Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug]: Error: The terraform-provider-vault_v4.4.0_x5 plugin crashed! #2383

Open
amlijupnandanan opened this issue Dec 17, 2024 · 1 comment
Labels

Comments

@amlijupnandanan
Copy link

Terraform Core Version

v1.9.7

Terraform Vault Provider Version

4.4.0

Vault Server Version

4.4.0

Affected Resource(s)

vault_pki_secret_backend_role

Expected Behavior

It should create the certificate

Actual Behavior

Plugin crashed

Relevant Error/Panic Output Snippet

Stack trace from the terraform-provider-vault_v4.4.0_x5 plugin:

panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x0 pc=0x1007ecbb8]

goroutine 39 [running]:
github.com/hashicorp/vault/api.(*Client).NewRequest(0x0?, {0x100dd1b7b?, 0x1001e5ed0?}, {0x14000049b20?, 0x1001e5f70?})
        github.com/hashicorp/vault/[email protected]/client.go:1300 +0x28
github.com/hashicorp/vault/api.(*Logical).WriteWithContext(0x14000a12db0, {0x101700020, 0x102165100}, {0x140005c9840, 0x1b}, 0x140009a5860)
        github.com/hashicorp/vault/[email protected]/logical.go:207 +0x68
github.com/hashicorp/vault/api.(*Logical).Write(...)
        github.com/hashicorp/vault/[email protected]/logical.go:203
github.com/hashicorp/terraform-provider-vault/vault.pkiSecretBackendRoleCreate({0x101700170, 0x14000026930}, 0x140000a1480, {0x10165a860, 0x14000928540})
        github.com/hashicorp/terraform-provider-vault/vault/resource_pki_secret_backend_role.go:522 +0x7a8
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).create(0x140006c0d20, {0x1017000c8, 0x1400079e090}, 0x140000a1480, {0x10165a860, 0x14000928540})
        github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/resource.go:778 +0xe4
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).Apply(0x140006c0d20, {0x1017000c8, 0x1400079e090}, 0x1400059ca90, 0x140000a1280, {0x10165a860, 0x14000928540})
        github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/resource.go:909 +0x884
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ApplyResourceChange(0x14000868cf0, {0x1017000c8?, 0x1400073bf50?}, 0x14000c0f270)
        github.com/hashicorp/terraform-plugin-sdk/[email protected]/helper/schema/grpc_provider.go:1074 +0xaa4
github.com/hashicorp/terraform-plugin-go/tfprotov5/tf5server.(*server).ApplyResourceChange(0x140007c81e0, {0x1017000c8?, 0x1400073b590?}, 0x14000026230)
        github.com/hashicorp/[email protected]/tfprotov5/tf5server/server.go:859 +0x3d0
github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ApplyResourceChange_Handler({0x1016a5a80, 0x140007c81e0}, {0x1017000c8, 0x1400073b590}, 0x140000a0980, 0x0)
        github.com/hashicorp/[email protected]/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:503 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x14000604200, {0x1017000c8, 0x1400056b800}, {0x101707440, 0x140007d6680}, 0x1400056d440, 0x1400086e930, 0x1020eb378, 0x0)
        google.golang.org/[email protected]/server.go:1385 +0xb40
google.golang.org/grpc.(*Server).handleStream(0x14000604200, {0x101707440, 0x140007d6680}, 0x1400056d440)
        google.golang.org/[email protected]/server.go:1796 +0xc00
google.golang.org/grpc.(*Server).serveStreams.func2.1()
        google.golang.org/[email protected]/server.go:1029 +0x8c
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 51
        google.golang.org/[email protected]/server.go:1040 +0x13c

Error: The terraform-provider-vault_v4.4.0_x5 plugin crashed!

This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.

Terraform Configuration Files

  source  = "hashicorp/vault"
  version = "4.4.0"
}
null = {
  source  = "hashicorp/null"
  version = "3.1.0"
}
local = {
  source  = "hashicorp/local"
  version = "2.2.3"
}

Steps to Reproduce

terraform apply

Debug Output

2024-12-17T13:14:26.883+0530 [INFO] Terraform version: 1.9.7
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/go-tfe v1.58.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/hcl/v2 v2.20.0
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1
2024-12-17T13:14:26.883+0530 [DEBUG] using github.com/zclconf/go-cty v1.14.4
2024-12-17T13:14:26.883+0530 [INFO] Go runtime version: go1.22.7
2024-12-17T13:14:26.883+0530 [INFO] CLI args: []string{"terraform", "apply"}
2024-12-17T13:14:26.883+0530 [DEBUG] Attempting to open CLI config file: /Users/lijupnandanan/.terraformrc
2024-12-17T13:14:26.883+0530 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/.terraform.d/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Users/lijupnandanan/Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins
2024-12-17T13:14:26.884+0530 [INFO] CLI command args: []string{"apply"}
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "."
2024-12-17T13:14:26.919+0530 [DEBUG] checking for provisioner in "/opt/homebrew/bin"
2024-12-17T13:14:26.922+0530 [INFO] backend/local: starting Apply operation
2024-12-17T13:14:26.927+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.927+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.933+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:26.934+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3022
2024-12-17T13:14:26.934+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:26.943+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.943+0530"
2024-12-17T13:14:26.960+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:26.960+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin684749413 network=unix timestamp="2024-12-17T13:14:26.960+0530"
2024-12-17T13:14:26.977+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:26.978+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3022
2024-12-17T13:14:26.981+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:26.982+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:26.982+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:26.984+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:26.985+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3023
2024-12-17T13:14:26.985+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:26.993+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:26.993+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin503910970 network=unix timestamp="2024-12-17T13:14:27.010+0530"
2024-12-17T13:14:27.010+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.023+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.023+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3023
2024-12-17T13:14:27.026+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.026+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.026+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.028+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.030+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3024
2024-12-17T13:14:27.030+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.045+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.045+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin3434689055 network=unix timestamp="2024-12-17T13:14:27.049+0530"
2024-12-17T13:14:27.049+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.060+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.061+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3024
2024-12-17T13:14:27.064+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.065+0530 [DEBUG] Building and walking validate graph
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.066+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.066+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.ca_cert_file local_file.private_key_file]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.067+0530 [DEBUG] Starting graph walk: walkValidate
2024-12-17T13:14:27.068+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.068+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.070+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.071+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3025
2024-12-17T13:14:27.071+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.076+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.076+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin813324012 network=unix timestamp="2024-12-17T13:14:27.093+0530"
2024-12-17T13:14:27.093+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.105+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.105+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.107+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.109+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3027
2024-12-17T13:14:27.109+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.117+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.117+0530"
2024-12-17T13:14:27.121+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.122+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: network=unix address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin610114588 timestamp="2024-12-17T13:14:27.121+0530"
2024-12-17T13:14:27.125+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.125+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.127+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.128+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3028
2024-12-17T13:14:27.128+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.133+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.133+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin201863507 network=unix timestamp="2024-12-17T13:14:27.150+0530"
2024-12-17T13:14:27.150+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.165+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.165+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3027
2024-12-17T13:14:27.168+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.169+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.169+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3025
2024-12-17T13:14:27.172+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.173+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.174+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3028
2024-12-17T13:14:27.177+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.177+0530 [INFO] backend/local: apply calling Plan
2024-12-17T13:14:27.178+0530 [DEBUG] Building and walking plan graph for NormalMode
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.178+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.private_key_file (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server (expand)]
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.178+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand)]
2024-12-17T13:14:27.179+0530 [DEBUG] Starting graph walk: walkPlan
2024-12-17T13:14:27.179+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.179+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.180+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5"]
2024-12-17T13:14:27.181+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 pid=3029
2024-12-17T13:14:27.181+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5
2024-12-17T13:14:27.186+0530 [INFO] provider.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.186+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin551876744 network=unix timestamp="2024-12-17T13:14:27.204+0530"
2024-12-17T13:14:27.204+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.216+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.216+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.218+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5"]
2024-12-17T13:14:27.219+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 pid=3030
2024-12-17T13:14:27.219+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5
2024-12-17T13:14:27.228+0530 [INFO] provider.terraform-provider-vault_v4.4.0_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.228+0530"
2024-12-17T13:14:27.232+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.232+0530 [DEBUG] provider.terraform-provider-vault_v4.4.0_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin1443969778 network=unix timestamp="2024-12-17T13:14:27.232+0530"
2024-12-17T13:14:27.236+0530 [DEBUG] created provider logger: level=debug
2024-12-17T13:14:27.236+0530 [INFO] provider: configuring client automatic mTLS
2024-12-17T13:14:27.237+0530 [WARN] ValidateProviderConfig from "provider["registry.terraform.io/hashicorp/vault"]" changed the config value, but that value is unused
2024-12-17T13:14:27.238+0530 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 args=[".terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5"]
2024-12-17T13:14:27.239+0530 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 pid=3031
2024-12-17T13:14:27.239+0530 [DEBUG] provider: waiting for RPC address: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5
2024-12-17T13:14:27.244+0530 [INFO] provider.terraform-provider-local_v2.2.3_x5: configuring server automatic mTLS: timestamp="2024-12-17T13:14:27.244+0530"
2024-12-17T13:14:27.262+0530 [DEBUG] provider: using plugin: version=5
2024-12-17T13:14:27.262+0530 [DEBUG] provider.terraform-provider-local_v2.2.3_x5: plugin address: address=/var/folders/03/8ssytc257vlgc7jsr244ph440000gn/T/plugin862096226 network=unix timestamp="2024-12-17T13:14:27.262+0530"
2024-12-17T13:14:27.275+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.275+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.276+0530 [DEBUG] refresh: vault_pki_secret_backend_role.server: no state, so not refreshing
2024-12-17T13:14:27.278+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_role.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .email_protection_flag: planned value cty.False for a non-computed attribute
- .allow_glob_domains: planned value cty.False for a non-computed attribute
- .allow_wildcard_certificates: planned value cty.True for a non-computed attribute
- .client_flag: planned value cty.True for a non-computed attribute
- .code_signing_flag: planned value cty.False for a non-computed attribute
- .allow_subdomains: planned value cty.False for a non-computed attribute
- .allow_any_name: planned value cty.False for a non-computed attribute
- .allow_bare_domains: planned value cty.False for a non-computed attribute
- .server_flag: planned value cty.True for a non-computed attribute
- .use_csr_common_name: planned value cty.True for a non-computed attribute
- .use_csr_sans: planned value cty.True for a non-computed attribute
- .allow_ip_sans: planned value cty.True for a non-computed attribute
- .basic_constraints_valid_for_non_ca: planned value cty.False for a non-computed attribute
- .enforce_hostnames: planned value cty.True for a non-computed attribute
- .generate_lease: planned value cty.False for a non-computed attribute
- .key_type: planned value cty.StringVal("rsa") for a non-computed attribute
- .no_store: planned value cty.False for a non-computed attribute
- .allow_localhost: planned value cty.True for a non-computed attribute
- .allowed_domains_template: planned value cty.False for a non-computed attribute
- .key_bits: planned value cty.NumberIntVal(2048) for a non-computed attribute
- .require_cn: planned value cty.True for a non-computed attribute
2024-12-17T13:14:27.278+0530 [DEBUG] Resource instance state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.279+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: []
2024-12-17T13:14:27.279+0530 [DEBUG] refresh: vault_pki_secret_backend_cert.server: no state, so not refreshing
2024-12-17T13:14:27.280+0530 [WARN] Provider "registry.terraform.io/hashicorp/vault" produced an invalid plan for vault_pki_secret_backend_cert.server, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .min_seconds_remaining: planned value cty.NumberIntVal(604800) for a non-computed attribute
- .auto_renew: planned value cty.False for a non-computed attribute
- .revoke: planned value cty.False for a non-computed attribute
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] Resource instance state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.280+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: []
2024-12-17T13:14:27.280+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.281+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/vault/4.4.0/darwin_arm64/terraform-provider-vault_v4.4.0_x5 id=3030
2024-12-17T13:14:27.283+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.ca_cert_file: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.certificate_files: no state, so not refreshing
2024-12-17T13:14:27.283+0530 [DEBUG] refresh: local_file.private_key_file: no state, so not refreshing
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.certificate_files, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.private_key_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [WARN] Provider "registry.terraform.io/hashicorp/local" produced an invalid plan for local_file.ca_cert_file, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .directory_permission: planned value cty.StringVal("0777") for a non-computed attribute
- .file_permission: planned value cty.StringVal("0777") for a non-computed attribute
2024-12-17T13:14:27.284+0530 [DEBUG] Resource instance state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.284+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: []
2024-12-17T13:14:27.284+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.285+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/local/2.2.3/darwin_arm64/terraform-provider-local_v2.2.3_x5 id=3031
2024-12-17T13:14:27.288+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.288+0530 [DEBUG] refresh: null_resource.create_keystores: no state, so not refreshing
2024-12-17T13:14:27.289+0530 [WARN] Provider "registry.terraform.io/hashicorp/null" produced an invalid plan for null_resource.create_keystores, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .triggers: planned value cty.UnknownVal(cty.Map(cty.String)) does not match config value cty.MapVal(map[string]cty.Value{"ca_cert_file":cty.UnknownVal(cty.String), "certificate_files":cty.UnknownVal(cty.String), "private_key_file":cty.UnknownVal(cty.String)})
2024-12-17T13:14:27.289+0530 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2024-12-17T13:14:27.290+0530 [INFO] provider: plugin process exited: plugin=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_arm64/terraform-provider-null_v3.1.0_x5 id=3029
2024-12-17T13:14:27.293+0530 [DEBUG] provider: plugin exited
2024-12-17T13:14:27.294+0530 [DEBUG] building apply graph to check for errors
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_role.server", instance vault_pki_secret_backend_role.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.certificate_files", instance local_file.certificate_files
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.private_key_file", instance local_file.private_key_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "vault_pki_secret_backend_cert.server", instance vault_pki_secret_backend_cert.server
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "local_file.ca_cert_file", instance local_file.ca_cert_file
2024-12-17T13:14:27.294+0530 [DEBUG] Resource state not found for node "null_resource.create_keystores", instance null_resource.create_keystores
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "null_resource.create_keystores" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/null"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_role.server" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.certificate_files" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "vault_pki_secret_backend_cert.server (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/vault"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.ca_cert_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ProviderTransformer: "local_file.private_key_file (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/local"]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores (expand)" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server (expand)" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/vault"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server (expand)" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_cert.server" references: [vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server (expand) vault_pki_secret_backend_role.server vault_pki_secret_backend_role.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "null_resource.create_keystores" references: [local_file.certificate_files local_file.certificate_files local_file.certificate_files (expand) local_file.ca_cert_file (expand) local_file.ca_cert_file local_file.ca_cert_file local_file.private_key_file local_file.private_key_file local_file.private_key_file (expand)]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/null"]" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.certificate_files (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "vault_pki_secret_backend_role.server" references: []
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.private_key_file (expand)" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "local_file.ca_cert_file" references: [vault_pki_secret_backend_cert.server (expand) vault_pki_secret_backend_cert.server vault_pki_secret_backend_cert.server]
2024-12-17T13:14:27.294+0530 [DEBUG] ReferenceTransformer: "provider["registry.terraform.io/hashicorp/local"]" references: []

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
�[32m+�[0m create�[0m

Terraform will perform the following actions:

�[1m # local_file.ca_cert_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "ca_cert_file" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./ca_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}

�[1m # local_file.certificate_files�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "certificate_files" {
�[32m+�[0m�[0m content = (known after apply)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./public_cert.pem"
�[32m+�[0m�[0m id = (known after apply)
}

�[1m # local_file.private_key_file�[0m will be created
�[0m �[32m+�[0m�[0m resource "local_file" "private_key_file" {
�[32m+�[0m�[0m content = (sensitive value)
�[32m+�[0m�[0m directory_permission = "0777"
�[32m+�[0m�[0m file_permission = "0777"
�[32m+�[0m�[0m filename = "./private_key.pem"
�[32m+�[0m�[0m id = (known after apply)
}

�[1m # null_resource.create_keystores�[0m will be created
�[0m �[32m+�[0m�[0m resource "null_resource" "create_keystores" {
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m triggers = (known after apply)
}

�[1m # vault_pki_secret_backend_cert.server�[0m will be created
�[0m �[32m+�[0m�[0m resource "vault_pki_secret_backend_cert" "server" {
�[32m+�[0m�[0m auto_renew = false
�[32m+�[0m�[0m backend = "PKI_ISSUING_CA"
�[32m+�[0m�[0m ca_chain = (known after apply)
�[32m+�[0m�[0m certificate = (known after apply)
�[32m+�[0m�[0m common_name = "lb-do-order-api-stg.tgrc.tesco.org"
�[32m+�[0m�[0m expiration = (known after apply)
�[32m+�[0m�[0m format = "pem"
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m issuing_ca = (known after apply)
�[32m+�[0m�[0m min_seconds_remaining = 604800
�[32m+�[0m�[0m name = "server"
�[32m+�[0m�[0m private_key = (sensitive value)
�[32m+�[0m�[0m private_key_format = "pkcs8"
�[32m+�[0m�[0m private_key_type = (known after apply)
�[32m+�[0m�[0m renew_pending = (known after apply)
�[32m+�[0m�[0m revoke = false
�[32m+�[0m�[0m serial_number = (known after apply)
�[32m+�[0m�[0m ttl = "90d"
}

�[1m # vault_pki_secret_backend_role.server�[0m will be created
�[0m �[32m+�[0m�[0m resource "vault_pki_secret_backend_role" "server" {
�[32m+�[0m�[0m allow_any_name = false
�[32m+�[0m�[0m allow_bare_domains = false
�[32m+�[0m�[0m allow_glob_domains = false
�[32m+�[0m�[0m allow_ip_sans = true
�[32m+�[0m�[0m allow_localhost = true
�[32m+�[0m�[0m allow_subdomains = false
�[32m+�[0m�[0m allow_wildcard_certificates = true
�[32m+�[0m�[0m allowed_domains = [
�[32m+�[0m�[0m "lb-do-order-api-stg.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13205bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13208bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13206bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13209bg1256.tgrc.tesco.org",
�[32m+�[0m�[0m "tpc13207bg1256.tgrc.tesco.org",
]
�[32m+�[0m�[0m allowed_domains_template = false
�[32m+�[0m�[0m allowed_uri_sans_template = (known after apply)
�[32m+�[0m�[0m backend = "PKI_ISSUING_CA"
�[32m+�[0m�[0m basic_constraints_valid_for_non_ca = false
�[32m+�[0m�[0m client_flag = true
�[32m+�[0m�[0m code_signing_flag = false
�[32m+�[0m�[0m email_protection_flag = false
�[32m+�[0m�[0m enforce_hostnames = true
�[32m+�[0m�[0m generate_lease = false
�[32m+�[0m�[0m id = (known after apply)
�[32m+�[0m�[0m issuer_ref = (known after apply)
�[32m+�[0m�[0m key_bits = 2048
�[32m+�[0m�[0m key_type = "rsa"
�[32m+�[0m�[0m key_usage = (known after apply)
�[32m+�[0m�[0m max_ttl = (known after apply)
�[32m+�[0m�[0m name = "server"
�[32m+�[0m�[0m no_store = false
�[32m+�[0m�[0m not_before_duration = (known after apply)
�[32m+�[0m�[0m require_cn = true
�[32m+�[0m�[0m server_flag = true
�[32m+�[0m�[0m ttl = "90d"
�[32m+�[0m�[0m use_csr_common_name = true
�[32m+�[0m�[0m use_csr_sans = true
}

�[1mPlan:�[0m 6 to add, 0 to change, 0 to destroy.
�[0m2024-12-17T13:14:27.297+0530 [DEBUG] command: asking for input: "\nDo you want to perform these actions?"
�[0m�[1m
Do you want to perform these actions?�[0m
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.

�[1mEnter a value:�[0m �[0m
Apply cancelled.

Panic Output

No response

Important Factoids

No response

References

No response

Would you like to implement a fix?

None

@fairclothjm
Copy link
Contributor

@amlijupnandanan Hello, I am sorry you are having trouble here! Could you please provide all of the Terraform configuration files to reproduce the issue? What you have provided is incomplete. Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants