Created
May 12, 2021 22:32
-
-
Save shawn-sterling/a08655c9dc03e77b1806544fbf6c862f to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021/05/12 22:07:21 [INFO] Terraform version: 0.14.5 | |
2021/05/12 22:07:21 [INFO] Go runtime version: go1.15.6 | |
2021/05/12 22:07:21 [INFO] CLI args: []string{"/usr/local/bin/terraform", "apply", "-auto-approve", "-var-file=/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/terragrunt-debug.tfvars.json", "/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/.terragrunt-cache/c-JNfw0xxoNyyafdW5hP4zJVvE8/SnVBr6KkkB3mx0pnP8MaWBd53qo"} | |
2021/05/12 22:07:21 [DEBUG] Attempting to open CLI config file: /root/.terraformrc | |
2021/05/12 22:07:21 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /root/.terraform.d/plugins | |
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /root/.local/share/terraform/plugins | |
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /usr/local/share/terraform/plugins | |
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /usr/share/terraform/plugins | |
2021/05/12 22:07:21 [INFO] CLI command args: []string{"apply", "-auto-approve", "-var-file=/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/terragrunt-debug.tfvars.json", "/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/.terragrunt-cache/c-JNfw0xxoNyyafdW5hP4zJVvE8/SnVBr6KkkB3mx0pnP8MaWBd53qo"} | |
2021/05/12 22:07:21 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value 821729936 | |
2021/05/12 22:07:21 [TRACE] Preserving existing state lineage "8e65593a-d27e-564d-ef7e-cb4271a73ef7" | |
2021/05/12 22:07:21 [TRACE] Preserving existing state lineage "8e65593a-d27e-564d-ef7e-cb4271a73ef7" | |
2021/05/12 22:07:21 [TRACE] Meta.Backend: working directory was previously initialized for "s3" backend | |
2021/05/12 22:07:21 [TRACE] Meta.Backend: using already-initialized, unchanged "s3" backend configuration | |
2021/05/12 22:07:21 [INFO] AWS Auth provider used: "EnvProvider" | |
2021/05/12 22:07:21 [INFO] Attempting to AssumeRole arn:aws:iam::000000000001:role/terraform-usage-role (SessionName: "", ExternalId: "") | |
2021/05/12 22:07:32 [TRACE] Meta.Backend: instantiated backend of type *s3.Backend | |
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers | |
2021/05/12 22:07:32 [TRACE] getproviders.SearchLocalDirectory: .terraform/providers is a symlink to .terraform/providers | |
2021/05/12 22:07:32 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.33.0 for linux_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64 | |
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.33.0 | |
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/12 22:07:33 [WARN] Failed to determine selected providers: 7 errors occurred: | |
* there is no package for registry.terraform.io/hashicorp/null 3.1.0 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/random 3.1.0 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/template 2.2.0 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/external 2.1.0 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/helm 2.0.3 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/kubernetes 2.0.3 cached in .terraform/providers | |
* there is no package for registry.terraform.io/hashicorp/local 2.1.0 cached in .terraform/providers | |
2021/05/12 22:07:33 [DEBUG] checking for provisioner in "." | |
2021/05/12 22:07:33 [DEBUG] checking for provisioner in "/usr/local/bin" | |
2021/05/12 22:07:33 [INFO] Failed to read plugin lock file .terraform/plugins/linux_amd64/lock.json: open .terraform/plugins/linux_amd64/lock.json: no such file or directory | |
2021/05/12 22:07:33 [TRACE] Meta.Backend: backend *s3.Backend does not support operations, so wrapping it in a local backend | |
2021/05/12 22:07:33 [INFO] backend/local: starting Apply operation | |
2021/05/12 22:07:33 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Request s3/ListObjects Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
GET /?max-keys=1000&prefix=env%3A%2F HTTP/1.1 | |
Host: fakename-terraform.s3.us-west-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 | |
Accept-Encoding: gzip | |
----------------------------------------------------- | |
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Response s3/ListObjects Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Transfer-Encoding: chunked | |
Content-Type: application/xml | |
Date: Wed, 12 May 2021 22:07:40 GMT | |
Server: AmazonS3 | |
X-Amz-Bucket-Region: us-west-2 | |
----------------------------------------------------- | |
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>fakename-terraform</Name><Prefix>env:/</Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated></ListBucketResult> | |
2021/05/12 22:07:33 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021/05/12 22:07:33 [TRACE] backend/local: reading remote state for workspace "default" | |
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Request s3/GetObject Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
GET /terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate HTTP/1.1 | |
Host: fakename-terraform.s3.us-west-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 | |
Accept-Encoding: gzip | |
----------------------------------------------------- | |
2021/05/12 22:07:34 [DEBUG] [aws-sdk-go] DEBUG: Response s3/GetObject Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 5079 | |
Accept-Ranges: bytes | |
Content-Type: application/json | |
Date: Wed, 12 May 2021 22:07:40 GMT | |
Etag: "539bbb5c6cf551db388f191f33327bcf" | |
Last-Modified: Wed, 12 May 2021 22:06:08 GMT | |
Server: AmazonS3 | |
----------------------------------------------------- | |
2021/05/12 22:07:34 [DEBUG] [aws-sdk-go] | |
2021/05/12 22:07:34 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021/05/12 22:07:34 [TRACE] backend/local: building context for current working directory | |
2021/05/12 22:07:34 [TRACE] terraform.NewContext: starting | |
2021/05/12 22:07:34 [TRACE] terraform.NewContext: loading provider schemas | |
2021/05/12 22:07:34 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws" | |
2021-05-12T22:07:34.070Z [INFO] plugin: configuring client automatic mTLS | |
2021-05-12T22:07:34.139Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5] | |
2021-05-12T22:07:34.140Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25758 | |
2021-05-12T22:07:34.140Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 | |
2021-05-12T22:07:34.179Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:34.179Z | |
2021-05-12T22:07:34.223Z [DEBUG] plugin: using plugin: version=5 | |
2021-05-12T22:07:34.223Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin082554993 network=unix timestamp=2021-05-12T22:07:34.223Z | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: GetSchema | |
2021-05-12T22:07:34.278Z [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: Close | |
2021-05-12T22:07:34.434Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-12T22:07:34.438Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25758 | |
2021-05-12T22:07:34.438Z [DEBUG] plugin: plugin exited | |
2021/05/12 22:07:34 [TRACE] terraform.NewContext: complete | |
2021/05/12 22:07:34 [TRACE] backend/local: finished building terraform.Context | |
2021/05/12 22:07:34 [TRACE] backend/local: requesting interactive input, if necessary | |
2021/05/12 22:07:34 [TRACE] Context.Input: Prompting for provider arguments | |
2021/05/12 22:07:34 [TRACE] Context.Input: Provider provider.aws declared at aws_provider.tf:2,1-15 | |
2021/05/12 22:07:34 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2021/05/12 22:07:34 [TRACE] backend/local: running validation operation | |
2021/05/12 22:07:34 [INFO] terraform: building graph: GraphTypeValidate | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/12 22:07:34 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/12 22:07:34 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this" (*terraform.NodeValidatableResource) config from main.tf:13,1-33 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this" (*terraform.NodeValidatableResource) config from main.tf:2,1-31 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this" (*terraform.NodeValidatableResource) config from main.tf:23,1-49 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/12 22:07:34 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15 | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_policy.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this var.attach_policy_arns] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this] | |
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this" references: [local.arns (expand) local.arns (expand) aws_iam_role.this] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.tags" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_description" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_policy.this" references: [var.custom_policy var.custom_policy_name var.custom_policy] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_name" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: [var.max_session_duration var.role_name var.force_detach_policies var.assume_role_policy var.tags var.role_permissions_boundary_arn var.role_description var.role_path] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_path" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this] | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this - *terraform.NodeValidatableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [DEBUG] Starting graph walk: walkValidate | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.assume_role_policy" | |
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.attach_policy_arns" | |
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy_name" | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.force_detach_policies" | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy" | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_name" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.max_session_duration" | |
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_description" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_path" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.tags" | |
2021-05-12T22:07:34.444Z [INFO] plugin: configuring client automatic mTLS | |
2021/05/12 22:07:34 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.tags": visit complete | |
2021-05-12T22:07:34.482Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5] | |
2021-05-12T22:07:34.483Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25775 | |
2021-05-12T22:07:34.483Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 | |
2021-05-12T22:07:34.548Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:34.547Z | |
2021-05-12T22:07:34.594Z [DEBUG] plugin: using plugin: version=5 | |
2021-05-12T22:07:34.594Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin073892238 network=unix timestamp=2021-05-12T22:07:34.594Z | |
2021/05/12 22:07:34 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: GetSchema | |
2021-05-12T22:07:34.676Z [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021-05-12T22:07:34.916Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:34 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-12T22:07:34.916Z | |
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_policy.this" | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_policy.this": starting visit (*terraform.NodeValidatableResource) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_role.this" | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeValidatableResource) | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_policy.this": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "local.arns (expand)" | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": expanding dynamic subgraph | |
2021/05/12 22:07:34 [TRACE] Expanding local: adding local.arns as *terraform.NodeLocal | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": entering dynamic subgraph | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role.this": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "local.arns" | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns": starting visit (*terraform.NodeLocal) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.policy_name" | |
2021/05/12 22:07:34 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.role_name" | |
2021/05/12 22:07:34 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this" | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role_policy_attachment.this": starting visit (*terraform.NodeValidatableResource) | |
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.policy_name in changeset | |
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.policy_name from state (it is now null) | |
2021/05/12 22:07:34 [TRACE] vertex "output.policy_name": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.role_create_date" | |
2021/05/12 22:07:34 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.role_name in changeset | |
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.role_name from state (it is now null) | |
2021/05/12 22:07:34 [TRACE] vertex "output.role_name": visit complete | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.role_create_date in changeset | |
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.role_create_date from state (it is now null) | |
2021/05/12 22:07:34 [TRACE] vertex "output.role_create_date": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role_policy_attachment.this": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/12 22:07:34 [TRACE] GRPCProvider: Close | |
2021/05/12 22:07:34 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/12 22:07:34 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-05-12T22:07:34.921Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-12T22:07:34.926Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25775 | |
2021-05-12T22:07:34.926Z [DEBUG] plugin: plugin exited | |
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "root" | |
2021/05/12 22:07:34 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/12 22:07:34 [TRACE] vertex "root": visit complete | |
2021/05/12 22:07:34 [INFO] backend/local: apply calling Plan | |
2021/05/12 22:07:34 [INFO] terraform: building graph: GraphTypePlan | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/12 22:07:34 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/12 22:07:34 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:13,1-33 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this (expand) | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:23,1-49 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:2,1-31 | |
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this (expand) | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/12 22:07:34 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15 | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this (expand) | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this (expand) | |
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this (expand) | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this (expand) | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_path" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this (expand) var.attach_policy_arns] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this (expand)] | |
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_policy.this (expand)" references: [var.custom_policy var.custom_policy_name var.custom_policy] | |
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this (expand)" references: [local.arns (expand) local.arns (expand) aws_iam_role.this (expand)] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_description" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_name" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role.this (expand)" references: [var.assume_role_policy var.tags var.role_description var.role_path var.max_session_duration var.role_name var.force_detach_policies var.role_permissions_boundary_arn] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.tags" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: [] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this (expand)] | |
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this (expand)] | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_role_policy_attachment.this depends on [aws_iam_policy.this aws_iam_role.this] | |
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_policy.this depends on [] | |
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_role.this depends on [] | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:07:34 [DEBUG] Starting graph walk: walkPlan | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy" | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_path" | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy_name" | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.tags" | |
2021/05/12 22:07:34 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.force_detach_policies" | |
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.assume_role_policy" | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_name" | |
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.tags": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.attach_policy_arns" | |
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.max_session_duration" | |
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_description" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": visit complete | |
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn" | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete | |
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable) | |
2021-05-12T22:07:34.933Z [INFO] plugin: configuring client automatic mTLS | |
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": visit complete | |
2021-05-12T22:07:34.962Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5] | |
2021-05-12T22:07:34.963Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25792 | |
2021-05-12T22:07:34.963Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 | |
2021-05-12T22:07:35.006Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:35.006Z | |
2021-05-12T22:07:35.054Z [DEBUG] plugin: using plugin: version=5 | |
2021-05-12T22:07:35.055Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: network=unix address=/tmp/plugin328611739 timestamp=2021-05-12T22:07:35.054Z | |
2021/05/12 22:07:35 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021-05-12T22:07:35.118Z [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/12 22:07:35 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/12 22:07:35 [TRACE] GRPCProvider: GetSchema | |
2021/05/12 22:07:35 [TRACE] GRPCProvider: Configure | |
2021-05-12T22:07:35.214Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [INFO] AWS Auth provider used: "StaticProvider": timestamp=2021-05-12T22:07:35.214Z | |
2021-05-12T22:07:35.215Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [DEBUG] Trying to get account information via iam:GetUser: timestamp=2021-05-12T22:07:35.214Z | |
2021-05-12T22:07:35.215Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 33 | |
Accept-Encoding: gzip | |
Action=GetUser&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:35.215Z | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_policy.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_role.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_policy.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_role.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021-05-12T22:07:45.794Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 678 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:07:50 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.794Z | |
2021-05-12T22:07:45.794Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] <GetUserResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetUserResult> | |
<User> | |
<Path>/</Path> | |
<PasswordLastUsed>2021-02-24T05:21:29Z</PasswordLastUsed> | |
<Arn>arn:aws:iam::000000000001:user/tmp-rce-user</Arn> | |
<UserName>tmp-rce-user</UserName> | |
<UserId>AIDAZLO5RQSBZU26DOGE5</UserId> | |
<CreateDate>2021-02-13T02:11:43Z</CreateDate> | |
<Tags> | |
<member> | |
<Value>[email protected]</Value> | |
<Key>owner</Key> | |
</member> | |
</Tags> | |
</User> | |
</GetUserResult> | |
<ResponseMetadata> | |
<RequestId>6f14a9a9-9eef-4542-a882-f027a6786c2f</RequestId> | |
</ResponseMetadata> | |
</GetUserResponse>: timestamp=2021-05-12T22:07:45.794Z | |
2021/05/12 22:07:45 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": expanding dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this (expand)" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": entering dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": starting visit (*terraform.NodePlannableResource) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": expanding dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": entering dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodePlannableResource) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": expanding dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021/05/12 22:07:45 [TRACE] ResourceCountTransformer: adding aws_iam_role.this as *terraform.NodePlannableResourceInstance | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role.this - *terraform.NodePlannableResourceInstance | |
------ | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_path" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.max_session_duration" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_name" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": expanding dynamic subgraph | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.force_detach_policies" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.assume_role_policy" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.tags" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_permissions_boundary_arn" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_description" | |
2021/05/12 22:07:45 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: [] | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": entering dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodePlannableResourceInstance) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021/05/12 22:07:45 [TRACE] ResourceCountTransformer: adding aws_iam_policy.this[0] as *terraform.NodePlannableResourceInstance | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_policy.this[0] - *terraform.NodePlannableResourceInstance | |
------ | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:07:45 [TRACE] ReadResourceInstanceState: reading state for aws_iam_role.this | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy_name" | |
2021/05/12 22:07:45 [DEBUG] ReferenceTransformer: "aws_iam_policy.this[0]" references: [] | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": entering dynamic subgraph | |
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this[0]" | |
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this[0]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021/05/12 22:07:45 [TRACE] ReadResourceInstanceState: reading state for aws_iam_policy.this[0] | |
2021/05/12 22:07:45 [TRACE] UpgradeResourceState: schema version of aws_iam_policy.this[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/12 22:07:45 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/12 22:07:45 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups | |
2021/05/12 22:07:45 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/12 22:07:45 [TRACE] GRPCProvider: ReadResource | |
2021/05/12 22:07:45 [TRACE] GRPCProvider: ReadResource | |
[0m[1maws_iam_policy.this[0]: Refreshing state... [id=arn:aws:iam::000000000001:policy/terraform-usage-policy][0m | |
[0m[1maws_iam_role.this: Refreshing state... [id=terraform-usage-role][0m | |
2021-05-12T22:07:45.809Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] Getting IAM Policy: { | |
PolicyArn: "arn:aws:iam::000000000001:policy/terraform-usage-policy" | |
}: timestamp=2021-05-12T22:07:45.809Z | |
2021-05-12T22:07:45.809Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-12T22:07:45.809Z | |
2021-05-12T22:07:45.810Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 113 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A000000000001%3Apolicy%2Fterraform-usage-policy&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.810Z | |
2021-05-12T22:07:45.811Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 63 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.810Z | |
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 781 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:07:52 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.197Z | |
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyResult> | |
<Policy> | |
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount> | |
<Path>/</Path> | |
<UpdateDate>2021-02-16T07:39:56Z</UpdateDate> | |
<PolicyId>ANPAZLO5RQSBZR3GTKQVH</PolicyId> | |
<DefaultVersionId>v7</DefaultVersionId> | |
<PolicyName>terraform-usage-policy</PolicyName> | |
<IsAttachable>true</IsAttachable> | |
<AttachmentCount>1</AttachmentCount> | |
<Arn>arn:aws:iam::000000000001:policy/terraform-usage-policy</Arn> | |
<CreateDate>2021-02-16T02:46:15Z</CreateDate> | |
<Tags/> | |
</Policy> | |
</GetPolicyResult> | |
<ResponseMetadata> | |
<RequestId>2ebacf4c-2927-4eb0-9b48-67692e2fedd0</RequestId> | |
</ResponseMetadata> | |
</GetPolicyResponse>: timestamp=2021-05-12T22:07:47.198Z | |
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] Getting IAM Policy Version: { | |
PolicyArn: "arn:aws:iam::000000000001:policy/terraform-usage-policy", | |
VersionId: "v7" | |
}: timestamp=2021-05-12T22:07:47.198Z | |
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-12T22:07:47.198Z | |
2021-05-12T22:07:47.200Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 133 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A000000000001%3Apolicy%2Fterraform-usage-policy&Version=2010-05-08&VersionId=v7 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.200Z | |
2021-05-12T22:07:47.239Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Transfer-Encoding: chunked | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:07:52 GMT | |
Vary: accept-encoding | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.239Z | |
2021-05-12T22:07:47.240Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22shedrivesmecrazy%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22ForAllValues%3AStringEqualsIgnoreCase%22%3A%7B%22SAML%3Asub%22%3A%5B%22fakename-network_Admin%22%2C%22fakename-network_Superadmin%22%2C%22fakename-network_Power%22%2C%22fakename-network_SysEng%22%2C%22fakename-network_Standard%22%5D%7D%7D%7D%2C%7B%22Sid%22%3A%22likenooneelse%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%2C%7B%22Sid%22%3A%22andicanthelpmyself%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROAZLO5RQSBQLREIIMOZ</RoleId> | |
<RoleLastUsed> | |
<LastUsedDate>2021-05-12T21:38:54Z</LastUsedDate> | |
<Region>us-west-2</Region> | |
</RoleLastUsed> | |
<RoleName>terraform-usage-role</RoleName> | |
<Description>terraform usage role</Description> | |
<Arn>arn:aws:iam::000000000001:role/terraform-usage-role</Arn> | |
<CreateDate>2021-02-16T02:46:15Z</CreateDate> | |
<Tags> | |
<member> | |
<Value>[email protected]</Value> | |
<Key>owner</Key> | |
</member> | |
</Tags> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>f51fc35f-94fa-432e-9006-addea6188e01</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-05-12T22:07:47.239Z | |
2021-05-12T22:07:47.241Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 72 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.241Z | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)" | |
2021-05-12T22:07:57.747Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:02 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.746Z | |
2021-05-12T22:07:57.747Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>34fc4627-c5f9-480c-a9c8-ec4f44c9c735</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-05-12T22:07:57.747Z | |
2021-05-12T22:07:57.749Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 80 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.749Z | |
2021-05-12T22:07:57.751Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Transfer-Encoding: chunked | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:03 GMT | |
Vary: accept-encoding | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.750Z | |
2021-05-12T22:07:57.751Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyVersionResult> | |
<PolicyVersion> | |
<VersionId>v7</VersionId> | |
<IsDefaultVersion>true</IsDefaultVersion> | |
<Document>%7B%0A%20%20%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Sid%22%3A%20%22first%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AListBucket%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AGetBucketVersioning%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22arn%3Aaws%3As3%3A%3A%3Afakename-terraform%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Sid%22%3A%20%22second%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3ADeleteObject%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AGetObject%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3APutObject%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22arn%3Aaws%3As3%3A%3A%3Afakename-terraform%2F%2A%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%5D%0A%7D</Document> | |
<CreateDate>2021-02-16T07:39:56Z</CreateDate> | |
</PolicyVersion> | |
</GetPolicyVersionResult> | |
<ResponseMetadata> | |
<RequestId>3772f383-e16e-4994-a9fa-49675eb36191</RequestId> | |
</ResponseMetadata> | |
</GetPolicyVersionResponse>: timestamp=2021-05-12T22:07:57.750Z | |
2021/05/12 22:07:57 [TRACE] EvalWriteState: using RefreshState for aws_iam_policy.this[0] | |
2021/05/12 22:07:57 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_policy.this[0] | |
2021/05/12 22:07:57 [TRACE] EvalWriteState: writing current state object for aws_iam_policy.this[0] | |
2021/05/12 22:07:57 [TRACE] Re-validating config for "aws_iam_policy.this[0]" | |
2021/05/12 22:07:57 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:07:57 [TRACE] GRPCProvider: PlanResourceChange | |
2021/05/12 22:07:57 [TRACE] EvalWriteState: writing current state object for aws_iam_policy.this[0] | |
2021/05/12 22:07:57 [TRACE] EvalWriteDiff: recorded NoOp change for aws_iam_policy.this[0] | |
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this[0]": visit complete | |
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this": dynamic subgraph completed successfully | |
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this": visit complete | |
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this (expand)": visit complete | |
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "local.arns (expand)" | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": expanding dynamic subgraph | |
2021/05/12 22:07:57 [TRACE] Expanding local: adding local.arns as *terraform.NodeLocal | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": entering dynamic subgraph | |
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "output.policy_name" | |
2021/05/12 22:07:57 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "local.arns" | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns": starting visit (*terraform.NodeLocal) | |
2021/05/12 22:07:57 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset | |
2021/05/12 22:07:57 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state | |
2021/05/12 22:07:57 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset | |
2021/05/12 22:07:57 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state | |
2021/05/12 22:07:57 [TRACE] vertex "output.policy_name": visit complete | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns": visit complete | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": visit complete | |
2021-05-12T22:07:58.855Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 557 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:04 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:58.855Z | |
2021-05-12T22:07:58.856Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn> | |
<PolicyName>terraform-usage-policy</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>451882fc-9c32-42fc-bdbc-68017d26c8a3</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:07:58.855Z | |
2021/05/12 22:07:58 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.this during refresh. | |
- .assume_role_policy: was cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-NetEng\",\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-Power\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::00000000005:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}"), but now cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-NetEng\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-Admin\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000006:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000001:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000002:root\"]},\"Action\":\"sts:AssumeRole\"}]}") | |
2021/05/12 22:07:58 [TRACE] EvalWriteState: using RefreshState for aws_iam_role.this | |
2021/05/12 22:07:58 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this | |
2021/05/12 22:07:58 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this | |
2021/05/12 22:07:58 [TRACE] Re-validating config for "aws_iam_role.this" | |
2021/05/12 22:07:58 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:07:58 [TRACE] GRPCProvider: PlanResourceChange | |
2021/05/12 22:07:58 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this | |
2021/05/12 22:07:58 [TRACE] EvalWriteDiff: recorded Update change for aws_iam_role.this | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": visit complete | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": dynamic subgraph completed successfully | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": visit complete | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this (expand)": visit complete | |
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "output.role_name" | |
2021/05/12 22:07:58 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": expanding dynamic subgraph | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": entering dynamic subgraph | |
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "output.role_create_date" | |
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this" | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": starting visit (*terraform.NodePlannableResource) | |
2021/05/12 22:07:58 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset | |
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_name in state | |
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset | |
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_name in state | |
2021/05/12 22:07:58 [TRACE] vertex "output.role_name": visit complete | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": expanding dynamic subgraph | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021/05/12 22:07:58 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.this[0] as *terraform.NodePlannableResourceInstance | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role_policy_attachment.this[0] - *terraform.NodePlannableResourceInstance | |
------ | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "local.arns" | |
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "local.arns" | |
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/12 22:07:58 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this[0]" references: [] | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": entering dynamic subgraph | |
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this[0]" | |
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this[0]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021/05/12 22:07:58 [TRACE] ReadResourceInstanceState: reading state for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:07:58 [TRACE] UpgradeResourceState: schema version of aws_iam_role_policy_attachment.this[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/12 22:07:58 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset | |
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state | |
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset | |
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state | |
2021/05/12 22:07:58 [TRACE] vertex "output.role_create_date": visit complete | |
2021/05/12 22:07:58 [TRACE] GRPCProvider: ReadResource | |
[0m[1maws_iam_role_policy_attachment.this[0]: Refreshing state... [id=terraform-usage-role-20210216024614902500000001][0m | |
2021-05-12T22:07:58.873Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 80 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:07:58.873Z | |
2021/05/12 22:07:59 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:07:59 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:08:03 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:08:04 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:08:04 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021/05/12 22:08:08 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.this (expand)" | |
2021-05-12T22:08:09.422Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 557 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:14 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:09.421Z | |
2021-05-12T22:08:09.422Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn> | |
<PolicyName>terraform-usage-policy</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>37385c4c-61e1-463e-80e1-607680b40c0e</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:08:09.422Z | |
2021/05/12 22:08:09 [TRACE] EvalWriteState: using RefreshState for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] EvalWriteState: recording 2 dependencies for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] EvalWriteState: writing current state object for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.this[0]" | |
2021/05/12 22:08:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:08:09 [TRACE] GRPCProvider: PlanResourceChange | |
2021/05/12 22:08:09 [TRACE] EvalWriteState: writing current state object for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] EvalWriteDiff: recorded NoOp change for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this[0]": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this": dynamic subgraph completed successfully | |
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": visit complete | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:08:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/12 22:08:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/12 22:08:09 [TRACE] GRPCProvider: Close | |
2021-05-12T22:08:09.432Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-12T22:08:09.438Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25792 | |
2021-05-12T22:08:09.438Z [DEBUG] plugin: plugin exited | |
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "root" | |
2021/05/12 22:08:09 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/12 22:08:09 [TRACE] vertex "root": visit complete | |
2021/05/12 22:08:09 [INFO] backend/local: apply calling Apply | |
2021/05/12 22:08:09 [INFO] terraform: building graph: GraphTypeApply | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/12 22:08:09 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput | |
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.DiffTransformer | |
2021/05/12 22:08:09 [TRACE] DiffTransformer starting | |
2021/05/12 22:08:09 [TRACE] DiffTransformer: found NoOp change for aws_iam_policy.this[0] | |
2021/05/12 22:08:09 [TRACE] DiffTransformer: found Update change for aws_iam_role.this | |
2021/05/12 22:08:09 [TRACE] DiffTransformer: aws_iam_role.this will be represented by aws_iam_role.this | |
2021/05/12 22:08:09 [TRACE] DiffTransformer: found NoOp change for aws_iam_role_policy_attachment.this[0] | |
2021/05/12 22:08:09 [TRACE] DiffTransformer complete | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:23,1-49 | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:13,1-33 | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this (expand) | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) config from main.tf:2,1-31 | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:2,1-31 | |
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this (expand) | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/12 22:08:09 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15 | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this | |
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this (expand) | |
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this (expand) | |
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this (expand) | |
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this (expand) | |
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this (expand) | |
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_path" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this (expand) var.attach_policy_arns] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_policy.this (expand)" references: [var.custom_policy] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this (expand)" references: [local.arns (expand)] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.tags" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this (expand)] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.custom_policy" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_name" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_description" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this aws_iam_role.this aws_iam_role.this (expand)] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: [var.max_session_duration var.role_name var.force_detach_policies var.role_permissions_boundary_arn var.assume_role_policy var.tags var.role_description var.role_path] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role.this (expand)" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: [] | |
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this aws_iam_role.this aws_iam_role.this (expand)] | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.custom_policy - *terraform.NodeRootVariable | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource | |
local.arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.arns (expand) - *terraform.nodeExpandLocal | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/12 22:08:09 [TRACE] AttachDependenciesTransformer: aws_iam_role.this depends on [] | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/12 22:08:09 [TRACE] ForcedCBDTransformer: "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) has no CBD descendent, so skipping | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.pruneUnusedNodesTransformer | |
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: aws_iam_role_policy_attachment.this (expand) is no longer needed, removing | |
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: local.arns (expand) is no longer needed, removing | |
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: aws_iam_policy.this (expand) is no longer needed, removing | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.pruneUnusedNodesTransformer with new graph: | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
output.role_name - *terraform.NodeApplyableOutput | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
output.policy_name - *terraform.NodeApplyableOutput | |
output.role_create_date - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
output.role_name - *terraform.NodeApplyableOutput | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role.this - *terraform.NodeApplyableResourceInstance | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
var.assume_role_policy - *terraform.NodeRootVariable | |
var.attach_policy_arns - *terraform.NodeRootVariable | |
var.custom_policy - *terraform.NodeRootVariable | |
var.custom_policy_name - *terraform.NodeRootVariable | |
var.force_detach_policies - *terraform.NodeRootVariable | |
var.max_session_duration - *terraform.NodeRootVariable | |
var.role_description - *terraform.NodeRootVariable | |
var.role_name - *terraform.NodeRootVariable | |
var.role_path - *terraform.NodeRootVariable | |
var.role_permissions_boundary_arn - *terraform.NodeRootVariable | |
var.tags - *terraform.NodeRootVariable | |
------ | |
2021/05/12 22:08:09 [DEBUG] Starting graph walk: walkApply | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.max_session_duration" | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.attach_policy_arns" | |
2021/05/12 22:08:09 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.assume_role_policy" | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_path" | |
2021/05/12 22:08:09 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.custom_policy" | |
2021/05/12 22:08:09 [TRACE] vertex "var.assume_role_policy": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.custom_policy_name" | |
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_path": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "output.policy_name" | |
2021/05/12 22:08:09 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn" | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable) | |
2021-05-12T22:08:09.448Z [INFO] plugin: configuring client automatic mTLS | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_name" | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_name": visit complete | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_description" | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_description": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.attach_policy_arns": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy": visit complete | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.tags" | |
2021/05/12 22:08:09 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.tags": visit complete | |
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.force_detach_policies" | |
2021/05/12 22:08:09 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable) | |
2021/05/12 22:08:09 [TRACE] vertex "var.force_detach_policies": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy_name": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.max_session_duration": visit complete | |
2021/05/12 22:08:09 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset | |
2021/05/12 22:08:09 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state | |
2021/05/12 22:08:09 [TRACE] vertex "output.policy_name": visit complete | |
2021/05/12 22:08:09 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete | |
2021-05-12T22:08:09.509Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5] | |
2021-05-12T22:08:09.510Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25809 | |
2021-05-12T22:08:09.510Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 | |
2021-05-12T22:08:09.558Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:08:09.558Z | |
2021-05-12T22:08:09.595Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin240970136 network=unix timestamp=2021-05-12T22:08:09.595Z | |
2021-05-12T22:08:09.595Z [DEBUG] plugin: using plugin: version=5 | |
2021/05/12 22:08:09 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/12 22:08:09 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/12 22:08:09 [TRACE] GRPCProvider: GetSchema | |
2021-05-12T22:08:09.642Z [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/12 22:08:09 [TRACE] GRPCProvider: Configure | |
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [INFO] AWS Auth provider used: "StaticProvider": timestamp=2021-05-12T22:08:09.730Z | |
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] Trying to get account information via iam:GetUser: timestamp=2021-05-12T22:08:09.730Z | |
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 33 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=GetUser&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:09.730Z | |
2021-05-12T22:08:10.598Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 678 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:15 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:10.598Z | |
2021-05-12T22:08:10.598Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] <GetUserResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetUserResult> | |
<User> | |
<Path>/</Path> | |
<PasswordLastUsed>2021-02-24T05:21:29Z</PasswordLastUsed> | |
<Arn>arn:aws:iam::000000000001:user/tmp-rce-user</Arn> | |
<UserName>tmp-rce-user</UserName> | |
<UserId>AIDAZLO5RQSBZU26DOGE5</UserId> | |
<CreateDate>2021-02-13T02:11:43Z</CreateDate> | |
<Tags> | |
<member> | |
<Value>[email protected]</Value> | |
<Key>owner</Key> | |
</member> | |
</Tags> | |
</User> | |
</GetUserResult> | |
<ResponseMetadata> | |
<RequestId>68a81634-5402-4e56-843b-11153745c482</RequestId> | |
</ResponseMetadata> | |
</GetUserResponse>: timestamp=2021-05-12T22:08:10.598Z | |
2021/05/12 22:08:10 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this (expand)" | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": starting visit (*terraform.nodeExpandApplyableResource) | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": expanding dynamic subgraph | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": entering dynamic subgraph | |
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this" | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeApplyableResource) | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": visit complete | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": dynamic subgraph completed successfully | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": visit complete | |
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this" | |
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeApplyableResourceInstance) | |
2021/05/12 22:08:10 [TRACE] EvalReadDiff: Read Update change from plan for aws_iam_role.this | |
2021/05/12 22:08:10 [TRACE] EvalReadState: reading state for aws_iam_role.this | |
2021/05/12 22:08:10 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups | |
2021/05/12 22:08:10 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/12 22:08:10 [TRACE] EvalReadDiff: Read Update change from plan for aws_iam_role.this | |
2021/05/12 22:08:10 [TRACE] Re-validating config for "aws_iam_role.this" | |
2021/05/12 22:08:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/12 22:08:10 [TRACE] GRPCProvider: PlanResourceChange | |
2021/05/12 22:08:10 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Update) matches planned change (action Update) | |
2021/05/12 22:08:10 [TRACE] EvalReadState: reading state for aws_iam_role.this | |
2021/05/12 22:08:10 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups | |
2021/05/12 22:08:10 [TRACE] GRPCProvider: UpgradeResourceState | |
[0m[1maws_iam_role.this: Modifying... [id=terraform-usage-role][0m[0m | |
2021/05/12 22:08:10 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/12 22:08:10 [DEBUG] aws_iam_role.this: applying the planned Update change | |
2021/05/12 22:08:10 [TRACE] GRPCProvider: ApplyResourceChange | |
2021-05-12T22:08:10.610Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/UpdateAssumeRolePolicy Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 2532 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=UpdateAssumeRolePolicy&PolicyDocument=%7B%0A++%22Version%22%3A+%222012-10-17%22%2C%0A++%22Statement%22%3A+%5B%0A++++%7B%0A++++++%22Sid%22%3A+%22shedrivesmecrazy%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%2C%0A++++++%22Condition%22%3A+%7B%0A++++++++%22ForAllValues%3AStringEqualsIgnoreCase%22%3A+%7B%0A++++++++++%22SAML%3Asub%22%3A+%5B%0A++++++++++++%22fakename-network_Admin%22%2C%0A++++++++++++%22fakename-network_Superadmin%22%2C%0A++++++++++++%22fakename-network_Power%22%2C%0A++++++++++++%22fakename-network_SysEng%22%2C%0A++++++++++++%22fakename-network_Standard%22%0A++++++++++%5D%0A++++++++%7D%0A++++++%7D%0A++++%7D%2C%0A++++%7B%0A++++++%22Sid%22%3A+%22likenooneelse%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%5B%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%0A++++++++%5D%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%0A++++%7D%2C%0A++++%7B%0A++++++%22Sid%22%3A+%22andicanthelpmyself%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%5B%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000006%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%0A++++++++%5D%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%0A++++%7D%0A++%5D%0A%7D%0A&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:10.610Z | |
2021-05-12T22:08:11.226Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/UpdateAssumeRolePolicy Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 224 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:16 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.226Z | |
2021-05-12T22:08:11.226Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] <UpdateAssumeRolePolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ResponseMetadata> | |
<RequestId>1d215368-7dda-4b35-9fe7-915c7ea4cc01</RequestId> | |
</ResponseMetadata> | |
</UpdateAssumeRolePolicyResponse>: timestamp=2021-05-12T22:08:11.226Z | |
2021-05-12T22:08:11.227Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 63 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.227Z | |
2021-05-12T22:08:11.820Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Transfer-Encoding: chunked | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:17 GMT | |
Vary: accept-encoding | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.820Z | |
2021-05-12T22:08:11.821Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22shedrivesmecrazy%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22ForAllValues%3AStringEqualsIgnoreCase%22%3A%7B%22SAML%3Asub%22%3A%5B%22fakename-network_Admin%22%2C%22fakename-network_Superadmin%22%2C%22fakename-network_Power%22%2C%22fakename-network_SysEng%22%2C%22fakename-network_Standard%22%5D%7D%7D%7D%2C%7B%22Sid%22%3A%22likenooneelse%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%2C%7B%22Sid%22%3A%22andicanthelpmyself%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROAZLO5RQSBQLREIIMOZ</RoleId> | |
<RoleLastUsed> | |
<LastUsedDate>2021-05-12T21:38:54Z</LastUsedDate> | |
<Region>us-west-2</Region> | |
</RoleLastUsed> | |
<RoleName>terraform-usage-role</RoleName> | |
<Description>terraform usage role</Description> | |
<Arn>arn:aws:iam::000000000001:role/terraform-usage-role</Arn> | |
<CreateDate>2021-02-16T02:46:15Z</CreateDate> | |
<Tags> | |
<member> | |
<Value>[email protected]</Value> | |
<Key>owner</Key> | |
</member> | |
</Tags> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>b327e11b-fd71-47bb-985d-b5fc30cd3c90</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-05-12T22:08:11.820Z | |
2021-05-12T22:08:11.821Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 72 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.821Z | |
2021-05-12T22:08:12.355Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:17 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.354Z | |
2021-05-12T22:08:12.355Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>e2c3cabd-b582-4562-978c-725fa7388bc4</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-05-12T22:08:12.354Z | |
2021-05-12T22:08:12.356Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 80 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.356Z | |
2021-05-12T22:08:12.889Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 557 | |
Content-Type: text/xml | |
Date: Wed, 12 May 2021 22:08:17 GMT | |
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.889Z | |
2021-05-12T22:08:12.889Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn> | |
<PolicyName>terraform-usage-policy</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>fd16d10c-bf24-490b-a87c-6ed7aa5fb4da</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:08:12.889Z | |
2021/05/12 22:08:12 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.this, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .assume_role_policy: was cty.StringVal("{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"shedrivesmecrazy\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::000000000001:role/onelogin_ad_association\"\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"ForAllValues:StringEqualsIgnoreCase\": {\n \"SAML:sub\": [\n \"fakename-network_Admin\",\n \"fakename-network_Superadmin\",\n \"fakename-network_Power\",\n \"fakename-network_SysEng\",\n \"fakename-network_Standard\"\n ]\n }\n }\n },\n {\n \"Sid\": \"likenooneelse\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::000000000001:role/GL-Admin\",\n \"arn:aws:iam::000000000001:role/GL-NetEng\",\n \"arn:aws:iam::000000000001:role/GL-Power\",\n \"arn:aws:iam::000000000001:role/GL-Standard\",\n \"arn:aws:iam::000000000001:role/GL-SysEng\",\n \"arn:aws:iam::000000000001:role/GL-SuperAdmin\"\n ]\n },\n \"Action\": \"sts:AssumeRole\"\n },\n {\n \"Sid\": \"andicanthelpmyself\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::000000000002:root\",\n \"arn:aws:iam::000000000003:root\",\n \"arn:aws:iam::000000000004:root\",\n \"arn:aws:iam::00000000005:root\",\n \"arn:aws:iam::000000000006:root\",\n \"arn:aws:iam::000000000007:root\",\n \"arn:aws:iam::000000000001:root\",\n \"arn:aws:iam::000000000008:root\",\n \"arn:aws:iam::000000000009:root\",\n \"arn:aws:iam::000000000010:root\",\n \"arn:aws:iam::000000000011:root\",\n \"arn:aws:iam::000000000012:root\"\n ]\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"), but now cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-NetEng\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::000000000006:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}") | |
2021/05/12 22:08:12 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this | |
2021/05/12 22:08:12 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this | |
2021/05/12 22:08:12 [TRACE] EvalApplyProvisioners: aws_iam_role.this is not freshly-created, so no provisioning is required | |
2021/05/12 22:08:12 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this | |
2021/05/12 22:08:12 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this | |
2021/05/12 22:08:12 [TRACE] vertex "aws_iam_role.this": visit complete | |
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/12 22:08:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/12 22:08:12 [TRACE] GRPCProvider: Close | |
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "output.role_name" | |
2021/05/12 22:08:12 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/12 22:08:12 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset | |
2021/05/12 22:08:12 [TRACE] EvalWriteOutput: Saving value for output.role_name in state | |
2021/05/12 22:08:12 [TRACE] vertex "output.role_name": visit complete | |
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "output.role_create_date" | |
2021/05/12 22:08:12 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput) | |
[0m[1maws_iam_role.this: Modifications complete after 2s [id=terraform-usage-role][0m[0m | |
2021/05/12 22:08:12 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset | |
2021/05/12 22:08:12 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state | |
2021/05/12 22:08:12 [TRACE] vertex "output.role_create_date": visit complete | |
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/12 22:08:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/12 22:08:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-05-12T22:08:12.892Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-12T22:08:12.894Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25809 | |
2021-05-12T22:08:12.894Z [DEBUG] plugin: plugin exited | |
2021/05/12 22:08:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "root" | |
2021/05/12 22:08:12 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/12 22:08:12 [TRACE] vertex "root": visit complete | |
2021/05/12 22:08:12 [DEBUG] Uploading remote state to S3: { | |
Body: buffer(0xc0013c29c0), | |
Bucket: "fakename-terraform", | |
ContentLength: 5079, | |
ContentType: "application/json", | |
Key: "terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate", | |
ServerSideEncryption: "AES256" | |
} | |
2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Request s3/PutObject Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
PUT /terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate HTTP/1.1 | |
Host: fakename-terraform.s3.us-west-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 | |
Content-Length: 5079 | |
X-Amz-Server-Side-Encryption: AES256 | |
Accept-Encoding: gzip | |
{ | |
"version": 4, | |
"terraform_version": "0.14.5", | |
"serial": 29, | |
"lineage": "fakenews", | |
"outputs": { | |
"policy_name": { | |
"value": "terraform-usage-policy", | |
"type": "string" | |
}, | |
"role_create_date": { | |
"value": "2021-02-16T02:46:15Z", | |
"type": "string" | |
}, | |
"role_name": { | |
"value": "terraform-usage-role", | |
"type": "string" | |
} | |
}, | |
"resources": [ | |
{ | |
"mode": "managed", | |
"type": "aws_iam_policy", | |
"name": "this", | |
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", | |
"instances": [ | |
{ | |
"index_key": 0, | |
"schema_version": 0, | |
"attributes": { | |
"arn": "arn:aws:iam::000000000001:policy/terraform-usage-policy", | |
"description": "", | |
"id": "arn:aws:iam::000000000001:policy/terraform-usage-policy", | |
"name": "terraform-usage-policy", | |
"name_prefix": null, | |
"path": "/", | |
"policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"first\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:ListBucket\",\n \"s3:GetBucketVersioning\"\n \n \n ],\n \"Resource\": [\n \"arn:aws:s3:::fakename-terraform\"\n ]\n },\n {\n \"Sid\": \"second\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:DeleteObject\",\n \"s3:GetObject\",\n \"s3:PutObject\"\n ],\n \"Resource\": [\n \"arn:aws:s3:::fakename-terraform/*\"\n ]\n }\n ]\n}" | |
}, | |
"sensitive_attributes": [], | |
"private": "fake==" | |
} | |
] | |
}, | |
{ | |
"mode": "managed", | |
"type": "aws_iam_role", | |
"name": "this", | |
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", | |
"instances": [ | |
{ | |
"schema_version": 0, | |
"attributes": { | |
"arn": "arn:aws:iam::000000000001:role/terraform-usage-role", | |
"assume_role_policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-NetEng\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::00000000005:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}", | |
"create_date": "2021-02-16T02:46:15Z", | |
"description": "terraform usage role", | |
"force_detach_policies": false, | |
"id": "terraform-usage-role", | |
"inline_policy": [ | |
{ | |
"name": "", | |
"policy": "" | |
} | |
], | |
"managed_policy_arns": [ | |
"arn:aws:iam::000000000001:policy/terraform-usage-policy" | |
], | |
"max_session_duration": 3600, | |
"name": "terraform-usage-role", | |
"name_prefix": null, | |
"path": "/", | |
"permissions_boundary": "", | |
"tags": { | |
"owner": "[email protected]" | |
}, | |
"unique_id": "FAKENEWS" | |
}, | |
"sensitive_attributes": [], | |
"private": "fake==" | |
} | |
] | |
}, | |
{ | |
"mode": "managed", | |
"type": "aws_iam_role_policy_attachment", | |
"name": "this", | |
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", | |
"instances": [ | |
{ | |
"index_key": 0, | |
"schema_version": 0, | |
"attributes": { | |
"id": "terraform-usage-role-20210216024614902500000001", | |
"policy_arn": "arn:aws:iam::000000000001:policy/terraform-usage-policy", | |
"role": "terraform-usage-role" | |
}, | |
"sensitive_attributes": [], | |
"private": "fake==", | |
"dependencies": [ | |
"aws_iam_policy.this", | |
"aws_iam_role.this" | |
] | |
} | |
] | |
} | |
] | |
} | |
----------------------------------------------------- | |
2021/05/12 22:08:13 [DEBUG] [aws-sdk-go] DEBUG: Response s3/PutObject Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 0 | |
Date: Wed, 12 May 2021 22:08:20 GMT | |
----------------------------------------------------- | |
2021/05/12 22:08:13 [DEBUG] [aws-sdk-go] | |
[0m[1m[32m | |
Apply complete! Resources: 0 added, 1 changed, 0 destroyed.[0m | |
[0m[1m[32m | |
Outputs: | |
policy_name = "terraform-usage-policy" | |
role_create_date = "2021-02-16T02:46:15Z" | |
role_name = "terraform-usage-role"[0m |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment