_security_group.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "aws_iam_role_policy.iam_policy_for_lambda" waiting on "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_lambda_function.test" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "aws_iam_role.iam_for_lambda" waiting on "provider.aws" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2017/12/21 12:35:22 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "aws_iam_role_policy.iam_policy_for_lambda", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "aws_iam_role.iam_for_lambda", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "aws_lambda_function.test", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: dependencies changed for "aws_security_group.test", sending new deps | |
2017/12/21 12:35:22 [TRACE] dag/walk: walking "provider.aws" | |
2017/12/21 12:35:22 [TRACE] vertex 'root.provider.aws': walking | |
2017/12/21 12:35:22 [TRACE] vertex 'root.provider.aws': evaluating | |
2017/12/21 12:35:22 [TRACE] [walkPlan] Entering eval tree: provider.aws | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalInitProvider | |
2017/12/21 12:35:22 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:22 [TRACE] root: eval: terraform.EvalNoop | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalInterpolateProvider | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalBuildProviderConfig | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalOpFilter | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:22 [TRACE] root: eval: *terraform.EvalConfigProvider | |
2017-12-21T12:35:22.285Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] No assume_role block read from configuration | |
2017-12-21T12:35:22.285Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Building AWS region structure | |
2017-12-21T12:35:22.285Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Building AWS auth structure | |
2017-12-21T12:35:22.285Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Setting AWS metadata API timeout to 100ms | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] AWS Auth provider used: "EnvProvider" | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [INFO] Initializing DeviceFarm SDK connection | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=f74a1e54c468b08856da48e13f430ba312b187bae5e89977da7cf57e42adc30a | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123522Z | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:22.561Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:21 GMT | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 69b4edb2-e64b-11e7-ab76-9b02c78d0e8a | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>69b4edb2-e64b-11e7-ab76-9b02c78d0e8a</RequestId> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:22.886Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] Trying to get account ID via iam:GetUser | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:22 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: iam.amazonaws.com | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 33 | |
2017-12-21T12:35:22.887Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=48b616a10ba28ab3b9c442be308547ae7f7825cf3a3e089eb0c8f7ffaf5ac1cc | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123522Z | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetUser&Version=2010-05-08 | |
2017-12-21T12:35:22.888Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 400 Bad Request | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 307 | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:22 GMT | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 69ef100a-e64b-11e7-bb10-2519febcdfff | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] <ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Error> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Type>Sender</Type> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Code>ValidationError</Code> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Message>Must specify userName when calling with non-User credentials</Message> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </Error> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>69ef100a-e64b-11e7-bb10-2519febcdfff</RequestId> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ErrorResponse> | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Validate Response iam/GetUser failed, not retrying, error ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 69ef100a-e64b-11e7-bb10-2519febcdfff | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] Getting account ID via iam:GetUser failed: ValidationError: Must specify userName when calling with non-User credentials | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: status code: 400, request id: 69ef100a-e64b-11e7-bb10-2519febcdfff | |
2017-12-21T12:35:23.268Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] Trying to get account ID via sts:GetCallerIdentity | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: sts.amazonaws.com | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 43 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=34d730e9dd16fb8822b551a9b9501c3557faa3321561b7631d7bc4d7252fc8b1 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123523Z | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=GetCallerIdentity&Version=2011-06-15 | |
2017-12-21T12:35:23.269Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 458 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:22 GMT | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amzn-Requestid: 6a2143a5-e64b-11e7-b653-9bce03d977ef | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <GetCallerIdentityResult> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Arn>arn:aws:sts::293314343108:assumed-role/admin/[email protected]</Arn> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <UserId>AROAJEJIDGKGTTL52NI2E:[email protected]</UserId> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <Account>293314343108</Account> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResult> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <ResponseMetadata> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <RequestId>6a2143a5-e64b-11e7-b653-9bce03d977ef</RequestId> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </ResponseMetadata> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </GetCallerIdentityResponse> | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ REQUEST POST-SIGN ]----------------------------- | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: POST / HTTP/1.1 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Host: ec2.eu-west-1.amazonaws.com | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: User-Agent: aws-sdk-go/1.12.48 (go1.9; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.11.0-beta1 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Length: 87 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Authorization: AWS4-HMAC-SHA256 Credential=ASIAJWHQS7RVAWZTGLVQ/20171221/eu-west-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=487b9a2c9695696db6df32f4690948b7e1fc989a821e5b92f3b6ef33aa8ccaa8 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Date: 20171221T123523Z | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: X-Amz-Security-Token: FQoDYXdzEO3//////////wEaDK+JWmEbJ053C0WrMiL7AfEdvS5HWsnT5ZJe1navF9uEGUeORVcXbhDy2gmHqR9QVIi0sx4TnjAGu7+4fU8P+Rc7KwrDV4jnapBOETd055qO7nz1l0Np9603MLL5+2UpTaQEdGq5xb5iUT6Je/fz/A5GS59AqlsT+oHQnuSu+OeUUwUMVjiD3BqQdPYtthFL1woNGv5CA3UAQzbvArRcvMvrmOLNN9g3sDqJ9BqDKXkwTACkIpimbTvlYsN2tY3QGXVxNQjVVm29c0mz0zAYXYaK+yN9IodfcDmC7VHomPoyzk352g+B5pl+a0ogAk7mKGLoJVRCazGrDlNxZI8TDlpTthmHwLe+UCxIKOq/7tEF | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Accept-Encoding: gzip | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
2017-12-21T12:35:23.584Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ---[ RESPONSE ]-------------------------------------- | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: HTTP/1.1 200 OK | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Connection: close | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Transfer-Encoding: chunked | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Content-Type: text/xml;charset=UTF-8 | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Date: Thu, 21 Dec 2017 12:35:23 GMT | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Server: AmazonEC2 | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: Vary: Accept-Encoding | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: ----------------------------------------------------- | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <requestId>4cc73fb5-17f1-4a40-9983-4a0e06952cd1</requestId> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <accountAttributeSet> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeName>supported-platforms</attributeName> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValueSet> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <item> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: <attributeValue>VPC</attributeValue> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </attributeValueSet> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </item> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </accountAttributeSet> | |
2017-12-21T12:35:23.691Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: </DescribeAccountAttributesResponse> | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: provider.aws | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Checking: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] Attaching resource state to "aws_iam_role.iam_for_lambda": &terraform.ResourceState{Type:"aws_iam_role", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d9b30), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] ReferenceTransformer: "aws_iam_role.iam_for_lambda" references: [] | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role.iam_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] dag/walk: added new vertex: "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role.iam_for_lambda': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_security_group.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Checking: aws_security_group.test | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] Attaching resource state to "aws_security_group.test": &terraform.ResourceState{Type:"aws_security_group", Dependencies:[]string{}, Primary:(*terraform.InstanceState)(0xc4202d9ae0), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] ReferenceTransformer: "aws_security_group.test" references: [] | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_security_group.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] dag/walk: added new vertex: "aws_security_group.test" | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_security_group.test" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_security_group.test': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_security_group.test': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_security_group.test | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalDiff | |
2017-12-21T12:35:23.700Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_security_group.test | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role.iam_for_lambda | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': expanding/walking dynamic subgraph | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Checking: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] Attaching resource state to "aws_iam_role_policy.iam_policy_for_lambda": &terraform.ResourceState{Type:"aws_iam_role_policy", Dependencies:[]string{"aws_iam_role.iam_for_lambda"}, Primary:(*terraform.InstanceState)(0xc4202d9b80), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] ReferenceTransformer: "aws_iam_role_policy.iam_policy_for_lambda" references: [] | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_iam_role_policy.iam_policy_for_lambda - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] dag/walk: added new vertex: "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_iam_role_policy.iam_policy_for_lambda': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountCheckComputed | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalIf | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_lambda_function.test': expanding/walking dynamic subgraph | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Starting... | |
2017/12/21 12:35:23 [TRACE] OrphanResourceCount: Checking: aws_lambda_function.test | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.OrphanResourceCountTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] Attaching resource state to "aws_lambda_function.test": &terraform.ResourceState{Type:"aws_lambda_function", Dependencies:[]string{"aws_iam_role.iam_for_lambda", "aws_security_group.test"}, Primary:(*terraform.InstanceState)(0xc4202d9a90), Deposed:[]*terraform.InstanceState{}, Provider:"provider.aws", mu:sync.Mutex{state:0, sema:0x0}} | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.AttachStateTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.TargetsTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [DEBUG] ReferenceTransformer: "aws_lambda_function.test" references: [] | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.ReferenceTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] Graph after step *terraform.RootTransformer: | |
aws_lambda_function.test - *terraform.NodePlannableResourceInstance | |
2017/12/21 12:35:23 [TRACE] dag/walk: added new vertex: "aws_lambda_function.test" | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "aws_lambda_function.test" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_lambda_function.test': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.aws_lambda_function.test': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: aws_lambda_function.test | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalSequence | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalInterpolate | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalGetProvider | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalValidateResource | |
2017-12-21T12:35:23.704Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalDiff | |
2017-12-21T12:35:23.705Z [DEBUG] plugin.terraform-provider-aws_v1.6.0_x4: 2017/12/21 12:35:23 [DEBUG] Instance Diff is nil in Diff() | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_iam_role_policy.iam_policy_for_lambda | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalReadState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalDiff | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCheckPreventDestroy | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteState | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalWriteDiff | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: aws_lambda_function.test | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "provider.aws (close)" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.provider.aws (close)': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.provider.aws (close)': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: provider.aws (close) | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCloseProvider | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: provider.aws (close) | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking | |
2017/12/21 12:35:23 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Entering eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:23 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal | |
2017/12/21 12:35:23 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role_policy.iam_policy_for_lambda.0", replace "aws_iam_role_policy.iam_policy_for_lambda" | |
2017/12/21 12:35:23 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_lambda_function.test.0", replace "aws_lambda_function.test" | |
2017/12/21 12:35:23 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_security_group.test.0", replace "aws_security_group.test" | |
2017/12/21 12:35:23 [TRACE] EvalCountFixZeroOneBoundaryGlobal: count 1, search "aws_iam_role.iam_for_lambda.0", replace "aws_iam_role.iam_for_lambda" | |
2017/12/21 12:35:23 [TRACE] [walkPlan] Exiting eval tree: meta.count-boundary (count boundary fixup) | |
2017/12/21 12:35:23 [TRACE] dag/walk: walking "root" | |
2017/12/21 12:35:23 [TRACE] vertex 'root.root': walking | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
[33m~[0m update in-place | |
[0m | |
Terraform will perform the following actions: | |
[33m [33m~[0m [33maws_lambda_function.test | |
[0m vpc_config.#: "1" => "0" | |
vpc_config.0.security_group_ids.#: "1" => "0" | |
vpc_config.0.security_group_ids.745571262: "sg-ebe6b990" => "" | |
2017/12/21 12:35:23 [DEBUG] plugin: waiting for all plugin processes to complete... | |
vpc_config.0.subnet_ids.#: "1" => "0" | |
vpc_config.0.subnet_ids.3928636147: "subnet-e416fbad" => "" | |
[0m | |
[0m | |
2017-12-21T12:35:23.712Z [DEBUG] plugin: plugin process exited: path=/home/vagrant/workspace/acuris/tflambdabug/.terraform/plugins/linux_amd64/terraform-provider-aws_v1.6.0_x4 | |
[0m[1mPlan:[0m 0 to add, 1 to change, 0 to destroy.[0m | |
------------------------------------------------------------------------ | |
Note: You didn't specify an "-out" parameter to save this plan, so Terraform | |
can't guarantee that exactly these actions will be performed if | |
"terraform apply" is subsequently run. | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment