Git Product home page Git Product logo

terraform-provider-alicloud's Introduction

Terraform Provider For Alibaba Cloud

Supported Versions

Terraform version minimum provider version maximum provider version
>= 0.11.x 1.0.0 latest

Requirements

  • Terraform 0.12.x
  • Go 1.20 (to build the provider plugin)
  • goimports:
    go get golang.org/x/tools/cmd/goimports
    

Building The Provider

Clone repository to: $GOPATH/src/github.com/aliyun/terraform-provider-alicloud

$ mkdir -p $GOPATH/src/github.com/aliyun; cd $GOPATH/src/github.com/aliyun
$ git clone [email protected]:aliyun/terraform-provider-alicloud

Enter the provider directory and build the provider

$ cd $GOPATH/src/github.com/aliyun/terraform-provider-alicloud
$ make build

Using the provider

Please see instructions on how to configure the Alibaba Cloud Provider.

Developing the Provider


If you wish to work on the provider, you'll first need Go installed on your machine (version 1.11+ is required). You'll also need to correctly setup a GOPATH, as well as adding $GOPATH/bin to your $PATH.

To compile the provider, run make build. This will build the provider and put the provider binary in the $GOPATH/bin directory.

$ make build
...
$ $GOPATH/bin/terraform-provider-alicloud
...

Running make dev or make devlinux or devwin will only build the specified developing provider which matchs the local system. And then, it will unarchive the provider binary and then replace the local provider plugin.

In order to test the provider, you can simply run make test.

$ make test

In order to run the full suite of Acceptance tests, run make testacc.

Note: Acceptance tests create real resources, and often cost money to run.

$ make testacc

Acceptance Testing

Before making a release, the resources and data sources are tested automatically with acceptance tests (the tests are located in the alicloud/*_test.go files). You can run them by entering the following instructions in a terminal:

cd $GOPATH/src/github.com/aliyun/terraform-provider-alicloud
export ALICLOUD_ACCESS_KEY=xxx
export ALICLOUD_SECRET_KEY=xxx
export ALICLOUD_REGION=xxx
export ALICLOUD_ACCOUNT_ID=xxx
export outfile=gotest.out
TF_ACC=1 TF_LOG=INFO go test ./alicloud -v -run=TestAccAlicloud -timeout=1440m | tee $outfile
go2xunit -input $outfile -output $GOPATH/tests.xml

-> Note: The last line is optional, it allows converting test results into an XML format compatible with xUnit.

-> Note: Most test cases will create PayAsYouGo resources when running above test command. However, currently not all account site type support create PayAsYouGo resources, so you need set your account site type before running the command:

# If your account belongs to domestic site
export ALICLOUD_ACCOUNT_SITE=Domestic

# If your account belongs to international site
export ALICLOUD_ACCOUNT_SITE=International

The setting of account site type can skip some unsupported cases automatically.

terraform-provider-alicloud's People

Contributors

anserhyb avatar catsby avatar chenhanzhang avatar chushenmeshile avatar dianmuali avatar fuliu-zln avatar huiguangjun avatar juhuahaoteng avatar lexsss avatar liuri1205 avatar lixue323 avatar malferov avatar mrwolong avatar panawala avatar pangjiping avatar rich-yi avatar shanye997 avatar super-eggs avatar susu9527 avatar talentning avatar thisnihonglei avatar wanghx0991 avatar xh4n3 avatar xiaosier avatar xiaozhu36 avatar zcc01029273 avatar zhaoguolong-sy2 avatar zhengjc2018 avatar zhuzhih2017 avatar zql-tqy avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

terraform-provider-alicloud's Issues

Error: alicloud_key_pairs.prod_ops: Provider doesn't support resource: alicloud_key_pairs

Hi there,

Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.

Terraform Version

Terraform v0.11.1

  • provider.alicloud v0.1.0

guide

I check the documents here:
http://47.95.33.19:4567/docs/providers/alicloud/d/instance_types.html

###issue
Error: alicloud_key_pairs.prod_ops: Provider doesn't support resource: alicloud_key_pairs

Random availability zone

Hi,

When you create an instance from Aliyun console, you can select Random availability and you are kinda of sure that the zone will have room for your new instance.

If there is a chance we could have this feature too? So we don't have to fill an availability zone and it just select one available when creating an instance?

Thanks.

Feature Request: Configure HTTPs in CDN

In the Alicloud console there are options to enable HTTPs for the CDN domain, but there don't seem to be any options for enabling and configuring HTTPs in the alicloud_cdn_domain resource.

Support https endpoint

Hello,

Please add support for https connection in provider configuration. Currently, all requests to AliCloud API are sent via HTTP protocol which is not secure and contains sensitive data like access key.

Example:

provider "alicloud" {
   access_key = "..."
   secret_key = "..."
   region = "...region..."
   https = true
}

This issue is very urgent from a security perspective.

Thanks,

Support for NAT GW as next hop in route entry

Hello,

According to the terraform documentation for alicloud_route_entry the following types of next hop are supported:

  • Instance (Default): Route the traffic destined for the destination CIDR block to an ECS instance in the VPC.
  • RouterInterface: Route the traffic destined for the destination CIDR block to a router interface.
  • VpnGateway: Route the traffic destined for the destination CIDR block to a VPN Gateway.
  • HaVip: Route the traffic destined for the destination CIDR block to an HAVIP.
  • NetworkInterface: Route the traffic destined for the destination CIDR block to an NetworkInterface.

The NAT gateway next hop type is missing here. The route can be created using portal UI, but such functionality is missing in terraform.

Thanks

could not get all domain name

Terraform Version

Terraform v0.11.10

  • provider.alicloud v1.29.0

Affected Resource(s)

  • data.alicloud_dns_domains

Terraform Configuration Files

data "alicloud_dns_domains" "all_domains" {
    domain_name_regex = ".*"
    output_file = "domains.txt"
}

output "all_domains" {
    value = ["${data.alicloud_dns_domains.all_domains.domains.*.domain_name}"]
}

Debug Output

the output as follow:

all_domains = [
3
]

Panic Output

If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the crash.log.

Expected Behavior

I want to get all domain name, not the number of domain name.

Actual Behavior

get the number of domain name

Steps to Reproduce

Please list the steps required to reproduce the issue, for example:

  1. terraform apply

Important Factoids

Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? Custom version of OpenStack? Tight ACLs?

References

Are there any other GitHub issues (open or closed) or Pull Requests that should be linked here? For example:

Instance Creation requires a vSwitch ID after using RunInstances

Hi there,

I am not sure if this is an intended fix/change or just a side effect of moving to RunInstances (#514). The error shows up for > 1.25.0 but is fine for < 1.24.0.

Terraform Version

0.11.11

Affected Resource(s)

Please list the resources as a list, for example:

  • alicloud_instance

Terraform Configuration Files

main.tf

provider "alicloud" {}

resource "alicloud_instance" "test" {
  count           = 2
  image_id        = "${var.image_id}"
  instance_type   = "${var.instance_type}"
  security_groups = ["${alicloud_security_group.default.id}"]
  tags            = "${var.tag}"
}

resource "alicloud_security_group" "default" {
  name        = "default"
  description = "default"
}

variables.tf

variable "tag" {
  type = "map"

  default = {
    "consul" = "server.test"
  }
}

variable "instance_type" {
  default = "ecs.n4.small"
}

variable "image_id" {
  default = "centos_7_04_64_20G_alibase_201701015.vhd"
}

Expected Behavior

An instance should be created.

Actual Behavior

Error: Error applying plan:

2 error(s) occurred:

* alicloud_instance.test[0]: 1 error(s) occurred:

* alicloud_instance.test.0: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:400, requestId:"F5CDE3A6-C2E9-418F-A8D8-EA70D68839F9", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidParameter.VSwitchId", recommend:"", message:"VSwitch id is required.", comment:""}
* alicloud_instance.test[1]: 1 error(s) occurred:

* alicloud_instance.test.1: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:400, requestId:"452C1FF6-2637-4A29-8D6E-757FA6B74D08", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidParameter.VSwitchId", recommend:"", message:"VSwitch id is required.", comment:""}

Steps to Reproduce

terraform apply

When apply error, How to automatically rollback?

resource "alicloud_instance" -> resource "alicloud_security_group"

when alicloud_security_group has been successful created๏ผŒbut alicloud_instance return error, can terraform autmatically rollback and delete alicloud_security_group?

terraform recreate ssh key

Hi

I tried to use Terraform recreate but it failed in alicloud due to ssh key already exists

I'd expect it to be able to be able to delete the old key and continue with the recreate

screen shot 2018-12-23 at 13 23 54

alicloud_dns_record - ttl value less than the minimum assigned successfully

Hi,

I created alicloud_dns_record with ttl=300 (which is less than minimum) successfully.
Once I ran "terraform apply" again on scripts with no changes, terraform recognized a change and print:
Terraform will perform the following actions:
~ alicloud_dns_record.dns-jumpbox
ttl: "600" => "300"

If I choose to apply the change, an exception is thrown
alicloud_dns_record.dns-jumpbox: UpdateDomainRecord got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:"3F219C8A-5C08-498D-9F4D-11EBC267728C"}, HostId:"alidns.aliyuncs.com", Code:"QuotaExceeded.TTL", Message:"The TTL value is less than the minimum value allowed."}, StatusCode:400}

Example for alicloud_dns_record:
resource "alicloud_dns_record" "dns-jumpbox" {
count = 1
name = ""
host_record = "****"
type = "A"
value = "
"
ttl = 300
}

Pls. advise!

There is no way to create DNS record with 2 or more IP

Terraform Version

Terraform v0.11.6

  • provider.alicloud v1.10.0

Affected Resource(s)

  • alicloud_dns_record

Current config to create a dns record example is:

resource "alicloud_dns_record" "record" {
  name = "example.com"
  host_record = "www"
  type = "A"
  value = "1.2.3.6"
}

How to bind 2 IPs to the same domain?

VPC deletion timeout

We had issues recently when deleting VPCs.
After creating a new VPC with terraform, we added a router interface manually using the aliyun webui.

When trying to delete the VPC on the webui, we get an error message telling us that a resource is using this VPC. Unfortunately, when trying to delete the VPC using terraform, the deletion step last few minutes and timeout without any specific error message.

PS: the router interface was using monthly billing.

Document and behaviour improvement for security group rule

Hi,

I was using Terraform 0.9.5 and just switched to 0.9.8 to double-check. The documentation is a bit misleading on the fact that either the SourceGroupId or SourceCidrIp is required. It should be mentioned.

Also if you specify any of the two it forces the creation of a new resource, which is annoying. So is there any chance a new resource would not be created when I reapply a plan I just applied and that completed perfectly fine?

Thanks,
Sonny

Problem updating SLB with 1.26

I have a problem updating or even accesing an exiting SLB with version 1.26
With the same scripts with 1.25 everything works.

The error is as follows:

Error: Error refreshing state: 1 error(s) occurred:

  • module.frontend_slb.alicloud_slb_listener.https: 1 error(s) occurred:

  • module.frontend_slb.alicloud_slb_listener.https: alicloud_slb_listener.https: DescribeLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:404, requestId:"643DB6D0-3942-4ED9-BC4B-E368BC12056F", hostId:"slb.aliyuncs.com", errorCode:"InvalidLoadBalancerId.NotFound", recommend:"", message:"The specified LoadBalancerId does not exist.", comment:""}

A manual call of DescribeLoadBalancerHTTPSListenerAttribute is also working without any issues.
The problem exists for all my SLBs.

Minimal Skript:

terraform {
  required_version = "~> 0.11"
}
provider "alicloud" {
  region  = "eu-central-1"
  version = "1.26"
}

resource "alicloud_slb" "milestone" {
  name                 = "w2b-dev-milestone-slb"
  internet             = true
  internet_charge_type = "PayByTraffic"
}

resource "alicloud_slb_listener" "https" {
  bandwidth        = -1
  load_balancer_id = "${alicloud_slb.milestone.id}"
  scheduler        = "wlc"
  backend_port       = "80"
  frontend_port      = "8888"
  protocol           = "https"
}

Can not handle `Condition` field in terraform in resource `alicloud_ram_policy`

Hi there,

Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.

Terraform Version

Terraform v0.11.11

Affected Resource(s)

  • alicloud_ram_policy

Terraform Configuration Files

{
    "Statement": [
        {
            "Action": "rds:*",
            "Effect": "Allow",
            "Resource": "*",
            "Condition": {
                "StringEquals": {
                    "rds:ResourceTag/env": "staging"
                }
            }
        },
        {
            "Action": "dms:LoginDatabase",
            "Effect": "Allow",
            "Resource": "*",
            "Condition": {
                "StringEquals": {
                    "rds:ResourceTag/env": "staging"
                }
            }
        },
        {
            "Action": "rds:DescribeTag*",
            "Effect": "Allow",
            "Resource": "*"
        }
    ],
    "Version": "1"
}

Issue

Can not handle Condition field in terraform.

alicloud_kvstore_instance, throwing warnings with terraform v0.11.11, and alicloud provider 1.28.0

Terraform Version

$ terraform -v
Terraform v0.11.11

Affected Resource(s)

alicloud provider: 1.28.0
Please list the resources as a list, for example:

  • alicloud_kv_store

Terraform Configuration Files

N/A

Debug Output

Warning: provider.alicloud: "fc": [DEPRECATED] Field 'fc' has been deprecated from provider version 1.28.0. New field 'fc' which in nested endpoints instead.



Warning: provider.alicloud: "log_endpoint": [DEPRECATED] Field 'log_endpoint' has been deprecated from provider version 1.28.0. New field 'log' which in nested endpoints instead.



Warning: provider.alicloud: "mns_endpoint": [DEPRECATED] Field 'mns_endpoint' has been deprecated from provider version 1.28.0. New field 'mns' which in nested endpoints instead.

Panic Output

N/A

Expected Behavior

should not have warning

Actual Behavior

throwing warnings
image

Steps to Reproduce

below terraform resource

provider "alicloud" {
  access_key = "xxxx"
  secret_key = "xxxxxx"
  region     = "cn-shenzhen"
}

resource "alicloud_kvstore_instance" "default" {
  instance_class = "redis.master.small.default"
  instance_name  = "myredis"
  password       = "Passw0rd"
  vswitch_id     = "vsw-<>"
}
terraform init
terraform apply

Important Factoids

N/A

References

N/A

Error: alicloud_key_pair.key_pair: Provider doesn't support resource: alicloud_key_pair

This issue was originally opened by @bhordupur as hashicorp/terraform#16857. It was migrated here as a result of the provider split. The original body of the issue is below.


Terraform Version

Terraform v0.11.1

Terraform Configuration Files

###Skipped the rest 
variable "private_key_file" {
  default = "alicloud_ssh_key.pem"
}

variable "key_name" {
  default = "key-pair-from-terraform"
}
resource "alicloud_key_pair" "key_pair" {
  key_name = "${var.key_name}"
  key_file = "${var.private_key_file}"
}

resource "alicloud_instance" "instance" {
  instance_name = "${var.short_name}-${var.role}-${format(var.count_format, count.index+1)}"
  host_name = "${var.short_name}-${var.role}-${format(var.count_format, count.index+1)}"
  image_id = "${var.image_id}"
  instance_type = "${data.alicloud_instance_types.instance_type.instance_types.0.id}"
  count = "${var.count}"
  availability_zone = "${var.availability_zones}"
  security_groups = ["${alicloud_security_group.group.*.id}"]

  internet_charge_type = "${var.internet_charge_type}"
  internet_max_bandwidth_out = "${var.internet_max_bandwidth_out}"
  io_optimized = "optimized"
  password = "${var.ecs_password}"
  key_name = "${alicloud_key_pair.key_pair.id}"

  allocate_public_ip = "${var.allocate_public_ip}"

  instance_charge_type = "PostPaid"
  system_disk_category = "${var.disk_category}"

  vswitch_id = "${alicloud_vswitch.main.id}"

  tags {
    role = "${var.role}"
    dc = "${var.datacenter}"
  }

}

Affected Resource(s)

  • alicloud_key_pair

Actual Behavior

Error: alicloud_instance.instance[0]: : invalid or unknown key: key_name
Error: alicloud_instance.instance[1]: : invalid or unknown key: key_name
Error: alicloud_key_pair.key_pair: Provider doesn't support resource: alicloud_key_pair

Steps to Reproduce

terraform plan

If specified the `vswitch_id`, then error with `Resource 'alicloud_vswitch.vswitch' not found for variable 'alicloud_vswitch.vswitch.id'`

Hi there,

If specified the vswitch_id, then error with Resource 'alicloud_vswitch.vswitch' not found for variable 'alicloud_vswitch.vswitch.id'

Terraform Version

terraform -v
Terraform v0.11.7

Affected Resource(s)

  • ess-scaling

Terraform Configuration Files

Check the examples/ess-scaling/

Debug Output

terraform plan

Warning: alicloud_ess_scaling_group.scaling: "vswitch_id": [DEPRECATED] Field 'vswitch_id' has been deprecated from provider version 1.7.1, and new field 'vswitch_ids' can replace it.



Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.

data.alicloud_zones.default: Refreshing state...
data.alicloud_images.ecs_image: Refreshing state...

------------------------------------------------------------------------

Error: Error running plan: 2 error(s) occurred:

* alicloud_security_group.sg: 1 error(s) occurred:

* alicloud_security_group.sg: Resource 'alicloud_vpc.vpc' not found for variable 'alicloud_vpc.vpc.id'
* alicloud_ess_scaling_group.scaling: 1 error(s) occurred:

* alicloud_ess_scaling_group.scaling: Resource 'alicloud_vswitch.vswitch' not found for variable 'alicloud_vswitch.vswitch.id'

Panic Output

NONE.

Expected Behavior

The alicloud_vswitch.vswitch should be created at lease once, then will be successfully used by resource 'alicloud_vswitch.vswitch' .

Actual Behavior

Not working, see "Debug Output"

Steps to Reproduce

  1. Modify the vswitch_id = "xxxxx" in file examples/ess-scaling/variables.tf

  2. terraform init

  3. terraform plan

alicloud_router_interface alicloud. ProviderError{errorCode:"Instance.Notfound", message:"The specified Router Interface ri-*** is not found."}

Hi,

Terraform Version

Terraform v0.11.10
provider "alicloud" {
version = "1.24.0"

Affected Resource(s)

Please list the resources as a list, for example:

resource "alicloud_router_interface" "init"

Terraform Configuration Files

resource "alicloud_router_interface" "init" {
opposite_region = "eu-central-1"
router_type = "VRouter"
router_id = "${alicloud_vpc.main.router_id}"
role = "InitiatingSide"
specification = "Large.2"
name = "perf-initia"
description = "perf-initiating side"
instance_charge_type = "PrePaid"
period = "1"
depends_on = ["alicloud_vpc.main"]
}

resource "alicloud_router_interface" "accept" {

opposite_region = "eu-central-1"
router_type = "VRouter"
router_id = "vrt-gw8phqv0trv9zc8888l7e"
role = "AcceptingSide"
specification = "Negative"
name = "accepting-side"
description = "Accepting side router interface"
instance_charge_type = "PostPaid"
}

Connection ROUTE

resource "alicloud_router_interface_connection" "init" {

interface_id = "${alicloud_router_interface.init.id}"
opposite_interface_id = "${alicloud_router_interface.accept.id}"
depends_on = ["alicloud_router_interface.init","alicloud_router_interface.accept","alicloud_router_interface_connection.accept"]
}

resource "alicloud_router_interface_connection" "accept" {

interface_id = "${alicloud_router_interface.accept.id}"
opposite_interface_id = "${alicloud_router_interface.init.id}"
depends_on = ["alicloud_router_interface.init"]
}

Debug Output

Error: Error applying plan:

1 error(s) occurred:

  • module.vpc.alicloud_router_interface.init: 1 error(s) occurred:

  • alicloud_router_interface.init: WaitForRouterInterface Idle got error: &alicloud.ProviderError{errorCode:"Instance.Notfound", message:"The specified Router Interface ri-gw8tofjdbfnnkv0tjlm2w is not found."}

Expected Behavior

created alicloud_router_interface initiating side

Actual Behavior

The specified Router Interface ri-gw8tofjdbfnnkv0tjlm2w is not found

Steps to Reproduce

terraform apply

Please look attached screenshot

Route interface was created without :
name = "perf-initia"
description = "perf-initiating side"

image

What is this Router Interface ri-gw8tofjdbfnnkv0tjlm2w ? ( which we see in error )

When run again "terraform apply" created new router interface successful

image

Issue happen 2-3 times on 10 attempts

when destroy, got the error: There is no any nodes in kubernetes cluster

Terraform Version

$ terraform -v
Terraform v0.11.8
+ provider.alicloud v1.26.0

Affected Resource(s)

Please list the resources as a list, for example:

  • alicloud_cs_kubernetes

Terraform Configuration Files

I used the example examples/kubernetes in this repo

https://github.com/terraform-providers/terraform-provider-alicloud/blob/master/examples/kubernetes/main.tf#L52-L71

Panic Output

Error: Error refreshing state: 1 error(s) occurred:

* alicloud_cs_kubernetes.k8s: 1 error(s) occurred:

* alicloud_cs_kubernetes.k8s: alicloud_cs_kubernetes.k8s: [ERROR] There is no any nodes in kubernetes cluster cd719983d556945009e0b173599832e6f.

Expected Behavior

command terraform destroy is failed

Actual Behavior

I have to login console, manually delete the cs kubernetes service, and re-run terraform destroy, it is successful

alicloud_key_pair.ssh_key resource long release time ( ErrorCode: KeyPair.AlreadyExist)

Hi there,

Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.

Terraform Version

Terraform v0.11.8

Affected Resource(s)

alicloud_key_pair.ssh_key

Expected Behavior

The alicloud_key_pair.ssh_key should be imidiatly deleted and by terraform destroy.

Actual Behavior

Despite the fact that we get success result from the terraform destroy command, the alicloud_key_pair.ssh_key resource can't be recreated for a hour with error:

alicloud_key_pair.ssh_key: Error Import KeyPair: SDK.ServerError
ErrorCode: KeyPair.AlreadyExist

Steps to Reproduce

Please list the steps required to reproduce the issue, for example:

  1. terraform destroy
  2. terraform apply

Important Factoids

Are there anything atypical about your accounts that we should know?
Running cloud foundry

Destroying VPC

Hi,

I have difficulties to destroy complete infrastructure through terraform.

It seems like if I have instances still running, it still tries to destroy the vswitch first while it should stop and release the instances first. And even if I remove the instances manually and retry the destroy of the rest it says the vpc has been destroyed, but it still here in Aliyun.

Thanks.

data_source_alicloud_zones KVStore filter fails - COMMODITY.INVALID_COMPONENT

Terraform Version

Terraform v0.11.8

  • provider.alicloud v1.26.0

Affected Resource(s)

  • data "alicloud_zones"

Terraform Configuration Files

provider "alicloud" {
  version    = "~> 1.26"
  region     = "ap-southeast-1"
}

data "alicloud_zones" "kvstore" {
  available_resource_creation = "KVStore"
}

resource "alicloud_vswitch" "redis" {
  availability_zone = "${data.alicloud_zones.kvstore.zones.0.id}"
  name              = "${format("%s-%s", module.redis_label.id, lookup(data.alicloud_zones.kvstore.zones[0],"id"))}"
  cidr_block        = "${cidrsubnet(data.terraform_remote_state.main.vpc_cidr,8,2)}"
  vpc_id            = "${data.terraform_remote_state.main.vpc_id}"
}

resource "alicloud_kvstore_instance" "redis" {
  instance_class = "redis.master.small.default"
  instance_charge_type = "PostPaid"
  instance_type  = "Redis"                         
  engine_version = "2.8"
  instance_name  = "myredis"
  password       = "Passw0rd"
  security_ips   = ["${data.terraform_remote_state.main.vpc_cidr}"]
}

Debug Output

* alicloud_kvstore_instance.redis: Error creating Alicloud db instance: &errors.ServerError{httpStatus:400, requestId:"5844FA44-ED47-475F-890E-364C27559E31", hostId:"r-kvstore.aliyuncs.com", errorCode:"COMMODITY.INVALID_COMPONENT", recommend:"", message:"Component choosed is not valid, please re choose it again.", comment:""}

Expected Behavior

Zone should be filtered down to ap-southeast-1b as only zones b and c are available in the console for PayAsYouGo standard package, Master-Slave 2.8 redis clusters

Actual Behavior

Zone ap-southeast-1a was used, causing this confusing, hardcoding ap-southeast-1b fixed the isssue

Steps to Reproduce

  1. terraform apply

alicloud_mongo_instances data has empty mongos list

I have a mongo DB instance on alicloud which has 2 nodes in replica mode. When I try to load this info via alicloud_mongo_instances it loads data about the mongo instance but the list of nodes under mongos is empty. In my state file I see the following, which is incorrect:

"instances.0.mongos.#": "0",

Without being able to load any info about the replica nodes I can't construct a mongo URL for my services to use.

Terraform Version

Terraform v0.11.11
provider.alicloud v1.26.0

Affected Resource(s)

Please list the resources as a list, for example:

  • data.alicloud_mongo_instances

Terraform Configuration Files

data "alicloud_mongo_instances" "example" {
  name_regex = "test"
}

alicloud_eip does not return ip_address in terraform apply

Hi all,

I am creating a set of Alicloud services (vpc, security group, eip ad instance). In my instance, I use a local-exec provisioner (ansible) so it needs the eip ip_address. However, I keep getting the following error:


Error: Error applying plan:

1 error(s) occurred:

* alicloud_instance.nodejs: 1 error(s) occurred:

* Resource 'alicloud_eip.eip' does not have attribute 'ip_address' for variable 'alicloud_eip.eip.ip_address'

Terraform version

Terraform v0.11.1
+ provider.alicloud v0.1.0

Terraform sample:

{
  "variable": {
    "ali_access_key": {
      "default": "**********"
    },
    "ali_secret_key": {
      "default": "*********"
    },
    "ali_region": {
      "default": "cn-hongkong"
    },
    "ali_image_id": {
      "default": "ubuntu_16_0402_64_20G_alibase_20170818.vhd"
    },
    "ali_io_optimized": {
      "default": "optimized"
    },
    "ali_security_groups": {
      "default": ["sg-j6c6v180xrx5me908r6c"]
    },
    "ali_instance_type": {
      "default": "ecs.n1.tiny"
    },
    "name": {
      "default": "node-test"
    },
    "user_data": {
      "default": "cloud-init-ubuntu.yaml"
    }
  },
  "data": {
    "alicloud_images": {
      "multi_image": {
        "owners": "system",
        "name_regex": "^ubuntu_16_0402_64"
      }
    }
  },
  "provider": {
    "alicloud": {
      "access_key": "${var.ali_access_key}",
      "secret_key": "${var.ali_secret_key}",
      "region": "${var.ali_region}"
    }
  },
  "resource": {
    "alicloud_vpc": {
      "vpc": {
        "cidr_block": "10.1.0.0/24",
        "name": "oneclick_vpc"
      }
    }
  },
  "resource": {
    "alicloud_security_group": {
      "sg": {
        "vpc_id": "${alicloud_vpc.vpc.id}",
        "name": "settler_sg"
      }
    }
  },
  "resource": {
    "alicloud_security_group_rule": {
      "allow_ssh": {
        "type": "ingress",
        "ip_protocol": "tcp",
        "nic_type": "intranet",
        "policy": "accept",
        "port_range": "22/22",
        "security_group_id": "${alicloud_security_group.sg.id}",
        "cidr_ip": "0.0.0.0/0"
      }
    }
  },
  "resource": {
    "alicloud_security_group_rule": {
      "open_outbound": {
        "type": "egress",
        "ip_protocol": "tcp",
        "nic_type": "intranet",
        "policy": "accept",
        "port_range": "1/65535",
        "security_group_id": "${alicloud_security_group.sg.id}",
        "cidr_ip": "0.0.0.0/0"
      }
    }
  },
  "resource": {
    "alicloud_vswitch": {
      "vsw": {
        "vpc_id": "${alicloud_vpc.vpc.id}",
        "cidr_block": "10.1.0.0/24",
        "availability_zone": "cn-hongkong-b"
      }
    }
  },
  "resource": {
    "alicloud_eip": {
      "eip": {
        "internet_charge_type": "PayByTraffic"
      }
    }
  },
  "resource": {
    "alicloud_eip_association": {
      "eip_asso": {
        "allocation_id": "${alicloud_eip.eip.id}",
        "instance_id": "${alicloud_instance.nodejs.id}"
      }
    }
  },
  "resource": {
    "alicloud_instance": {
      "nodejs": {
        "instance_type": "${var.ali_instance_type}",
        "io_optimized": "${var.ali_io_optimized}",
        "image_id": "${var.ali_image_id}",
        "instance_name": "${var.name}",
        "security_groups": ["${alicloud_security_group.sg.id}"],
        "user_data": "${file(\"${var.user_data}\")}",
        "vswitch_id": "${alicloud_vswitch.vsw.id}",
        "system_disk_category": "cloud_efficiency",
        "internet_max_bandwidth_out": 5,
        "allocate_public_ip": true,
        "provisioner": {
          "local-exec": {
            "command": "ansible-playbook /v6.yml -i ${alicloud_eip.eip.ip_address}, -u test_user --private-key=id_rsa -e 'ansible_python_interpreter=/usr/bin/python3'"
          }
        }
      }
    }
  }
}

Steps to reproduce

  • terraform apply

Expected result
Ansible to run on the eip ip address

TERRAFORM CRASH when runnning terraform plan on docker image hashicorp/terraform:light

This issue was originally opened by @nobjohns as hashicorp/terraform#18289. It was migrated here as a result of the provider split. The original body of the issue is below.


Terraform Version

Terraform v0.11.7

Terraform Configuration Files

Not Applicable

Debug Output

[root@localhost]# docker run -i -t -v $(pwd):/app/ -w /app/ ' hashicorp/terraform:light plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.


Error: Error refreshing state: 1 error(s) occurred:

* provider.alicloud: unexpected EOF


panic: open /usr/local/go/lib/time/zoneinfo.zip: no such file or directory
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4:
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: goroutine 40 [running]:
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/utils.GetTimeInFormatISO8601(0x1543300, 0xc42018fb60)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/utils/utils.go:57 +0x142
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.completeRpcSignParams(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/rpc_signature_composer.go:47 +0x1e1
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.signRpcRequest(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0xc4202b31d8, 0x7)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/rpc_signature_composer.go:26 +0x73
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth.Sign(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x134d0bb, 0x8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/signer.go:87 +0x2a1
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.buildHttpRequest(0x2f0a660, 0xc42041aba0, 0x2ef6980, 0xc42000cb48, 0x1867be8, 0xa, 0x200202b3260, 0x8, 0x8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:282 +0x84
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoActionWithSigner(0xc420060640, 0x2f0a660, 0xc42041aba0, 0x2ef6b60, 0xc42000cb60, 0x0, 0x0, 0x1, 0xc42014fac0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:236 +0x3bd
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoAction(0xc420060640, 0x2f0a660, 0xc42041aba0, 0x2ef6b60, 0xc42000cb60, 0xb10000000170b600, 0xb1aa64e6adba15ff)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:151 +0x65
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).ProcessCommonRequest(0xc420060640, 0xc42041aba0, 0x0, 0xc4200666c0, 0xc42018fb70)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:388 +0xa7
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).ProcessCommonRequest-fm(0xc42041aba0, 0xc42018fb60, 0x1861699, 0x4)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:170 +0x34
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints.(*LocationResolver).TryResolve(0x2f935c0, 0xc42041ab40, 0x0, 0x0, 0xc42017f500, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints/location_resolver.go:70 +0x5a5
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints.Resolve(0xc42041ab40, 0xc4203d88f0, 0x7, 0x12, 0xc420066408)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/endpoints/resolver.go:40 +0x8a
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoActionWithSigner(0xc420060640, 0x2f180a0, 0xc420072cb0, 0x2efb360, 0xc42018fb00, 0x0, 0x0, 0xa6387b68bb3fc701, 0xc42014fa80)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:217 +0x2f4
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk.(*Client).DoAction(0xc420060640, 0x2f180a0, 0xc420072cb0, 0x2efb360, 0xc42018fb00, 0x0, 0xc420066360)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/sdk/client.go:151 +0x65
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/services/ecs.(*Client).DescribeRegions(0xc420060640, 0xc420072cb0, 0x186f7f2, 0x11, 0xc4200663f8)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/aliyun/alibaba-cloud-sdk-go/services/ecs/describe_regions.go:27 +0x9b
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.(*Config).ecsConn(0xc4202b3a38, 0x0, 0x0, 0xc42041f0e0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/config.go:178 +0x50f
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.(*Config).Client(0xc420403a38, 0x186f48f, 0x11, 0x149f2c0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/config.go:71 +0x67
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.providerConfigure(0xc420072c40, 0xc420072c40, 0xc420107f80, 0xc420218660, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/provider.go:167 +0x2e6
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Configure(0xc42021bb90, 0xc420107f80, 0xc420218620, 0xc420218640)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:240 +0xdf
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Configure(0xc420219600, 0xc420107f80, 0xc42000c8b0, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:478 +0x42
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: reflect.Value.call(0xc4202fd3e0, 0xc42000c018, 0x13, 0x18614d5, 0x4, 0xc4203a2f20, 0x3, 0x3, 0xc4203bfee8, 0xc42030a098, ...)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/usr/local/go/src/reflect/value.go:434 +0x905
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: reflect.Value.Call(0xc4202fd3e0, 0xc42000c018, 0x13, 0xc4203bff20, 0x3, 0x3, 0xc400000003, 0x0, 0x0)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/usr/local/go/src/reflect/value.go:302 +0xa4
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: net/rpc.(*service).call(0xc42014e100, 0xc420060050, 0xc42046a050, 0xc42006a080, 0xc4202180a0, 0x16b75c0, 0xc420107f80, 0x16, 0x143ffa0, 0xc42000c8b0, ...)
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/usr/local/go/src/net/rpc/server.go:381 +0x142
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: created by net/rpc.(*Server).ServeCodec
2018-06-20T05:14:30.859Z [DEBUG] plugin.terraform-provider-alicloud_v1.9.4_x4: 	/usr/local/go/src/net/rpc/server.go:475 +0x36b
2018-06-20T05:14:30.859Z [DEBUG] plugin: plugin process exited: path=/app/.terraform/plugins/linux_amd64/terraform-provider-alicloud_v1.9.4_x4



!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!

Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform[1] so that we can fix this.

When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.

[1]: https://github.com/hashicorp/terraform/issues

!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
[root@localhost]#

Crash Output

Expected Behavior

terraform plan should complete successfully.

Actual Behavior

terraform plan getting crashed.

Steps to Reproduce

  1. docker run -i -t -v $(pwd):/app/ -w /app/ ' hashicorp/terraform:light plan

Additional Context

References

I got a crash when I use terraform to create vpc with alicloud plugin:

This issue was originally opened by @teachmyself as hashicorp/terraform#17566. It was migrated here as a result of the provider split. The original body of the issue is below.


Terraform Version

Terraform v0.11.3
+ provider.alicloud v1.8.1

Terraform Configuration Files

provider "alicloud" {
    access_key = "xxxx"
    secret_key = "xxxxx"
    region     = "cn-beijing"
}

resource "alicloud_vpc" "demo" {
    name = "demo"
    description = "demo"
    cidr_block = "192.168.0.0/16"
}

Debug Output

Crash Output

2018/03/13 16:37:09 [INFO] Terraform version: 0.11.3  3802b14260603f90c7a1faf55994dcc8933e2069
2018/03/13 16:37:09 [INFO] Go runtime version: go1.9.1
2018/03/13 16:37:09 [INFO] CLI args: []string{"/Users/hanyouqing/Server/bin/terraform", "plan"}
2018/03/13 16:37:09 [DEBUG] Attempting to open CLI config file: /Users/hanyouqing/.terraformrc
2018/03/13 16:37:09 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2018/03/13 16:37:09 [INFO] CLI command args: []string{"plan"}
2018/03/13 16:37:09 [INFO] command: empty terraform config, returning nil
2018/03/13 16:37:09 [DEBUG] command: no data state file found for backend config
2018/03/13 16:37:09 [DEBUG] New state was assigned lineage "aeed91aa-96fc-4c76-b290-a5d520dca880"
2018/03/13 16:37:09 [INFO] command: backend initialized: <nil>
2018/03/13 16:37:09 [DEBUG] checking for provider in "."
2018/03/13 16:37:09 [DEBUG] checking for provider in "/Users/hanyouqing/Server/bin"
2018/03/13 16:37:09 [WARN] found legacy provider "terraform-provider-alicloud.bk"
2018/03/13 16:37:09 [DEBUG] checking for provider in ".terraform/plugins/darwin_amd64"
2018/03/13 16:37:09 [DEBUG] found provider "terraform-provider-alicloud_v1.8.1_x4"
2018/03/13 16:37:09 [DEBUG] found valid plugin: "alicloud.bk", "0.0.0", "/Users/hanyouqing/Server/bin/terraform-provider-alicloud.bk"
2018/03/13 16:37:09 [DEBUG] found valid plugin: "alicloud", "1.8.1", "/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4"
2018/03/13 16:37:09 [DEBUG] checking for provisioner in "."
2018/03/13 16:37:09 [DEBUG] checking for provisioner in "/Users/hanyouqing/Server/bin"
2018/03/13 16:37:09 [DEBUG] checking for provisioner in ".terraform/plugins/darwin_amd64"
2018/03/13 16:37:09 [INFO] command: backend <nil> is not enhanced, wrapping in local
2018/03/13 16:37:09 [INFO] backend/local: starting Plan operation
2018/03/13 16:37:09 [DEBUG] New state was assigned lineage "c3a632d7-9941-4099-aa86-3ed005c9ab57"
2018/03/13 16:37:09 [INFO] terraform: building graph: GraphTypeInput
2018/03/13 16:37:09 [TRACE] ConfigTransformer: Starting for path: []
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ConfigTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.LocalTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OutputTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OrphanResourceTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.OrphanOutputTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] AttachResourceConfigTransformer: Beginning...
2018/03/13 16:37:09 [TRACE] AttachResourceConfigTransformer: Attach resource config request: alicloud_vpc.demo
2018/03/13 16:37:09 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"demo", Type:"alicloud_vpc", RawCount:(*config.RawConfig)(0xc420391b90), RawConfig:(*config.RawConfig)(0xc420391b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.AttachStateTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RootVariableTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] ProviderConfigTransformer: Starting for path: []
2018/03/13 16:37:09 [TRACE] Attach provider request: []string{} alicloud
2018/03/13 16:37:09 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"alicloud", Alias:"", Version:"1.8.1", RawConfig:(*config.RawConfig)(0xc420391ab0)}
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ProviderConfigTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.MissingProviderTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] resource alicloud_vpc.demo using provider provider.alicloud
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ProviderTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.PruneProviderTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ParentProviderTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.graphTransformerMulti:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ModuleVariableTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RemovedModuleTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_access_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_secret_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_region" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_password" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_name" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_description" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.alicloud_cidr_block" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_access_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "provider.alicloud" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_secret_key" references: []
2018/03/13 16:37:09 [DEBUG] ReferenceTransformer: "var.aws_region" references: []
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.ReferenceTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CountBoundaryTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.TargetsTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CloseProviderTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.RootTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
root - terraform.graphNodeRoot
  meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:

alicloud_vpc.demo - *terraform.NodeAbstractResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeAbstractResource
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeAbstractResource
root - terraform.graphNodeRoot
  meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:09 [DEBUG] Starting graph walk: walkInput
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "root"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "provider.alicloud (close)"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "alicloud_vpc.demo" waiting on "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "provider.alicloud (close)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "root" waiting on "provider.alicloud (close)"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "alicloud_vpc.demo", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "provider.alicloud (close)", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_vpc_description"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_vpc_description': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_secret_key"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_secret_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_secret_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_region"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_password"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_password': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_access_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_secret_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "provider.alicloud"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.aws_access_key"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_access_key': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_cidr_block"
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_region"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_cidr_block': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_region': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.aws_region': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.provider.alicloud': walking
2018/03/13 16:37:09 [TRACE] dag/walk: walking "var.alicloud_vpc_name"
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_vpc_name': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.var.alicloud_access_key': walking
2018/03/13 16:37:09 [TRACE] vertex 'root.provider.alicloud': evaluating
2018/03/13 16:37:09 [TRACE] [walkInput] Entering eval tree: provider.alicloud
2018/03/13 16:37:09 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:09 [TRACE] root: eval: *terraform.EvalInitProvider
2018-03-13T16:37:09.897+0800 [DEBUG] plugin: starting plugin: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4 args=[/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4]
2018-03-13T16:37:09.902+0800 [DEBUG] plugin: waiting for RPC address: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4
2018-03-13T16:37:10.138+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 2018/03/13 16:37:10 [DEBUG] plugin: plugin address: unix /var/folders/31/3h5llf9d7g7b916t0l89dnvh0000gn/T/plugin015133682
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalOpFilter
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInputProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': evaluating
2018/03/13 16:37:10 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] [walkInput] Entering eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCloseProvider
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2018/03/13 16:37:10 [TRACE] [walkInput] Entering eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] [walkInput] Exiting eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] dag/walk: walking "root"
2018/03/13 16:37:10 [TRACE] vertex 'root.root': walking
2018/03/13 16:37:10 [INFO] terraform: building graph: GraphTypeValidate
2018/03/13 16:37:10 [TRACE] ConfigTransformer: Starting for path: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ConfigTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.LocalTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OutputTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OrphanResourceTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.OrphanOutputTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] AttachResourceConfigTransformer: Beginning...
2018/03/13 16:37:10 [TRACE] AttachResourceConfigTransformer: Attach resource config request: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Attaching resource config: &config.Resource{Mode:0, Name:"demo", Type:"alicloud_vpc", RawCount:(*config.RawConfig)(0xc420391b90), RawConfig:(*config.RawConfig)(0xc420391b20), Provisioners:[]*config.Provisioner(nil), Provider:"", DependsOn:[]string(nil), Lifecycle:config.ResourceLifecycle{CreateBeforeDestroy:false, PreventDestroy:false, IgnoreChanges:[]string(nil)}}
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachResourceConfigTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachStateTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootVariableTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] ProviderConfigTransformer: Starting for path: []
2018/03/13 16:37:10 [TRACE] Attach provider request: []string{} alicloud
2018/03/13 16:37:10 [TRACE] Attaching provider config: *config.ProviderConfig{Name:"alicloud", Alias:"", Version:"1.8.1", RawConfig:(*config.RawConfig)(0xc420391ab0)}
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProviderConfigTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.MissingProviderTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] resource alicloud_vpc.demo using provider provider.alicloud
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProviderTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.PruneProviderTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ParentProviderTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.graphTransformerMulti:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.MissingProvisionerTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ProvisionerTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.graphTransformerMulti:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ModuleVariableTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RemovedModuleTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_access_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_secret_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_region" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_name" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_vpc_description" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_access_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_secret_key" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_cidr_block" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.aws_region" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "provider.alicloud" references: []
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "var.alicloud_password" references: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ReferenceTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CountBoundaryTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TargetsTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CloseProviderTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.CloseProvisionerTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
root - terraform.graphNodeRoot
  meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TransitiveReductionTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResource
  provider.alicloud - *terraform.NodeApplyableProvider
meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  alicloud_vpc.demo - *terraform.NodeValidatableResource
  var.alicloud_access_key - *terraform.NodeRootVariable
  var.alicloud_cidr_block - *terraform.NodeRootVariable
  var.alicloud_password - *terraform.NodeRootVariable
  var.alicloud_region - *terraform.NodeRootVariable
  var.alicloud_secret_key - *terraform.NodeRootVariable
  var.alicloud_vpc_description - *terraform.NodeRootVariable
  var.alicloud_vpc_name - *terraform.NodeRootVariable
  var.aws_access_key - *terraform.NodeRootVariable
  var.aws_region - *terraform.NodeRootVariable
  var.aws_secret_key - *terraform.NodeRootVariable
provider.alicloud - *terraform.NodeApplyableProvider
provider.alicloud (close) - *terraform.graphNodeCloseProvider
  alicloud_vpc.demo - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
  meta.count-boundary (count boundary fixup) - *terraform.NodeCountBoundary
  provider.alicloud (close) - *terraform.graphNodeCloseProvider
var.alicloud_access_key - *terraform.NodeRootVariable
var.alicloud_cidr_block - *terraform.NodeRootVariable
var.alicloud_password - *terraform.NodeRootVariable
var.alicloud_region - *terraform.NodeRootVariable
var.alicloud_secret_key - *terraform.NodeRootVariable
var.alicloud_vpc_description - *terraform.NodeRootVariable
var.alicloud_vpc_name - *terraform.NodeRootVariable
var.aws_access_key - *terraform.NodeRootVariable
var.aws_region - *terraform.NodeRootVariable
var.aws_secret_key - *terraform.NodeRootVariable
2018/03/13 16:37:10 [DEBUG] Starting graph walk: walkValidate
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "root"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "provider.alicloud (close)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "alicloud_vpc.demo" waiting on "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "root" waiting on "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_region"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] dag/walk: added edge: "meta.count-boundary (count boundary fixup)" waiting on "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "alicloud_vpc.demo", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "provider.alicloud (close)", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (count boundary fixup)", sending new deps
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_password"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_password': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_vpc_name"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_vpc_name': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_access_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_access_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_cidr_block"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_cidr_block': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud"
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_vpc_description"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_vpc_description': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_secret_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_secret_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_access_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_access_key': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_secret_key"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_secret_key': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.alicloud_region"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.alicloud_region': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "var.aws_region"
2018/03/13 16:37:10 [TRACE] vertex 'root.var.aws_region': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInitProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalOpFilter
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolateProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalBuildProviderConfig
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateProvider
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] root: eval: terraform.EvalNoop
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: provider.alicloud
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolate
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalIf
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateCount
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundary
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': expanding/walking dynamic subgraph
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ResourceCountTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [DEBUG] Resource state not found for "alicloud_vpc.demo": alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.AttachStateTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.TargetsTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [DEBUG] ReferenceTransformer: "alicloud_vpc.demo" references: []
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.ReferenceTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] Graph after step *terraform.RootTransformer:

alicloud_vpc.demo - *terraform.NodeValidatableResourceInstance
2018/03/13 16:37:10 [TRACE] dag/walk: added new vertex: "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] dag/walk: walking "alicloud_vpc.demo"
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.alicloud_vpc.demo': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalSequence
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateResourceSelfRef
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalGetProvider
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalInterpolate
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalValidateResource
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: panic: interface conversion: interface {} is string, not int
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4:
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: goroutine 50 [running]:
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/alicloud.validateIntegerInRange.func1(0x1bf9600, 0xc420444370, 0x1e7e12b, 0xb, 0x0, 0x0, 0x400204442b0, 0x10, 0xc42031b258, 0x10104f7)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/alicloud/validators.go:558 +0x2e4
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validatePrimitive(0xc42037de30, 0x1e7e12b, 0xb, 0x1bf9600, 0xc420444160, 0xc4203d9e00, 0xc42044a060, 0x98, 0x0, 0xc42044c0c9, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1490 +0x510
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validateType(0xc42037de30, 0x1e7e12b, 0xb, 0x1bf9600, 0xc420444160, 0xc4203d9e00, 0xc42044a060, 0xc42044c0c8, 0x0, 0x0, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1509 +0x5e5
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validate(0xc42037de30, 0x1e7e12b, 0xb, 0xc4203d9e00, 0xc42044a060, 0x1, 0x0, 0x0, 0x0, 0x0, ...)
2018-03-13T16:37:10.153+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1162 +0x20a
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.validateObject(0xc42037de30, 0x0, 0x0, 0xc42037de30, 0xc42044a060, 0xc4204441a0, 0x100dfa4, 0x1d7a5c0, 0x1cde4e0, 0xc4204441a0, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:1403 +0x1bf
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.schemaMap.Validate(0xc42037de30, 0xc42044a060, 0x1cde4e0, 0xc4204441a0, 0x1d7a5c0, 0xc42044a150, 0x1d7a5c0, 0x100ba5e)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/schema.go:542 +0x50
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Validate(0xc4203b19e0, 0xc42044a060, 0xc42044c0b0, 0xc, 0xc4203f87e0, 0x1, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:236 +0x50
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).ValidateResource(0xc4202eb260, 0xc42044c0b0, 0xc, 0xc42044a060, 0xc42035dae8, 0xc4202e2b28, 0x10104f7, 0xc42044a180, 0x30, 0x28)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:216 +0x1d3
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).ValidateResource(0xc4202edc80, 0xc420446020, 0xc42044a0f0, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/opt/teamcity-agent/work/222ea50a1b4f75f4/src/github.com/terraform-providers/terraform-provider-alicloud/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:463 +0x6e
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: reflect.Value.call(0xc42035daa0, 0xc42030c8d0, 0x13, 0x1e77150, 0x4, 0xc4202e2f20, 0x3, 0x3, 0xc4202f3ee8, 0xc4202bc4f8, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/usr/local/go/src/reflect/value.go:434 +0x905
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: reflect.Value.Call(0xc42035daa0, 0xc42030c8d0, 0x13, 0xc4202f3f20, 0x3, 0x3, 0xc400000001, 0x0, 0x0)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/usr/local/go/src/reflect/value.go:302 +0xa4
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: net/rpc.(*service).call(0xc4202d5640, 0xc4203002d0, 0xc4202d67b0, 0xc420327000, 0xc420408240, 0x1bbac80, 0xc420446020, 0x16, 0x1bbacc0, 0xc42044a0f0, ...)
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/usr/local/go/src/net/rpc/server.go:381 +0x142
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: created by net/rpc.(*Server).ServeCodec
2018-03-13T16:37:10.154+0800 [DEBUG] plugin.terraform-provider-alicloud_v1.8.1_x4: 	/usr/local/go/src/net/rpc/server.go:475 +0x36b
2018/03/13 16:37:10 [ERROR] root: eval: *terraform.EvalValidateResource, err: Warnings: []. Errors: [unexpected EOF]
2018/03/13 16:37:10 [ERROR] root: eval: *terraform.EvalSequence, err: Warnings: []. Errors: [unexpected EOF]
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: alicloud_vpc.demo
2018/03/13 16:37:10 [TRACE] dag/walk: walking "provider.alicloud (close)"
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': walking
2018/03/13 16:37:10 [TRACE] dag/walk: walking "meta.count-boundary (count boundary fixup)"
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': walking
2018/03/13 16:37:10 [TRACE] vertex 'root.provider.alicloud (close)': evaluating
2018/03/13 16:37:10 [TRACE] vertex 'root.meta.count-boundary (count boundary fixup)': evaluating
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCountFixZeroOneBoundaryGlobal
2018/03/13 16:37:10 [TRACE] [walkValidate] Entering eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: meta.count-boundary (count boundary fixup)
2018/03/13 16:37:10 [TRACE] root: eval: *terraform.EvalCloseProvider
2018/03/13 16:37:10 [TRACE] [walkValidate] Exiting eval tree: provider.alicloud (close)
2018/03/13 16:37:10 [TRACE] dag/walk: walking "root"
2018/03/13 16:37:10 [TRACE] vertex 'root.root': walking
2018/03/13 16:37:10 [DEBUG] plugin: waiting for all plugin processes to complete...
2018-03-13T16:37:10.157+0800 [WARN ] plugin: error closing client during Kill: err="connection is shut down"
2018-03-13T16:37:10.157+0800 [DEBUG] plugin: plugin process exited: path=/Users/hanyouqing/Work/github.com/icmdb/applications/demo/tpl/.terraform/plugins/darwin_amd64/terraform-provider-alicloud_v1.8.1_x4

Expected Behavior

Actual Behavior

Steps to Reproduce

Additional Context

References

should get access via ~/.aliyun/config.json as well

Terraform Version

$ terraform -v
Terraform v0.11.8
+ provider.alicloud v1.26.0

Affected Resource(s)

provider "alicloud" {
region = "cn-hangzhou"
}

Terraform Configuration Files

provider "alicloud" {
  region     = "cn-hangzhou"
}

data "alicloud_instance_types" "default" {
  cpu_core_count = "1"
  memory_size    = "2"
}

Debug Output

data.alicloud_instance_types.default: Refreshing state...

Error: Error refreshing state: 1 error(s) occurred:

* data.alicloud_instance_types.default: 1 error(s) occurred:

* data.alicloud_instance_types.default: data.alicloud_instance_types.default: Error DescribeAvailableResource: &errors.ClientError{errorCode:"SDK.CanNotResolveEndpoint", message:"Can not resolve endpoint(param = {\"Domain\":\"\",\"Product\":\"Ecs\",\"RegionId\":\"cn-hangzhou\",\"LocationProduct\":\"ecs\",\"LocationEndpointType\":\"openAPI\"}), please check the user guide\n ", originError:(*errors.ServerError)(0xc4205467e0)}

I knew this problem can be fixed by two ways:

  1. set system environment variables ALICLOUD_ACCESS_KEY, ALICLOUD_SECRET_KEY, ALICLOUD_REGION
$ export ALICLOUD_ACCESS_KEY="anaccesskey"
$ export ALICLOUD_SECRET_KEY="asecretkey"
$ export ALICLOUD_REGION="cn-hangzhou"
$ terraform plan
  1. provide the access keys directly via terraform variables
provider "alicloud" {
  access_key = "${var.access_key}"
  secret_key = "${var.secret_key}"
  region     = "${var.region}"
}

Expected Behavior

But my expectation is,

  1. it should read default configuration at ~/.aliyun/config.json as well, since aliyun-cli sets and use it as default.

Check below codes, seems it only supports first two way currently

https://github.com/terraform-providers/terraform-provider-alicloud/blob/e57f635927a3dd981342288c0c285b966675b7b1/provider.go#L70-L99

Actual Behavior

get access keys from ~/.aliyun/config.json as well

[PROPOSAL] Switch to Go Modules

As part of the preparation for Terraform v0.12, we would like to migrate all providers to use Go Modules. We plan to continue checking dependencies into vendor/ to remain compatible with existing tooling/CI for a period of time, however go modules will be used for management. Go Modules is the official solution for the go programming language, we understand some providers might not want this change yet, however we encourage providers to begin looking towards the switch as this is how we will be managing all Go projects in the future. Would maintainers please react with ๐Ÿ‘ for support, or ๐Ÿ‘Ž if you wish to have this provider omitted from the first wave of pull requests. If your provider is in support, we would ask that you avoid merging any pull requests that mutate the dependencies while the Go Modules PR is open (in fact a total codefreeze would be even more helpful), otherwise we will need to close that PR and re-run go mod init. Once merged, dependencies can be added or updated as follows:

$ GO111MODULE=on go get github.com/some/module@master
$ GO111MODULE=on go mod tidy
$ GO111MODULE=on go mod vendor

GO111MODULE=on might be unnecessary depending on your environment, this example will fetch a module @ master and record it in your project's go.mod and go.sum files. It's a good idea to tidy up afterward and then copy the dependencies into vendor/. To remove dependencies from your project, simply remove all usage from your codebase and run:

$ GO111MODULE=on go mod tidy
$ GO111MODULE=on go mod vendor

Thank you sincerely for all your time, contributions, and cooperation!

terraform crashed error message but instance can be created, why?

๏ผ ~/code/demo_cen/tf ๎‚ฐ terraform apply ๎‚ฒ ๏€Œ ๎‚ฒ 1156 ๎‚ฒ 12:17:18
data.alicloud_images.default: Refreshing state...
data.alicloud_instance_types.default: Refreshing state...

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:

  • create

Terraform will perform the following actions:

  • alicloud_instance.instance
    id:
    availability_zone:
    description: "js-cen-poc-usw-ecs"
    host_name:
    image_id: "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
    instance_charge_type: "PostPaid"
    instance_name: "js-cen-poc-usw-ecs"
    instance_type: "ecs.n2.small"
    internet_max_bandwidth_out: "0"
    key_name:
    password:
    private_ip:
    public_ip:
    security_groups.#:
    spot_strategy: "NoSpot"
    status:
    subnet_id:
    system_disk_category: "cloud_efficiency"
    system_disk_size: "40"
    tags.%: "7"
    tags.client: "poc for cen "
    tags.cpu: "1"
    tags.ecs: "ecs.n2.small"
    tags.os: "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
    tags.ram: "4"
    tags.region: "usw"
    tags.tf_creater: "jianhua.shao at alibaba-inc.com"

  • alicloud_security_group.group
    id:
    description: "js-cen-poc-usw-sg"
    inner_access: "true"
    name: "js-cen-poc-usw-sg"

Plan: 2 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.

Enter a value: yes

alicloud_security_group.group: Creating...
description: "" => "js-cen-poc-usw-sg"
inner_access: "" => "true"
name: "" => "js-cen-poc-usw-sg"
alicloud_security_group.group: Creation complete after 3s (ID: sg-rj9dsyh39swug82q0aeb)
alicloud_instance.instance: Creating...
availability_zone: "" => ""
description: "" => "js-cen-poc-usw-ecs"
host_name: "" => ""
image_id: "" => "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
instance_charge_type: "" => "PostPaid"
instance_name: "" => "js-cen-poc-usw-ecs"
instance_type: "" => "ecs.n2.small"
internet_max_bandwidth_out: "" => "0"
key_name: "" => ""
password: "" => ""
private_ip: "" => ""
public_ip: "" => ""
security_groups.#: "" => "1"
security_groups.2218672181: "" => "sg-rj9dsyh39swug82q0aeb"
spot_strategy: "" => "NoSpot"
status: "" => ""
subnet_id: "" => ""
system_disk_category: "" => "cloud_efficiency"
system_disk_size: "" => "40"
tags.%: "" => "7"
tags.client: "" => "poc for cen "
tags.cpu: "" => "1"
tags.ecs: "" => "ecs.n2.small"
tags.os: "" => "ubuntu_14_0405_64_20G_alibase_20170824.vhd"
tags.ram: "" => "4"
tags.region: "" => "usw"
tags.tf_creater: "" => "jianhua.shao at alibaba-inc.com"
alicloud_instance.instance: Still creating... (10s elapsed)
alicloud_instance.instance: Still creating... (20s elapsed)
alicloud_instance.instance: Still creating... (30s elapsed)
alicloud_instance.instance: Still creating... (40s elapsed)
alicloud_instance.instance: Still creating... (50s elapsed)
alicloud_instance.instance: Still creating... (1m0s elapsed)

Error: Error applying plan:

1 error(s) occurred:

  • alicloud_instance.instance: 1 error(s) occurred:

  • alicloud_instance.instance: unexpected EOF

Terraform does not automatically rollback in the face of errors.
Instead, your Terraform state file has been partially updated with
any resources that successfully completed. Please address the error
above and apply again to incrementally change your infrastructure.

panic: reflect: call of reflect.Value.Set on zero Value
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4:
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: goroutine 193 [running]:
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.flag.mustBeAssignable(0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:227 +0xc5
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.Set(0x0, 0x0, 0x0, 0x21f5560, 0xc4202b1650, 0x98)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:1367 +0x2f
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.setTags(0xc42060a3c0, 0x2639ad8, 0x8, 0xc42028fdc0, 0x1391b19, 0x102d42a)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/tags.go:64 +0xb17
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.resourceAliyunInstanceUpdate(0xc42028fdc0, 0x26236a0, 0xc42060a3c0, 0x2638018, 0x7)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/resource_alicloud_instance.go:430 +0xa6
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/alicloud.resourceAliyunInstanceCreate(0xc42028fdc0, 0x26236a0, 0xc42060a3c0, 0xc42028fdc0, 0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/alicloud/resource_alicloud_instance.go:304 +0x724
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc4205f9730, 0xc420355540, 0xc420578640, 0x26236a0, 0xc42060a3c0, 0xc4207e5d01, 0xc4202a4b88, 0x108aefc)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:227 +0x35a
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc420232af0, 0xc4203554f0, 0xc420355540, 0xc420578640, 0x23c3540, 0x3d, 0x3d)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0xa4
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/plugin.(*ResourceProviderServer).Apply(0xc4205c0700, 0xc4205785e0, 0xc42066faa0, 0x0, 0x0)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /Users/heguimin/Projects/go/src/github.com/alibaba/terraform-provider/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.call(0xc4203fe8a0, 0xc42000e008, 0x13, 0x2634e54, 0x4, 0xc4202a4f18, 0x3, 0x3, 0xc420443300, 0x0, ...)
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:447 +0x969
2018-07-28T12:21:03.299+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: reflect.Value.Call(0xc4203fe8a0, 0xc42000e008, 0x13, 0xc4203ef718, 0x3, 0x3, 0xc4206d1260, 0xc4205fde00, 0xc4205fdf80)
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/reflect/value.go:308 +0xa4
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: net/rpc.(*service).call(0xc42057a000, 0xc420354410, 0xc42062e050, 0xc42062e080, 0xc4207e6100, 0xc42062c0e0, 0x219e2c0, 0xc4205785e0, 0x16, 0x219e300, ...)
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/net/rpc/server.go:384 +0x14e
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: created by net/rpc.(*Server).ServeCodec
2018-07-28T12:21:03.300+0100 [DEBUG] plugin.terraform-provider-alicloud_v1.9.6_x4: /usr/local/go/src/net/rpc/server.go:480 +0x43a
2018-07-28T12:21:03.305+0100 [DEBUG] plugin: plugin process exited: path=/Users/jianhuashao/.terraform.d/plugins/darwin_amd64/terraform-provider-alicloud_v1.9.6_x4
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteState
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalApplyProvisioners
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalIf
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteState
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalWriteDiff
2018/07/28 12:21:03 [TRACE] root: eval: *terraform.EvalApplyPost
2018/07/28 12:21:03 [ERROR] root: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:

  • alicloud_instance.instance: unexpected EOF
    2018/07/28 12:21:03 [ERROR] root: eval: *terraform.EvalSequence, err: 1 error(s) occurred:

  • alicloud_instance.instance: unexpected EOF
    2018/07/28 12:21:03 [TRACE] [walkApply] Exiting eval tree: alicloud_instance.instance
    2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)"
    2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "provider.alicloud (close)"
    2018/07/28 12:21:03 [TRACE] dag/walk: upstream errored, not walking "root"
    2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
    2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
    2018/07/28 12:21:03 [TRACE] Preserving existing state lineage "94b512ec-3fc2-6945-2b34-49b56b6e912b"
    2018/07/28 12:21:03 [DEBUG] plugin: waiting for all plugin processes to complete...
    2018-07-28T12:21:03.308+0100 [WARN ] plugin: error closing client during Kill: err="connection is shut down"

!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!

Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform1 so that we can fix this.

When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.

!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
๏ผ ~/code/demo_cen/tf ๎‚ฐ ๎‚ฒ 1 โ†ต ๎‚ฒ 1157 ๎‚ฒ 12:21:03
๏ผ ~/code/demo_cen/tf ๎‚ฐ terraform refresh ๎‚ฒ 1 โ†ต ๎‚ฒ 1157 ๎‚ฒ 12:22:18
alicloud_security_group.group: Refreshing state... (ID: sg-rj9dsyh39swug82q0aeb)
data.alicloud_instance_types.default: Refreshing state...
data.alicloud_images.default: Refreshing state...
๏ผ ~/code/demo_cen/tf ๎‚ฐ ๎‚ฒ ๏€Œ ๎‚ฒ 1158 ๎‚ฒ 12:22:30
๏ผ ~/code/demo_cen/tf ๎‚ฐ terraform show ๎‚ฒ ๏€Œ ๎‚ฒ 1158 ๎‚ฒ 12:22:32
alicloud_security_group.group:
id = sg-rj9dsyh39swug82q0aeb
description = js-cen-poc-usw-sg
inner_access = true
name = js-cen-poc-usw-sg
vpc_id = vpc-rj9od80zzslduvagac7c9
data.alicloud_images.default:
id = 3536887862
images.# = 1
images.0.architecture = x86_64
images.0.creation_time = 2017-08-28T03:27:44Z
images.0.description =
images.0.disk_device_mappings.# = 0
images.0.id = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.image_id = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.image_owner_alias = system
images.0.image_version =
images.0.is_copied = false
images.0.is_self_shared =
images.0.is_subscribed = false
images.0.is_support_io_optimized = true
images.0.name = ubuntu_14_0405_64_20G_alibase_20170824.vhd
images.0.os_name = Ubuntu 14.04 64ไฝ
images.0.os_type = linux
images.0.platform = Ubuntu
images.0.product_code =
images.0.progress = 100%
images.0.size = 20
images.0.state = Available
images.0.status = Available
images.0.tags.% = 0
images.0.usage = instance
most_recent = true
name_regex = ^ubuntu_14.*_64
output_file = ./output/alicloud_images_sh.txt
owners = system
data.alicloud_instance_types.default:
id = 1640570476
cpu_core_count = 1
instance_charge_type = PostPaid
instance_types.# = 2
instance_types.0.availability_zones.# = 1
instance_types.0.availability_zones.0 = us-west-1b
instance_types.0.burstable_instance.% = 2
instance_types.0.burstable_instance.baseline_credit = 0
instance_types.0.burstable_instance.initial_credit = 0
instance_types.0.cpu_core_count = 1
instance_types.0.eni_amount = 1
instance_types.0.family = ecs.n2
instance_types.0.gpu.% = 2
instance_types.0.gpu.amount = 0
instance_types.0.gpu.category =
instance_types.0.id = ecs.n2.small
instance_types.0.local_storage.% = 3
instance_types.0.local_storage.amount = 0
instance_types.0.local_storage.capacity = 0
instance_types.0.local_storage.category =
instance_types.0.memory_size = 4
instance_types.1.availability_zones.# = 2
instance_types.1.availability_zones.0 = us-west-1a
instance_types.1.availability_zones.1 = us-west-1b
instance_types.1.burstable_instance.% = 2
instance_types.1.burstable_instance.baseline_credit = 0
instance_types.1.burstable_instance.initial_credit = 0
instance_types.1.cpu_core_count = 1
instance_types.1.eni_amount = 1
instance_types.1.family = ecs.mn4
instance_types.1.gpu.% = 2
instance_types.1.gpu.amount = 0
instance_types.1.gpu.category =
instance_types.1.id = ecs.mn4.small
instance_types.1.local_storage.% = 3
instance_types.1.local_storage.amount = 0
instance_types.1.local_storage.capacity = 0
instance_types.1.local_storage.category =
instance_types.1.memory_size = 4
memory_size = 4
network_type = Vpc
output_file = ./output/alicloud_instance_types_sh.txt
spot_strategy = NoSpot

๏ผ ~/code/demo_cen/tf ๎‚ฐ terraform --version ๎‚ฒ ๏€Œ ๎‚ฒ 1159 ๎‚ฒ 12:22:36
Terraform v0.11.7

  • provider.alicloud v1.9.6

๏ผ ~/code/demo_cen/tf ๎‚ฐ

Fix: Zero Node Swarm Cluster

Terraform is able to create zero node swarm clusters, as these clusters are in the Inactive state when created and terraform expects running state it fails:

* alicloud_cs_swarm.main: Waitting for container Cluster "running" got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:""}, HostId:"", Code:"AliyunGoClientFailure", Message:"Timeout"}, StatusCode:-1}

SSH key is not pushed to instance when updating image on Alicloud

Hi, when pushing updated image to instances, the SSH key is not updated.
Which means I need to terraform apply twice, once to "update the images", and second to "update the SSH keys", which is very inefficient and can lead to issues /long downtime when deploying.

Terraform will perform the following actions:

  ~ alicloud_instance.ecs_instance[0]
      image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"

  ~ alicloud_instance.ecs_instance[1]
      image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"

  ~ alicloud_instance.ecs_instance[2]
      image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"

  ~ alicloud_instance.ecs_instance[3]
      image_id: "m-gw8g2nxu7rpl1i6hlqqv" => "m-gw8g2nxu7rpl3baibjxk"

2nd run:
screen shot 2018-08-01 at 0 45 27

Any clue how to solve this ?
Thanks !

When I execute a kubernetes clustrer creation it's failed

Hi there,

Terraform Version

terraform -v
Terraform v0.11.7

  • provider.alicloud v1.9.1

alicloud_cs_kubernetes.main: Creating Kubernetes Cluster got an error: &common.Error{ErrorResponse:common.ErrorResponse{Response:common.Response{RequestId:"1E769B2D-2D07-4587-A35B-16170EF46C1A"}, HostId:"", Code:"400", Message:"Aliyun API Error: RequestId: A1CE363D-1E64-471F-A07B-B0537A9EE1E3 Status Code: 404 Code: EntityNotExist.Role Message: The role not exists: acs:ram::5148984587763792:role/aliyuncsdefaultrole."}, StatusCode:400}

Support API paginated responses

AliCloud terraform provider doesn't handle "paginated" responses well.

Test case:
data "alicloud_vswitches" "vswitches_ds" {
zone_id = "eu-central-1a"
}

Error:
Error refreshing state: 1 error(s) occurred:

  • data.alicloud_vswitches.vswitches_ds: 1 error(s) occurred:
  • data.alicloud_vswitches.vswitches_ds: data.alicloud_vswitches.vswitches_ds: strconv.Atoi: parsing "": invalid syntax

Current provider fails to create instance due to InvalidSecurityGroupId

https://github.com/terraform-providers/terraform-provider-alicloud/blob/4b69936bb5e5d3a9ca4a6fbd3acb016bde7c4a0f/examples/ecs-vpc/main.tf#L42

This example code does not work.
A much simpler version of this code with just the VPC, vswitch, instance and security group also fails.
An even simpler version relying on a pre-existing default VPC also fails.

This problem was experienced with:
Terraform v0.11.10

  • provider.alicloud v1.25.0

Error: Error applying plan:

3 error(s) occurred:

  • alicloud_instance.instance[2]: 1 error(s) occurred:

  • alicloud_instance.instance.2: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"D7BEACCB-B4E6-4CB5-8CCA-A8154B412714", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}

  • alicloud_instance.instance[0]: 1 error(s) occurred:

  • alicloud_instance.instance.0: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"9218F860-ACE9-4D38-B338-6332E9D02809", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}

  • alicloud_instance.instance[1]: 1 error(s) occurred:

  • alicloud_instance.instance.1: Error creating Aliyun ecs instance: &errors.ServerError{httpStatus:404, requestId:"A35CE05A-79E7-4666-8247-52945EEA0D2D", hostId:"ecs-cn-hangzhou.aliyuncs.com", errorCode:"InvalidSecurityGroupId", recommend:"", message:"The specified SecurityGroupId is invalid or does not exist.", comment:""}

CS Application Deployment Error

Hello,

We are experiencing an issue when attempting to create a new cs_application. The terraform apply returns with an error but the cs_application does deploy successfully. The issue seems to be that the provider is passing the application name instead of the cluster name when attempting to monitor application creation status, hence returning a Instance.Notfound error

Terraform Version

Terraform v0.11.10

Affected Resource(s)

  • alicloud_cs_application

Terraform Apply Result

Error: Error applying plan:

1 error(s) occurred:

* module.module_name.alicloud_cs_application.main: 1 error(s) occurred:

* alicloud_cs_application.main: Waitting for container application "running" got an error: &alicloud.ProviderError{errorCode:"Instance.Notfound", message:"The specified Container Cluster my_test_cs_app is not found."}

Notice that the error say's my_test_cs_app when expected result would be a my_test_cs_cluster.

Important Factoids

I believe the issue is due to a change a change from version 1.19.0 to 1.20.0. Specifically changes for - Support provider thread safety [GH-432] which modified line 74 of file alicloud/service_alicloud_cs.go changing clusterName to appName

Asking about the release time for Alicloud provider

Hi you guys,

The latest version of AliCloud provider is 0.1. And this version doesn't support few configurations such as alicloud_key_pair_attachment and alicloud_oss_bucket.

But on the master branch, I can see the codes for these configurations and I found a documentation sharing these new changes. And all examples from this repository has updated with these configurations.

So, when you guys release the new version for AliCloud provider?

Thanks,

Problem adjusting/creating SLBs

since provider version 1.23, we have a problem, when accessing our SLBs with terraform.
The provider always tries to set the parameter "tls_cipher_policy" although we use a shared SLB and the parameter is only available for small and bigger load-balancers (as documented in the terraform docu).

In our scripts we do not use this parameter at all.
Maybe the problems are caused by creating the SLB with an earlier version of the provider and now changing its configuration with the new version?

Error outputs:

module.frontend_slb.alicloud_slb_listener.https: Modifying... (ID: lb-ge138me9ghojk0obfjhzn:443)
tls_cipher_policy: "tls_cipher_policy_1_0" => ""
2018/11/28 01:00:58 [ERROR] root.frontend_slb: eval: *terraform.EvalApplyPost, err: 1 error(s) occurred:

  • alicloud_slb_listener.https: SetLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:400, requestId:"C16D8538-7771-4244-847E-30A7E4D7014A", hostId:"slb.eu-central-1.aliyuncs.com", errorCode:"InvalidParameter.SpecNotSupport", recommend:"", message:"The loadBalancer of shared spec doesn't support the parameter: TlsCipherPolicy.", comment:""}
    2018/11/28 01:00:58 [ERROR] root.frontend_slb: eval: *terraform.EvalSequence, err: 1 error(s) occurred:

  • alicloud_slb_listener.https: SetLoadBalancerHTTPSListenerAttribute got an error: &errors.ServerError{httpStatus:400, requestId:"C16D8538-7771-4244-847E-30A7E4D7014A", hostId:"slb.eu-central-1.aliyuncs.com", errorCode:"InvalidParameter.SpecNotSupport", recommend:"", message:"The loadBalancer of shared spec doesn't support the parameter: TlsCipherPolicy.", comment:""}
    2018/11/28 01:00:58 [DEBUG] Uploading remote state to S3: {
    Body: buffer(0xc000338d20),
    Bucket: "w2b-int-terraform-state",
    ContentLength: 18333,
    ContentType: "application/json",
    Key: "eu-central-1/frontend-slb.tfstate"
    }

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.