You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Stack trace from the terraform-provider-vault_v4.4.0_x5 plugin:
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x0 pc=0x1007ecbb8]
goroutine 39 [running]:
github.com/hashicorp/vault/api.(*Client).NewRequest(0x0?, {0x100dd1b7b?, 0x1001e5ed0?}, {0x14000049b20?, 0x1001e5f70?})
github.com/hashicorp/vault/[email protected]/client.go:1300 +0x28
github.com/hashicorp/vault/api.(*Logical).WriteWithContext(0x14000a12db0, {0x101700020, 0x102165100}, {0x140005c9840, 0x1b}, 0x140009a5860)
github.com/hashicorp/vault/[email protected]/logical.go:207 +0x68
github.com/hashicorp/vault/api.(*Logical).Write(...)
github.com/hashicorp/vault/[email protected]/logical.go:203
github.com/hashicorp/terraform-provider-vault/vault.pkiSecretBackendRoleCreate({0x101700170, 0x14000026930}, 0x140000a1480, {0x10165a860, 0x14000928540})
github.com/hashicorp/terraform-provider-vault/vault/resource_pki_secret_backend_role.go:522 +0x7a8
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).create(0x140006c0d20, {0x1017000c8, 0x1400079e090}, 0x140000a1480, {0x10165a860, 0x14000928540})
github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/resource.go:778 +0xe4
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).Apply(0x140006c0d20, {0x1017000c8, 0x1400079e090}, 0x1400059ca90, 0x140000a1280, {0x10165a860, 0x14000928540})
github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/resource.go:909 +0x884
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ApplyResourceChange(0x14000868cf0, {0x1017000c8?, 0x1400073bf50?}, 0x14000c0f270)
github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/grpc_provider.go:1074 +0xaa4
github.com/hashicorp/terraform-plugin-go/tfprotov5/tf5server.(*server).ApplyResourceChange(0x140007c81e0, {0x1017000c8?, 0x1400073b590?}, 0x14000026230)
github.com/hashicorp/[email protected]/tfprotov5/tf5server/server.go:859 +0x3d0
github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ApplyResourceChange_Handler({0x1016a5a80, 0x140007c81e0}, {0x1017000c8, 0x1400073b590}, 0x140000a0980, 0x0)
github.com/hashicorp/[email protected]/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:503 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x14000604200, {0x1017000c8, 0x1400056b800}, {0x101707440, 0x140007d6680}, 0x1400056d440, 0x1400086e930, 0x1020eb378, 0x0)
google.golang.org/[email protected]/server.go:1385 +0xb40
google.golang.org/grpc.(*Server).handleStream(0x14000604200, {0x101707440, 0x140007d6680}, 0x1400056d440)
google.golang.org/[email protected]/server.go:1796 +0xc00
google.golang.org/grpc.(*Server).serveStreams.func2.1()
google.golang.org/[email protected]/server.go:1029 +0x8c
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 51
google.golang.org/[email protected]/server.go:1040 +0x13c
Error: The terraform-provider-vault_v4.4.0_x5 plugin crashed!
This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that itcan be fixed. The output above should help diagnose the issue.
Terraform Configuration Files
source = "hashicorp/vault"
version = "4.4.0"
}
null = {
source = "hashicorp/null"
version = "3.1.0"
}
local = {
source = "hashicorp/local"
version = "2.2.3"
}
Steps to Reproduce
terraform apply
Debug Output
2024-12-17T13:14:26.883+0530 [INFO] Terraform version: 1.9.7
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/go-tfe v1.58.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/hcl/v2 v2.20.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/zclconf/go-cty v1.14.4
2024-12-17T13:14:26.883+0530 [INFO] Go runtime version: go1.22.7
2024-12-17T13:14:26.883+0530 [INFO] CLI args: []string{"terraform", "apply"}
2024-12-17T13:14:26.883+0530 [DEBUG] Attempting to open CLI config file: /Users/lijupnandanan/.terraformrc
2024-12-17T13:14:26.883+0530 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/.terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [INFO] CLI command args: []string{"apply"}
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "."
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "/opt/homebrew/bin"
2024-12-17T13:14:26.922+0530 [INFO] backend/local: starting Apply operation
2024-12-17T13:14:26.927+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.927+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.933+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:26.934+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3022
2024-12-17T13:14:26.934+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:26.943+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.943+0530"
2024-12-17T13:14:26.960+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:26.960+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin684749413 network=unix timestamp="2024-12-17T13:14:26.960+0530"
2024-12-17T13:14:26.977+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:26.978+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3022
2024-12-17T13:14:26.981+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:26.982+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.982+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.984+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:26.985+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3023
2024-12-17T13:14:26.985+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:26.993+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.993+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin503910970 network=unix timestamp="2024-12-17T13:14:27.010+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.023+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.023+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3023
2024-12-17T13:14:27.026+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.026+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.026+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.028+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.030+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3024
2024-12-17T13:14:27.030+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.045+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.045+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin3434689055 network=unix timestamp="2024-12-17T13:14:27.049+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.060+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.061+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3024
2024-12-17T13:14:27.064+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.065+0530 [DEBUG] Building and walking validate graph
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.ca_cert_file local_file.private_key_file]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] Starting graph walk: walkValidate
2024-12-17T13:14:27.068+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.068+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.070+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.071+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3025
2024-12-17T13:14:27.071+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.076+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.076+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin813324012 network=unix timestamp="2024-12-17T13:14:27.093+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.105+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.105+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.107+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.109+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3027
2024-12-17T13:14:27.109+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.117+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.117+0530"
2024-12-17T13:14:27.121+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.122+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: network=unix address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin610114588 timestamp="2024-12-17T13:14:27.121+0530"
2024-12-17T13:14:27.125+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.125+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.127+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.128+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3028
2024-12-17T13:14:27.128+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.133+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.133+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin201863507 network=unix timestamp="2024-12-17T13:14:27.150+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.165+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.165+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3027
2024-12-17T13:14:27.168+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.169+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.169+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3025
2024-12-17T13:14:27.172+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.173+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.174+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3028
2024-12-17T13:14:27.177+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.177+0530 [INFO] backend/local: apply calling Plan
2024-12-17T13:14:27.178+0530 [DEBUG] Building and walking plan graph for NormalMode
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.private_key_file (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.179+0530 [DEBUG] Starting graph walk: walkPlan
2024-12-17T13:14:27.179+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.179+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.180+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.181+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3029
2024-12-17T13:14:27.181+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.186+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.186+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin551876744 network=unix timestamp="2024-12-17T13:14:27.204+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.216+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.216+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.218+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.219+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3030
2024-12-17T13:14:27.219+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.228+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.228+0530"
2024-12-17T13:14:27.232+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.232+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin1443969778 network=unix timestamp="2024-12-17T13:14:27.232+0530"
2024-12-17T13:14:27.236+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.236+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.237+0530 [WARN] ValidateProviderConfig from "provider["registry.terraform.io/hashicorp/vault"]" changed the config value, but that value is unused
2024-12-17T13:14:27.238+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.239+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3031
2024-12-17T13:14:27.239+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.244+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.244+0530"
2024-12-17T13:14:27.262+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.262+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin862096226 network=unix timestamp="2024-12-17T13:14:27.262+0530"
2024-12-17T13:14:27.275+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.275+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.276+0530 [DEBUG] refresh: vault_pki_secret_backend_role.server: no state, so not refreshing
2024-12-17T13:14:27.278+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_role.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .email_protection_flag: planned value cty.False for a non-computed attribute
- .allow_glob_domains: planned value cty.False for a non-computed attribute
- .allow_wildcard_certificates: planned value cty.True for a non-computed attribute
- .client_flag: planned value cty.True for a non-computed attribute
- .code_signing_flag: planned value cty.False for a non-computed attribute
- .allow_subdomains: planned value cty.False for a non-computed attribute
- .allow_any_name: planned value cty.False for a non-computed attribute
- .allow_bare_domains: planned value cty.False for a non-computed attribute
- .server_flag: planned value cty.True for a non-computed attribute
- .use_csr_common_name: planned value cty.True for a non-computed attribute
- .use_csr_sans: planned value cty.True for a non-computed attribute
- .allow_ip_sans: planned value cty.True for a non-computed attribute
- .basic_constraints_valid_for_non_ca: planned value cty.False for a non-computed attribute
- .enforce_hostnames: planned value cty.True for a non-computed attribute
- .generate_lease: planned value cty.False for a non-computed attribute
- .key_type: planned value cty.StringVal("rsa") for a non-computed attribute
- .no_store: planned value cty.False for a non-computed attribute
- .allow_localhost: planned value cty.True for a non-computed attribute
- .allowed_domains_template: planned value cty.False for a non-computed attribute
- .key_bits: planned value cty.NumberIntVal(2048) for a non-computed attribute
- .require_cn: planned value cty.True for a non-computed attribute
2024-12-17T13:14:27.278+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.279+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: []
2024-12-17T13:14:27.279+0530 [DEBUG] refresh: vault_pki_secret_backend_cert.server: no state, so not refreshing
2024-12-17T13:14:27.280+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_cert.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .min_seconds_remaining: planned value cty.NumberIntVal(604800) for a non-computed attribute
- .auto_renew: planned value cty.False for a non-computed attribute
- .revoke: planned value cty.False for a non-computed attribute
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.281+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3030
2024-12-17T13:14:27.283+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.ca_cert_file: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.certificate_files: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.private_key_file: no state, so not refreshing
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.certificate_files, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.private_key_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.ca_cert_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [DEBUG] Resource instance state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.284+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: []
2024-12-17T13:14:27.284+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.285+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3031
2024-12-17T13:14:27.288+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.288+0530 [DEBUG] refresh: null_resource.create_keystores: no state, so not refreshing
2024-12-17T13:14:27.289+0530 [WARN] Provider "registry.terraform.io/hashicorp/null" produced an invalid plan for null_resource.create_keystores, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .triggers: planned value cty.UnknownVal(cty.Map(cty.String)) does not match config value cty.MapVal(map[string]cty.Value{"ca_cert_file":cty.UnknownVal(cty.String), "certificate_files":cty.UnknownVal(cty.String), "private_key_file":cty.UnknownVal(cty.String)})
2024-12-17T13:14:27.289+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.290+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3029
2024-12-17T13:14:27.293+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.294+0530 [DEBUG] building apply graph to check for errors
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
�[32m+�[0m create�[0m
Terraform will perform the following actions:
�[1m # local_file.ca_cert_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "ca_cert_file" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./ca_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # local_file.certificate_files�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "certificate_files" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./public_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # local_file.private_key_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "private_key_file" {
�[32m+�[0m�[0m content = (sensitive value)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./private_key.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # null_resource.create_keystores�[0m will be created
�[0m �[32m+�[0m�[0m resource "null_resource" "create_keystores" {
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m triggers = (known after apply)
}
�[1m # vault_pki_secret_backend_cert.server�[0m will be created
�[0m �[32m+�[0m�[0m resource "vault_pki_secret_backend_cert" "server" {
�[32m+�[0m�[0m auto_renew = false
�[32m+�[0m�[0m backend = "PKI_ISSUING_CA"
�[32m+�[0m�[0m ca_chain = (known after apply)
�[32m+�[0m�[0m certificate = (known after apply)
�[32m+�[0m�[0m common_name = "lb-do-order-api-stg.tgrc.tesco.org"
�[32m+�[0m�[0m expiration = (known after apply)
�[32m+�[0m�[0m format = "pem"
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m issuing_ca = (known after apply)
�[32m+�[0m�[0m min_seconds_remaining = 604800
�[32m+�[0m�[0m name = "server"
�[32m+�[0m�[0m private_key = (sensitive value)
�[32m+�[0m�[0m private_key_format = "pkcs8"
�[32m+�[0m�[0m private_key_type = (known after apply)
�[32m+�[0m�[0m renew_pending = (known after apply)
�[32m+�[0m�[0m revoke = false
�[32m+�[0m�[0m serial_number = (known after apply)
�[32m+�[0m�[0m ttl = "90d"
}
�[1mPlan:�[0m 6 to add, 0 to change, 0 to destroy.
�[0m2024-12-17T13:14:27.297+0530 [DEBUG] command: asking for input: "\nDo you want to perform these actions?"
�[0m�[1m
Do you want to perform these actions?�[0m
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
�[1mEnter a value:�[0m �[0m
Apply cancelled.
Panic Output
No response
Important Factoids
No response
References
No response
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered:
@amlijupnandanan Hello, I am sorry you are having trouble here! Could you please provide all of the Terraform configuration files to reproduce the issue? What you have provided is incomplete. Thanks!
Terraform Core Version
v1.9.7
Terraform Vault Provider Version
4.4.0
Vault Server Version
4.4.0
Affected Resource(s)
vault_pki_secret_backend_role
Expected Behavior
It should create the certificate
Actual Behavior
Plugin crashed
Relevant Error/Panic Output Snippet
Terraform Configuration Files
Steps to Reproduce
terraform apply
Debug Output
2024-12-17T13:14:26.883+0530 [INFO] Terraform version: 1.9.7
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/go-tfe v1.58.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/hcl/v2 v2.20.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/zclconf/go-cty v1.14.4
2024-12-17T13:14:26.883+0530 [INFO] Go runtime version: go1.22.7
2024-12-17T13:14:26.883+0530 [INFO] CLI args: []string{"terraform", "apply"}
2024-12-17T13:14:26.883+0530 [DEBUG] Attempting to open CLI config file: /Users/lijupnandanan/.terraformrc
2024-12-17T13:14:26.883+0530 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/.terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [INFO] CLI command args: []string{"apply"}
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "."
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "/opt/homebrew/bin"
2024-12-17T13:14:26.922+0530 [INFO] backend/local: starting Apply operation
2024-12-17T13:14:26.927+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.927+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.933+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:26.934+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3022
2024-12-17T13:14:26.934+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:26.943+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.943+0530"
2024-12-17T13:14:26.960+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:26.960+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin684749413 network=unix timestamp="2024-12-17T13:14:26.960+0530"
2024-12-17T13:14:26.977+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:26.978+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3022
2024-12-17T13:14:26.981+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:26.982+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.982+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.984+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:26.985+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3023
2024-12-17T13:14:26.985+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:26.993+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.993+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin503910970 network=unix timestamp="2024-12-17T13:14:27.010+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.023+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.023+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3023
2024-12-17T13:14:27.026+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.026+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.026+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.028+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.030+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3024
2024-12-17T13:14:27.030+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.045+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.045+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin3434689055 network=unix timestamp="2024-12-17T13:14:27.049+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.060+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.061+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3024
2024-12-17T13:14:27.064+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.065+0530 [DEBUG] Building and walking validate graph
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.ca_cert_file local_file.private_key_file]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] Starting graph walk: walkValidate
2024-12-17T13:14:27.068+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.068+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.070+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.071+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3025
2024-12-17T13:14:27.071+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.076+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.076+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin813324012 network=unix timestamp="2024-12-17T13:14:27.093+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.105+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.105+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.107+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.109+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3027
2024-12-17T13:14:27.109+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.117+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.117+0530"
2024-12-17T13:14:27.121+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.122+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: network=unix address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin610114588 timestamp="2024-12-17T13:14:27.121+0530"
2024-12-17T13:14:27.125+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.125+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.127+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.128+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3028
2024-12-17T13:14:27.128+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.133+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.133+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin201863507 network=unix timestamp="2024-12-17T13:14:27.150+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.165+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.165+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3027
2024-12-17T13:14:27.168+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.169+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.169+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3025
2024-12-17T13:14:27.172+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.173+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.174+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3028
2024-12-17T13:14:27.177+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.177+0530 [INFO] backend/local: apply calling Plan
2024-12-17T13:14:27.178+0530 [DEBUG] Building and walking plan graph for NormalMode
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.private_key_file (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.179+0530 [DEBUG] Starting graph walk: walkPlan
2024-12-17T13:14:27.179+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.179+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.180+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.181+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3029
2024-12-17T13:14:27.181+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.186+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.186+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin551876744 network=unix timestamp="2024-12-17T13:14:27.204+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.216+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.216+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.218+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.219+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3030
2024-12-17T13:14:27.219+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.228+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.228+0530"
2024-12-17T13:14:27.232+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.232+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin1443969778 network=unix timestamp="2024-12-17T13:14:27.232+0530"
2024-12-17T13:14:27.236+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.236+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.237+0530 [WARN] ValidateProviderConfig from "provider["registry.terraform.io/hashicorp/vault"]" changed the config value, but that value is unused
2024-12-17T13:14:27.238+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.239+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3031
2024-12-17T13:14:27.239+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.244+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.244+0530"
2024-12-17T13:14:27.262+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.262+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin862096226 network=unix timestamp="2024-12-17T13:14:27.262+0530"
2024-12-17T13:14:27.275+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.275+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.276+0530 [DEBUG] refresh: vault_pki_secret_backend_role.server: no state, so not refreshing
2024-12-17T13:14:27.278+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_role.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .email_protection_flag: planned value cty.False for a non-computed attribute
- .allow_glob_domains: planned value cty.False for a non-computed attribute
- .allow_wildcard_certificates: planned value cty.True for a non-computed attribute
- .client_flag: planned value cty.True for a non-computed attribute
- .code_signing_flag: planned value cty.False for a non-computed attribute
- .allow_subdomains: planned value cty.False for a non-computed attribute
- .allow_any_name: planned value cty.False for a non-computed attribute
- .allow_bare_domains: planned value cty.False for a non-computed attribute
- .server_flag: planned value cty.True for a non-computed attribute
- .use_csr_common_name: planned value cty.True for a non-computed attribute
- .use_csr_sans: planned value cty.True for a non-computed attribute
- .allow_ip_sans: planned value cty.True for a non-computed attribute
- .basic_constraints_valid_for_non_ca: planned value cty.False for a non-computed attribute
- .enforce_hostnames: planned value cty.True for a non-computed attribute
- .generate_lease: planned value cty.False for a non-computed attribute
- .key_type: planned value cty.StringVal("rsa") for a non-computed attribute
- .no_store: planned value cty.False for a non-computed attribute
- .allow_localhost: planned value cty.True for a non-computed attribute
- .allowed_domains_template: planned value cty.False for a non-computed attribute
- .key_bits: planned value cty.NumberIntVal(2048) for a non-computed attribute
- .require_cn: planned value cty.True for a non-computed attribute
2024-12-17T13:14:27.278+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.279+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: []
2024-12-17T13:14:27.279+0530 [DEBUG] refresh: vault_pki_secret_backend_cert.server: no state, so not refreshing
2024-12-17T13:14:27.280+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_cert.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .min_seconds_remaining: planned value cty.NumberIntVal(604800) for a non-computed attribute
- .auto_renew: planned value cty.False for a non-computed attribute
- .revoke: planned value cty.False for a non-computed attribute
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.281+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3030
2024-12-17T13:14:27.283+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.ca_cert_file: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.certificate_files: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.private_key_file: no state, so not refreshing
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.certificate_files, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.private_key_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.ca_cert_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [DEBUG] Resource instance state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.284+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: []
2024-12-17T13:14:27.284+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.285+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3031
2024-12-17T13:14:27.288+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.288+0530 [DEBUG] refresh: null_resource.create_keystores: no state, so not refreshing
2024-12-17T13:14:27.289+0530 [WARN] Provider "registry.terraform.io/hashicorp/null" produced an invalid plan for null_resource.create_keystores, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .triggers: planned value cty.UnknownVal(cty.Map(cty.String)) does not match config value cty.MapVal(map[string]cty.Value{"ca_cert_file":cty.UnknownVal(cty.String), "certificate_files":cty.UnknownVal(cty.String), "private_key_file":cty.UnknownVal(cty.String)})
2024-12-17T13:14:27.289+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.290+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3029
2024-12-17T13:14:27.293+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.294+0530 [DEBUG] building apply graph to check for errors
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
�[32m+�[0m create�[0m
Terraform will perform the following actions:
�[1m # local_file.ca_cert_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "ca_cert_file" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./ca_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # local_file.certificate_files�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "certificate_files" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./public_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # local_file.private_key_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "private_key_file" {
�[32m+�[0m�[0m content = (sensitive value)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./private_key.pem"
�[32m+�[0m�[0m id = (known after apply)
}
�[1m # null_resource.create_keystores�[0m will be created
�[0m �[32m+�[0m�[0m resource "null_resource" "create_keystores" {
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m triggers = (known after apply)
}
�[1m # vault_pki_secret_backend_cert.server�[0m will be created
�[0m �[32m+�[0m�[0m resource "vault_pki_secret_backend_cert" "server" {
�[32m+�[0m�[0m auto_renew = false
�[32m+�[0m�[0m backend = "PKI_ISSUING_CA"
�[32m+�[0m�[0m ca_chain = (known after apply)
�[32m+�[0m�[0m certificate = (known after apply)
�[32m+�[0m�[0m common_name = "lb-do-order-api-stg.tgrc.tesco.org"
�[32m+�[0m�[0m expiration = (known after apply)
�[32m+�[0m�[0m format = "pem"
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m issuing_ca = (known after apply)
�[32m+�[0m�[0m min_seconds_remaining = 604800
�[32m+�[0m�[0m name = "server"
�[32m+�[0m�[0m private_key = (sensitive value)
�[32m+�[0m�[0m private_key_format = "pkcs8"
�[32m+�[0m�[0m private_key_type = (known after apply)
�[32m+�[0m�[0m renew_pending = (known after apply)
�[32m+�[0m�[0m revoke = false
�[32m+�[0m�[0m serial_number = (known after apply)
�[32m+�[0m�[0m ttl = "90d"
}
�[1m # vault_pki_secret_backend_role.server�[0m will be created
�[0m �[32m+�[0m�[0m resource "vault_pki_secret_backend_role" "server" {
�[32m+�[0m�[0m allow_any_name = false
�[32m+�[0m�[0m allow_bare_domains = false
�[32m+�[0m�[0m allow_glob_domains = false
�[32m+�[0m�[0m allow_ip_sans = true
�[32m+�[0m�[0m allow_localhost = true
�[32m+�[0m�[0m allow_subdomains = false
�[32m+�[0m�[0m allow_wildcard_certificates = true
�[32m+�[0m�[0m allowed_domains = [
�[32m+�[0m�[0m "lb-do-order-api-stg.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13205bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13208bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13206bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13209bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13207bg1256.tgrc.tesco.org",
]
�[32m+�[0m�[0m allowed_domains_template = false
�[32m+�[0m�[0m allowed_uri_sans_template = (known after apply)
�[32m+�[0m�[0m backend = "PKI_ISSUING_CA"
�[32m+�[0m�[0m basic_constraints_valid_for_non_ca = false
�[32m+�[0m�[0m client_flag = true
�[32m+�[0m�[0m code_signing_flag = false
�[32m+�[0m�[0m email_protection_flag = false
�[32m+�[0m�[0m enforce_hostnames = true
�[32m+�[0m�[0m generate_lease = false
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m issuer_ref = (known after apply)
�[32m+�[0m�[0m key_bits = 2048
�[32m+�[0m�[0m key_type = "rsa"
�[32m+�[0m�[0m key_usage = (known after apply)
�[32m+�[0m�[0m max_ttl = (known after apply)
�[32m+�[0m�[0m name = "server"
�[32m+�[0m�[0m no_store = false
�[32m+�[0m�[0m not_before_duration = (known after apply)
�[32m+�[0m�[0m require_cn = true
�[32m+�[0m�[0m server_flag = true
�[32m+�[0m�[0m ttl = "90d"
�[32m+�[0m�[0m use_csr_common_name = true
�[32m+�[0m�[0m use_csr_sans = true
}
�[1mPlan:�[0m 6 to add, 0 to change, 0 to destroy.
�[0m2024-12-17T13:14:27.297+0530 [DEBUG] command: asking for input: "\nDo you want to perform these actions?"
�[0m�[1m
Do you want to perform these actions?�[0m
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
�[1mEnter a value:�[0m �[0m
Apply cancelled.
Panic Output
No response
Important Factoids
No response
References
No response
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: