Using: Terraform v0.11.2
+ provider.aws v1.8.0
+ provider.null v1.0.0

Your version of Terraform is out of date! The latest version
is 0.11.3. You can update by downloading from www.terraform.io/downloads.html
Running wtf.sh version: 2.2.8
Acting on AWS account with alias 'twitch-cape-qe-aws' using AWS profile 'twitch-cape-qe-aws'
Running terraform against directory: /Users/lukemng/go/src/code.justin.tv/qe/automation-webhooks/terraform/twitch-cape-qe-aws
Bootstrapping local terraform state config to use S3
[0m[1mInitializing modules...[0m
- module.bs-app-twitch-cape-qe-aws
- module.bs-canary
- module.bs-production
- module.bs-staging

[0m[1mInitializing the backend...[0m

[0m[1mInitializing provider plugins...[0m

The following providers do not have any version constraints in configuration,
so the latest version was installed.

To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.

* provider.aws: version = "~> 1.8"
* provider.null: version = "~> 1.0"

[0m[1m[32mTerraform has been successfully initialized![0m[32m[0m
[0m[32m
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.[0m
Running 'terraform get -update'
- module.bs-app-twitch-cape-qe-aws
  Updating source "git::git+ssh://git@git-aws.internal.justin.tv/dta/tf_beanstalk_app.git?ref=0.0.1"
- module.bs-canary
  Updating source "../modules/tf_beanstalk_webserver_env"
- module.bs-production
  Updating source "../modules/tf_beanstalk_webserver_env"
- module.bs-staging
  Updating source "../modules/tf_beanstalk_webserver_env"
Preparing to run apply based on plan file located at: tf_apply.tf_plan
Refreshing state of local resources and checking plan file for changes...
[0m[1maws_iam_role_policy.sandstorm-staging: Modifying... (ID: staging-qe-automation-webhooks:sandstorm-staging)[0m
  policy: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/team-qa-eng-staging-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n" => "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/qa-eng-staging-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n"[0m
[0m[1maws_iam_role_policy.sandstorm-production: Modifying... (ID: production-qe-automation-webhooks:sandstorm-production)[0m
  policy: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/team-qa-eng-production-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n" => "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/qa-eng-production-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n"[0m
[0m[1maws_iam_role_policy.sandstorm-canary: Modifying... (ID: canary-qe-automation-webhooks:sandstorm-canary)[0m
  policy: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/team-qa-eng-canary-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n" => "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Action\": \"sts:AssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Resource\": \"arn:aws:iam::734326455073:role/sandstorm/production/templated/role/qa-eng-canary-automation-webhooks\"\n    },\n    {\n      \"Sid\": \"Stmt1473817796000\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"s3:GetObject\",\n      \"Resource\": \"arn:aws:s3:::twitch-sandstorm/sandstorm-agent.rpm\"\n    }\n  ]\n}\n"[0m
[0m[1maws_iam_role_policy.sandstorm-staging: Modifications complete after 0s (ID: staging-qe-automation-webhooks:sandstorm-staging)[0m[0m
[0m[1maws_iam_role_policy.sandstorm-production: Modifications complete after 0s (ID: production-qe-automation-webhooks:sandstorm-production)[0m[0m
[0m[1maws_iam_role_policy.sandstorm-canary: Modifications complete after 0s (ID: canary-qe-automation-webhooks:sandstorm-canary)[0m[0m
[0m[1m[32m
Apply complete! Resources: 0 added, 3 changed, 0 destroyed.[0m
[0m[1m[32m
Outputs:

beanstalk_application_name_twitch-cape-qe-aws = automation-webhooks
canary-autoscaling_groups = [
    awseb-e-pgfz7njqgi-stack-AWSEBAutoScalingGroup-1J21MAD6ZQIBE
]
canary-beanstalk_environment_cname = qe-automation-webhooks-canary.us-west-2.elasticbeanstalk.com
canary-beanstalk_environment_name = canary-qe-automation-webhooks-env
canary-iam_role_arn = arn:aws:iam::425992774280:role/canary-qe-automation-webhooks
canary-iam_role_id = canary-qe-automation-webhooks
canary-instances = [
    i-0b9d0687a3b838ac7
]
canary-launch_configurations = [
    awseb-e-pgfz7njqgi-stack-AWSEBAutoScalingLaunchConfiguration-6BN2GQGKGXMP
]
canary-load_balancers = [
    awseb-e-p-AWSEBLoa-4DJKI22HMI3W
]
production-autoscaling_groups = [
    awseb-e-k3etifnvcm-stack-AWSEBAutoScalingGroup-GSOTL3XWKNQU
]
production-beanstalk_environment_cname = qe-automation-webhooks-prod.us-west-2.elasticbeanstalk.com
production-beanstalk_environment_name = production-qe-automation-webhooks-env
production-iam_role_arn = arn:aws:iam::425992774280:role/production-qe-automation-webhooks
production-iam_role_id = production-qe-automation-webhooks
production-instances = [
    i-03bf47c3d2839d562
]
production-launch_configurations = [
    awseb-e-k3etifnvcm-stack-AWSEBAutoScalingLaunchConfiguration-G21YOORR918P
]
production-load_balancers = [
    awseb-e-k-AWSEBLoa-AKAI1PKR9RV4
]
staging-autoscaling_groups = [
    awseb-e-5r2bq54sgw-stack-AWSEBAutoScalingGroup-1NDZB96R2BNKR
]
staging-beanstalk_environment_cname = qe-automation-webhooks-staging.us-west-2.elasticbeanstalk.com
staging-beanstalk_environment_name = staging-qe-automation-webhooks-env
staging-iam_role_arn = arn:aws:iam::425992774280:role/staging-qe-automation-webhooks
staging-iam_role_id = staging-qe-automation-webhooks
staging-instances = [
    i-051585695dd85f977
]
staging-launch_configurations = [
    awseb-e-5r2bq54sgw-stack-AWSEBAutoScalingLaunchConfiguration-IMFVZDRM72A7
]
staging-load_balancers = [
    awseb-e-5-AWSEBLoa-S6TISU3WVK7G
][0m
Renaming plan file to avoid accidental future apply run by user

exit code: 0

Running cleanup...
Checking if we need to create an output summary...
Creating a summary file...
[33m

It is suggested you add the following patterns to your .gitignore:
.tfci_vars.tfvars
.tfci_tmp
tf_apply*
env-vars.list
_tmp_tf_state.tf

[m
